“Runtime security is on the rise and for good reason,” says Jiphun Satapathy, SVP & CISO at Medallia, in our latest CISO Firechat with Rinki Sethi.
For CISOs navigating fast-moving cloud environments, static signals aren’t enough. You need to see what’s actually happening, right now in real time.
Jiphun outlines three priorities for securing your runtime reality:
1. Identify which vulnerabilities are exploitable and help dev teams focus on what matters.
2. Understand how quickly an attacker could escalate privileges and track your dwell time.
3. Lock down credentials. They remain one of the most common entry points for compromise.
“Real-time detection is only useful if you can respond in real time.”
Watch the full conversation here 👉 https://lnkd.in/giSUbMVM
Up & Upwind! 🏄♂️
Yeah, I think runtime security is obviously on the rise because of adoption of cloud services and. And the pace of innovation. I think I would say probably there are multiple areas to look at. If I were to prioritize, I would say again, going to 1st, I put misconfiguration and vulnerability in the same bucket. Focus on that. How do you detect? Obviously we have enough tools now to detect. Go figure out how do we prioritize and fix it, right? So I like now products and services, which is which should be able to determine the exploitability angle and then help you prioritize or help your developers priority. So that is. First one, I would say and focus or internally we are, we are looking at that. The second one is privileged access, right? So The thing is you want to know either by some sort of red team exercise or some other analysis, how long does it take for a malicious actor to gain higher privilege within your system by any means that gets exploited? What's your dwell time or what is the mean time to detect things like that? And the last thing is. Credentials always the root of many, many breaches, right? Whether it is through insider mistakes or. Lack of best practice. You want to make sure those credentials are in your. Environments which gives access to these resources are well managed or protected. So I would say these are some of the areas that I see if you have to go take care of your runtime threats in the cloud space, I love that. And the more you can do that real time, yes, the better. The faster, the sooner you get and catch things, correct? That's right.
CSO at Upwind Security | Founding Partner at Lockstep | |Board Member at StrongDM and Vaultree | Former Board Member at ForgeRock | Former VP & CISO at Twitter, Rubrik, BILL | Speaker
CSO at Upwind Security | Founding Partner at Lockstep | |Board Member at StrongDM and Vaultree | Former Board Member at ForgeRock | Former VP & CISO at Twitter, Rubrik, BILL | Speaker
1dJiphun Satapathy 🤩🤩🤩