Jason Clark:
I think that one, security needs to be built into everything from the beginning. That's the only way to have really good security, and it's to simplify. The enemy of security is complexity, right? I always probably see the aspects of quality and security, that the difference of the cost of building it in right to begin with versus the cost of coming and being reactive, and trying to remediate is significant, so I think security should be in the beginning of that conversation.
Speaker 2:
Hello, and welcome to season two of Security Visionaries, hosted by Mike Anderson, CIO at Netskope. You just heard from today's guest, Jason Clark, Chief Strategy, Security, and Marketing Officer at Netskope. Our new host, Mike Anderson, is the chief digital and information officer at Netskope. This season, Mike sits down with industry leaders who are tackling security as a team sport, and empowering their employees to become better digital citizens. This episode features an interview with Jason Clark, Season One Host and Chief Strategy, Security, and Marketing Officer at Netskope. As Jason passes the baton to Mike, they discuss who is responsible for security, the human firewall, and what the future holds. Before we dive into Jason's interview, here's a brief word from our sponsor.
Speaker 3:
The Security Visionaries podcast is powered by the team at Netskope. At Netskope, we are redefining cloud, data, and network security with a platform that provides optimized access and zero trust security for people, devices, and data anywhere they go. To learn more about how Netskope helps customers be ready for anything on their SASE journey, visit N-E-T-S-K-O-P-E.com.
Speaker 2:
Without further ado, please enjoy episode 11 of Security Visionaries with Jason Clark, Chief Strategy, Security, and Marketing Officer at Netskope, and your host, Mike Anderson.
Mike Anderson:
Welcome to season two of the Security Visionaries podcast. I'm Mike Anderson. I'm going to be your host for season two. I'm our chief digital officer and CIO here at Netskope, and this is kind of a passing the baton episode. We have Jason Clark, who's our chief strategy, security, and marketing officer who's joining us, who was our host of season one. Jason, welcome, and maybe help explain, because that's a lot of stuff for one person to be responsible for. Maybe you can talk a little bit about how do those things fit together.
Jason Clark:
I get that question a lot. I started as a security person since I was 17. All my life, I've done nothing but security. And then, kind of after you build security, and I ran infrastructure and networking as well for large companies, and then you kind of... You build it over and over again, and I got my MBA, and I realized I love the strategic side of it, so I joined as a chief strategy officer for a large organization, but also kept the security team, because I knew that. And it was a security company, so I ran strategy thinking about how to build products and where to take the go-to-market strategy at the same time as... I feel like it's on the security side, my job is to wake up every day and know the problem. Know the pain of the community and of the buyer. So that helps me inform strategy, by getting the 3:00 in the morning wake-up calls. But then, then I grew and added marketing into what I do, because it aligns so well with strategy. The best CMOs out there really are driving the strategy, because it's now driving where we're going from a product direction and services direction at the same time as how do we message, and market, and build trust with that community, right? And with those buyers. Again, wrapping down to, well how better to do that than to live it and feel the pain every day, right? So actually to me, all three of those functions go together perfectly, mainly because we're a cybersecurity company.
Mike Anderson:
That makes sense. I just assumed it was when you say, "Hey, I think we should do this" about something, people say, "Why don't you do it?" And then all of a sudden, you take on more things. You always have to be careful also once you say, "Hey, I think we should really be doing this instead of that." Then all of a sudden, you become the person doing that.
Jason Clark:
Yep. I've learned to say less in those meetings, and definitely try to say no more, right? To some of that. I do remember being in a board meeting, where the chairman and the CEO was complaining about something. This was two companies ago. And I raised my hand. I said, "Well, this is how you solve it. Guys, we're spinning around in circles. Just do this, this, and this," and they looked over at me, and they said, "Guess what. It's yours now, Jason," and it was a PNL. They said, "You're now the GM of that business." And I sat there, and the guy who was the GM was also sitting in the room. It was really awkward, so at that point, I said, "Okay, I need to stop doing that."
Mike Anderson:
That was passing the baton in the same room, but he was surprised, but he or she was surprised as well, in that way.
Jason Clark:
Exactly.
Mike Anderson:
One of the things I know we've talked about a lot. I joined obviously a little over a year ago, from Schneider Electric, and you've had a long, storied career as a security leader, strategy leader with some rocket ship type companies as well in your past. One of the things I know we've talked about a lot is this concept of a team sport. Security is a team sport, and thinking about it not just in context of just the CIO/CISO partnership, but thinking more broadly across the organization, across the IT leaders, across the people using the applications. What is your take on that whole concept of security being a team sport?
Jason Clark:
I love the phrase. It's a good mantra. I think security's always been a little bit of a team sport. I mean, to get it done, you've needed everybody. But I would say that it's not been executed well, right? So it hasn't been high-performing teams. They haven't thought about it like a team sport. It's more like, "Hey, you have a responsibility." But in the end, the security teams end up getting held accountable without everybody else necessarily being accountable, right? So I'd say it wasn't exactly fairly set up to have high-performing teams. Now, going forward, to me, it all starts with the relationship with the executives, right? And making sure that you have that support, that alignment, throughout the entire organization, and definitely most important relationship is the CIO. That CIO needs to feel very comfortable with their head of security. Whether they report to them or not, they have to be the best and strongest team. And where I see things in the past gone wrong, as an example, and I see this today, where you have a CIO who doesn't necessarily let the CISO go talk to the CFO or talk to the CEO without them. A part of being a team sport is just kind of leaving egos at the door, right? You've got to enable your other leaders to have and build those one-on-one relationships as well. I think the other part is there's the other peers, but then you have the executives and IT, right? So networking, and infrastructure, and applications are the most important relationships inside of IT for that security team. They need to designate champions inside those teams who are part of that, and who feel like they're also part of security. And I think trust and transparency is one of the most important things in this kind of team sport.
Mike Anderson:
No, I couldn't agree more. If you think about, a lot of security teams originally were born out of the infrastructure team. You had network security and firewalls, and the security team got kind of carved out of that. I would love your take on if you think about budgets, how much does budget go into that team sport concept? You know, who owns the budget, and who owns the decision... A lot of times, decisions follow who owns the budget. What's your take on that from... How are budgets transitioning from that team sport standpoint? How does it influence those relationships?
Jason Clark:
And that budget's kind of like... It's the leverage point, right? The person who has the budget, for the most part, has a significant amount of the power. I would say if you think about all kind of... Let's just take the network security bucket, which is the biggest spend in all of security, that has been heavily controlled by the infrastructure and the networking team. Let's say it was 90-10, 90% kind of control there, you've probably seen it more 70% controlled by the networking team still, and 30% by the security team. But what I see more and more is the security team reaching in and saying, "Hey, look. I'm going to set the requirements in the name of security. Yes, you're spending the money, but you have to match my requirements." So you see a lot more teams are working together. When they don't, I do see the security team in some of the bigger companies reach out and just start saying, "Well then, if we're not going to play nice together..." They end up having a little bit more power at the board level, to just reach over and grab it. So I do see that happening at a... And I did a CISO dinner two nights ago, and 1/3 of the CISOs in the room said that they have recently taken over networking and infrastructure because of that, as an example. Because they had friction, and they couldn't decide on some of the technology decisions or the direction they wanted to go, but also, over time, the network...
It's really just providing access and you need to make sure it's secure, right? And that's the job of security too. And when you live in a hybrid world that we live in right now, half your users are off the network half the time. Some massive percent of your apps are probably in the cloud or moving to the cloud. What is the network anymore? I think IT leaders are asking themselves that same question. I think you start to see that convergence happen.
Mike Anderson:
Ray Wang once, I saw a presentation. He talked about the I in CIO having different meanings around innovation, investment. I wonder if the I in CISO is going to be infrastructure as another dimension in the future, chief infrastructure security officer. Maybe that's the new title.
Jason Clark:
That could be right. I mean, I wish, actually, kind of we centered on... It's all about the data, right? And I know we say information, but kind of the word data really resonates more with the business. We want secure access to data. Get the data to fingertips, right? Make it valuable, and secure it. So I kind of wish it was like something with data in the title. I think further to that, Mike, as we think about kind of the naming of stuff, I think the title matters a lot as what the rest of the leaders in the organization think about this, right? The head of security. Use the example of kind of the chief people officer, the head of legal, the CMO, the CFO. All of them have different perspectives, in every company, on the security team. So the team sport aspect, title matters.
Mike Anderson:
Yeah, absolutely, and you know, it's interesting. You mentioned board. I feel like board is getting into that team sport conversation as well, because obviously, they've got risk, personally, based on the security posture of the organization they're in, so they're definitely part of that team sport, which I think to your point, kind of elevates the CISO to be very important in that board-level conversation. One of our friends and one of our customers had said... The CIO said, "When the CISO sneezes, I feel it." That one's stuck in my head as a pretty interesting comment, when you think about the team sport and how you have to be partnered at the hip on everything you do.
Jason Clark:
On the board front, there's actually a movement, though, of a number of CISOs at big companies, where there's discussions around having... They have a comp committee and an audit committee. Having a security and resilience committee, just focused on this topic, which would be interesting.
Mike Anderson:
You're in a unique position inside Netskope, because you have security not just for internal, but also product security. And it's interesting, because when I talk to a lot of CIOs that are thinking about a CISO role, they're always like, "Where should the CISO live? Because it owns not just the internal security controls, but also what we build into our products." How does that kind of play into that whole team sport concept? Because there's a lot of people, CIOs and security leaders, that work in companies that build products that get sold to end customers, where security in the product is also important. What is your thoughts on that one?
Jason Clark:
I think that's a lot to do with the company, right? Because does the CIO own building products for the business, or are they more supporting the back office infrastructure and the main systems like ERP? So you see some companies where they have a CTO and a CIO, and the CTO is building new, or you see the divisions have their own CTOs, and they're just getting the support from the CIO. I think that all really depends on what's the organization design for technology, and how really important is innovation, and who are they giving that task to. And then, I think the security team that needs to fit into that, depending, right? With the CIO owns all of it, then it just fits naturally with that CIO, but if you have a CTO and a CIO, which I see in a lot of companies, then all of a sudden, having the CISO report into the CIO, who isn't the CIO that owns the building of the new, I don't think that works well. Especially if it's a cybersecurity company. At that point, I would tell every CEO of a cybersecurity company, the head of security should report into the CEO. The CEO should be that close.
Mike Anderson:
Yeah, that makes a lot of sense to me. The two questions I get the most from people is... One is, "Where should the CISO report?" Is one, but the one I get more often than not now is, "How do we know we're doing enough?" Which is probably a conversation for a different episode, but you know, this is going to be a super exciting season on Security Visionaries season two, as we talk about security as a team sport, you know, with all the different great guests we're going to have this year. I want to pivot now, and as we think about tech stacks, and we think about the tech stack from security, what role should security play when it comes to determining the tech stack that the CIO and the IT leaders are implementing? You touched on it a little bit, but I'd love for you to dig in more and tell me kind of what is your perspective on how should security play a role in the tech stack decisions that are made, and how far should that go?
Jason Clark:
I think that one, security needs to be built into everything from the beginning, right? You build security in. That's still probably a challenge a lot of places, but that's the only way to have really good security, and it's to simplify. The enemy of security is complexity, right? I always probably see the aspects of quality and security, that the difference of the cost of building it in right to begin with versus the cost of coming and being reactive, and trying to remediate is significant, so I think security should be in the beginning of that conversation. I think that security is in a unique spot, because think about what other IT leader other than the CIO spends as much time with the board, and regulators, right? Their job is to really understand the entire aspect of the business on every angle, whereas the infrastructure teams aren't... They're not tasked the same, right? And the app teams are kind of, a lot of times, spending time on their specific apps, and not necessarily the SaaS apps, as an example, which might be half the apps and that the business is operating on.
Whereas security and CIO, and I would say enterprise architecture, all three of those, they should be doing it together. I feel like the CISO and head of enterprise architecture should be the right- and left-hand leaders to the CIO, and the three of them look at the whole picture together, and make that decision. Security has a lot of roles in it. It just really depends on the strength of the CISO. You know, really strong, business-led, business leader CISOs are very much in that conversation from the beginning, before they even decide to build something. "Hey, we're going to enter this new market," right? "We're looking at doing this acquisition. We're going to enter and do business in China," right? Or, "We're going to build this new innovation." The strong security leaders are in those conversations with the CIO, with the CTO, but then you still have a significant amount of kind of IT, or let's say infrastructure born and never really left infrastructure security people, that they're not getting invited to those conversations because they have less value to add. They're not going to talk about how, as you enter that market, how to maximize the acquisition of customers, the retention of customers in that space, and how to create trust in the market and function.
Mike Anderson:
You made a point earlier where you talked about understanding the business, right? I think the first thing you have to do is definitely be a student of the business you're in. That's the key thing of any business leader. I've always told my teams, "You can't change what you don't first take time to understand," so a lot of times, people come in with their playbook saying, "I did this at this other company, so I'm going to do the same thing here, and it's going to work." And a lot of times, you have to take time to understand, which is why when you go through any MBA program, they say your first 90 days on any new job is you take time to understand the business you're in, and learn, and ask a lot of questions, and don't try to form a lot of decisions. You may have some opinions that are forming, but make sure you ask a lot of questions and get perspectives from different angles. One of the comments that comes up a lot too is around this whole zero-day exploit. You talked about application teams. Today, as I build apps for cloud, I'm going and I'm pulling data or pulling applications from git repositories. I'm pulling out data or applications from public cloud, which is a lot of open source technology. And then what's happening today is people are concerned if there's a zero-day exploit like Log4J, how do I go identify all the places I'm using these bits of code within my applications that I'm building, right? So as I think about tech stack, what are some thoughts you have on... What can security leaders, and IT leaders, and app leaders do around making sure that they can identify that? If you think about this whole software bill of materials, right? That's been a new topic as well. How does all that come together when you think about from a tech stack standpoint and zero-day exploits?
Jason Clark:
This is a big one, because it's really about doing asset management really, really well, right? And that gets a lot harder in a world where you have probably 100X more providers in a cloud world than you ever had, or you don't own that infrastructure, right? And you don't even know what other tools that they're using, so you have third-party, fourth-party, fifth-party, sixth-party technologies that are all playing a part in this. I think that just... Third-party risk just got almost impossible in today's environment, so that is something I think the industry needs to solve, number one. So you can talk about it for your own products, or stuff sitting in your data center, but as soon as you start expanding out to everything SaaS, or platform as a service, I think that just change. Now, security can do a lot. In Netskope, we spend a lot of time on this topic with our customers, and even internally ourselves, understanding just all the apps, and then having some type of app at the station to know what the nth-party applications are, and whether those do good security or not. A simple example, where let's say our HR team decides that they want to use an app that's got 28 employees sitting in Atlanta with an app hosted in AWS, but they don't have a single security person on the team. But they're not compromised, right? But how much data do we want to give this organization? We should be in the middle of that conversation as a security and technology organization, with that business unit. I think a lot of people look at that as shadow IT, but that's really business IT, and we want to enable it, but enable it safely. So that's the third-party part of the conversation, but then I think it translates all the way down to when I say asset management, I think it's people. All your users, what do they have access to? And you can't just look at Active Directory anymore and know, right? Because you've got all the business IT SaaS apps, that might have two-factor authentication, but those business admins in the marketing department or in the HR department are the ones defining the access, and it's not consistent. So we need to be in a world where we can know every user, everything they're using, all the access to the data they have, how their behavior has changed and how that's different from their peers, correlated to how risky is that app. We should have a real time risk dashboard by user, by app, and by data. That doesn't exist today. I mean, you have to do it manually using technologies, right? We play a role in that, but there isn't like this one uber way to solve, I'd say, the asset management problem. So I kind of took it a level above more zero days.
Mike Anderson:
You know, when I think about tech stacks, if I look at the market we're in today, a lot of people would say we're already in a recession or we're heading towards a recession, right? We were talking around the business value, right? It's the reducing risk. It's reducing cost. It's improving my organizational agility. You know, when we think about that, obviously that cost becomes front and center. So does risk, right? When we're in a tough environment, whether we look at COVID, the bad actors try to take advantage of those environments. And at the same time, there's a lot more pressure and sensitivity on cost. It's interesting. When I talk to a lot of leaders, there's these acquisition of a lot of tools, right? Best-of-breed everything, and I always say, it's kind of like Baskin-Robbins, right? You wake up one day and you've got 31 flavors of ice cream in your tech stack. So now it's kind of like how do I get... Maybe it's not best-of-breed, but it's best-of-suite. What are your thoughts on that, and how will that play into some of the security decision-making going forward? As CISOs, and CIOs for that matter, are looking at investments in their security stack, how is the economic climate going to impact some of that decision-making when they think about the number of vendors they work with and where consolidation may occur?
Jason Clark:
There's a couple of parts to that. One, the unfortunate or the hard thing about security is that you have an active adversary, who is constantly trying to break in, right? So they're innovating, and then you've got this very fast-growing attack surface of cloud, cloud apps, mobile devices, people working from home, and APIs, which I think APIs are probably even the fastest-growing attack surface, that people aren't doing a whole lot to protect right now. And so you just say, "Okay, I've got this really fast-growing attack surface, and I've got this innovating bad guy. That's what's resulted in this proliferation of a lot of security technologies." Now, their good news is, on certain parts, certain elements, the platforms are there. They're one complete platform. I think SASE and Security Service Edge is a perfect example of where you're keeping up with the bad guy through feeds, right? And as long as you follow your data and you follow your user, and you're basically just taking legacy stuff on the perimeter and moving your new network security into the cloud, and making it data smart. So the innovation is that all of a sudden, what used to have to happen with 10 boxes, and not even efficiently, you're now moving that to the cloud and making it one brain. So the way, I think, you get ahead is you can... The platform has to think as one brain of your data security, and then that nervous system is the traffic that goes through it. Once you do that, you can all of a sudden get ahead of the bad guy, and you can start to reduce that attack surface again. The issue is, where you can't get access to the traffic, such as stuff that's just sitting in a cloud environment, where you're worried about that infrastructure, and it's not the traffic. Now how do you insert yourself on every single type of use case or attack surface, right? So there isn't a platform that can solve that yet, but SASE will help the secure access part of it, which is significant.
Mike Anderson:
So I want to switch gears a little bit and go back to a comment you made earlier, about people, right? When we think about the team sport and teaming up on security, one of the things is our people, like what role our people play in that whole security as a team sport. I was really excited this last year when I was in our St. Louis office, and I was handed my human firewall t-shirt, because I thought that was super cool. I'm part of the team, you know? So what are your thoughts around how do we enable our people through security, and what role do our people across our organization play on teaming up, and getting ahead of the bad actors, and being part of the solution?
Jason Clark:
That's the most important element. It's the people. That's where most of the accidents happen, right? It's a misconfiguration of something, or it's an accidentally sending out, right? Most stuff's not malicious, but also, it is people involved in insider threat. That is also malicious, right? So it's the people element that has the most amount of opportunity to solve. Any program, and any technology that's engaging with the user in the conversation, right? So kind of moving from an on-off, yes-no, where kind of security has always got this bad rap of being the office of no. You know, there's many security leaders I'll talk about, they walk down the hall and other people in the other parts of the organization will turn around, because they don't want to run into the head of security, right? Versus really being known as just being this very collaborative person. A lot of times, people will say, "We need to reduce risk and we need to reduce friction." Actually, friction's an okay thing. You want to be able to pump the brakes. It's just let's not slam on the brakes, right? For every little thing. A couple examples that we do is one, we have champions and warriors kind of out in the business, especially on the engineering team as an example, and where there's MBOs aligned to helping make sure that we have good, quality code, that people are getting bonused on 100% of the stuff that they write goes through the security pipeline review process, right? Versus skipping it. So people get incentivized for that kind of stuff. People get incentivized in the company for catching bad guys, even though it's not defined as their job, but because this is back to the team sport, we're creating a culture where daily, we get something, "Hey, I got this weird text message that acts like it's from our CEO. Asked me to send a gift card," and we get these notifications and alerts all coming through the SOC. Every month, we have awards for that. Taking that further, the other aspect is our technology. We want to build it into the Netskope technology, right? That obviously, we're a massive consumer of. It's one of the most important pillars of our own security program, but for our customers, one of their favorite things, especially the CIOs we talk to, is where a popup comes up and says, "Hey look, I know you're trying to upload this thing, but can you type the one business sentence reason why? Just tell us why, and we'll let you go." 98% of people back out. So that's just a fun way to engage. Or just-in-time train them, saying, "Hey, look. You're sharing this file outside the company, and you've assigned and said it never goes away. I'm allowing this person to have access forever," and it makes a suggestion that says, "Well, why don't you just maybe give them access for 48 hours and start with that, versus forever?" Just little nudges and training to people, kind of have a system that engages with them, where you're not just saying no. You're saying, "I'll let you go. Just tell me why." And then you find people self-select out. That's, to me, how you start to create this culture, and that's a human firewall, where you're allowing them to make the decision. You're empowering them.
Mike Anderson:
You know, so Jason, one of the things we've talked about a lot is we want to create better digital citizens, not just within Netskope, but within our customers as well. Because at the end of the day, what we really want is our people to not click on the links they shouldn't click on, not buy applications without working through IT and security, right? Really, we want to create better digital citizens. As we think about that, I want to pivot a little bit. You made a comment at the very beginning of our conversation, around HR. And it's interesting. I'd sat down with Marilyn, our chief people officer, but she was talking about… She came from a customer, you know? She came from Anaplan. They were a customer of ours, and she talked about how she partnered with the CIO on rolling out Netskope, because obviously we sit between users and all the applications and things they access. We have all internet traffic running through us. What are some ways you feel like... and maybe some examples of where you've worked with HR leaders in the past, as you've rolled out security programs, or even some CISOs you've worked with? What are some examples of where HR's played a pivotal role in the security program at large?
Jason Clark:
I think that it's one of the most important relationships that a security team can have. From the beginning of security, HR has probably generally been a pretty close partner. Sometimes in the beginning, it was for the wrong reasons. It was, "I want to know about this employee's behavior," right? And they'd become a user of your web security gateway because they'd want to make sure employees are not doing bad things, they're doing their work, right? But that relationship has been built over time, starting there. Then it kind of merged into the, "Let's have a process around background checks, and making sure that people should have access, and what they should have access to, and how much do we trust them?" Now, as we kind of think about just the new world, of people working from everywhere, and this hybrid environment, and we talk about security from a culture standpoint, HR is... And this is where I see people having the strongest conversations. It is around culture. It is around how do we create a security culture? And the chief people officer generally is the custodian of that, right? The CEO sets the tone. The leadership team sets the tone. But HR are the real custodian, and they're also a good balance of like how far should we allow them to make a decision, or how far should we put the brakes on things and control? What's the process that we do when somebody isn't being a good digital citizen, kind of as you said, right? How do we manage that, and coach the security team on the most appropriate way not to necessarily go slap somebody's hand, right? But to maybe go work with leadership and give them coaching like, "Hey, next time, this is kind of how we should do this," you know? But what happens if they just say, "No. I'm just going to keep doing what I'm doing"? They need that guidance from HR, from a cultural standpoint, on what's the best way to kind of approach that. And I think again, just making HR part of the education process for security awareness, and as you start thinking about privacy, right? Again, you start bringing in legal, and I mentioned the CMO earlier. I mean, the security team has a hard job to do of marketing their program, internally, and inspiring people to want to be part of it, that marketing can help. So I'd say when I think about the top partners, other than the IT organization, it is the chief people officer and the chief marketing officer.
Mike Anderson: A única constante na vida é a mudança, mas o mais difícil é a mudança, certo? Como adaptamos as pessoas às mudanças? E quando colocamos... Palavras como superfície de ataque não significam nada para alguém da contabilidade ou para alguém que está na linha de frente de nossa organização, mas significa tudo quando pensamos sobre isso do ponto de vista de segurança. Então, acho que ajudar as pessoas a entender que a superfície de ataque explodiu com toda essa forma híbrida de trabalhar, certo? Portanto, temos que mudar a forma como interagimos, e isso tem que ser... A segurança tem que estar incorporada na cultura. Concordo com você. Ter marketing lá e fazer marketing em torno do gerenciamento de mudanças é uma ótima ideia. Acho que muitas pessoas podem, se não estiverem empregando isso, é algo que definitivamente deveriam fazer. Quero mudar para um tópico diferente aqui, certo? Eu sei que quando fizemos a primeira temporada do podcast Security Visionaries, falamos sobre a transformação da segurança, o manual, para onde está indo o mercado? Foram muitas conversas voltadas para o futuro, então agora quero avançar para 2030, certo? Enquanto pensamos em como as coisas vão evoluir... Você sabe, confiança zero é um grande tópico que temos hoje. Como isso afetará o futuro? A confiança zero ainda será um tema de que falaremos em 2030?
Jason Clark: Meu primeiro pensamento é que gostaria que fosse um nome melhor. Está bloqueado e está sendo incorporado à regulamentação e, quero dizer, está se tornando uma grande coisa. Embora não tenha um nome adequado, o conceito é perfeito. Não creio que todos entendam bem o conceito completo, então vou explicá-lo por um segundo, porque esta é a parte mais importante. Não é zero confiar em tudo. O oposto disso é a confiança total, e as pessoas pensam em um mundo como um liga-desliga, como se isso fosse binário. Se você entrar na minha casa, não significa que confio em você para fazer o que quiser dentro de casa, certo? Ainda tenho controles sobre “Não, você pode entrar na minha sala”, certo? Você não tira de repente tudo o que quer da minha geladeira. Existem controles e quanto acesso eu lhe dou? Então eu acho que você tem confiança zero, onde eu confio zero... Talvez eu não confie no seu dispositivo, mas ainda posso confiar em você como pessoa, certo? Como usuário, ou posso não confiar totalmente nesse aplicativo. Portanto, você não pode ir até lá. Mas há níveis de confiança, e eu vejo isso como uma escala de zero a cinco, sendo cinco total, confiança absoluta, porque você tem seis agentes diferentes e está sentado ao lado de... Eu uso a analogia de um médico. Você está sentado ao lado de um paciente moribundo em um dispositivo médico e precisa desse acesso em tempo real ali mesmo, você pode fazer o que precisar com esses dados, em vez de aquele médico atravessar a rua até um hospital concorrente, e o médico está ligado o iPad, e ainda precisa de acesso ao paciente, mas não consegue baixar, então é visualizar, editar online apenas as informações do paciente. E então aquele médico está em casa, e agora a mesma coisa, o mesmo cenário, só que sabemos que aquele dispositivo e aquela rede da casa do médico estão comprometidos. Há um bandido nisso, e então você adota a confiança zero, mas depois envolve esse bom cidadão digital e diz: "Isso é uma emergência? Se sim, aceitamos o risco. Você precisa olhar esses dados para ajudar esse paciente”, certo? É por isso que é um conceito brilhante, desde que as pessoas entendam que não está ligado-desligado e que precisa ser incorporado em toda a nossa arquitetura, em todos os nossos aplicativos, e não há confiança zero, que eu sou o empresa de confiança zero, certo? Essa é outra coisa com a qual precisamos ter cuidado. Realmente é uma arquitetura.
Mike Anderson: Quando ouvi pela primeira vez a confiança zero, pensei em orçamentos de base zero. Sempre temos orçamentos. Nós apenas os construímos do zero. Você começa do zero, mas vai construindo e se adaptando com base no que entende e no contexto, então acho que esse é um ótimo ponto. Você sabe, muitas vezes, estamos falando sobre o futuro. Ouvi muitas pessoas dizerem nos últimos anos e, especialmente durante a pandemia, você sempre ouvia as pessoas dizerem: “Minha bola de cristal está quebrada. Eu realmente não consigo ver o futuro. Não posso prever as coisas." À medida que avançamos para 2030, deveríamos conversar com líderes de TI e líderes de segurança, CISOs, CIOs, e dizer: em que uma ou duas coisas eles gostariam de ter investido mais hoje, que os teria preparado melhor para sucesso amanhã? O que seria aquilo?
Jason Clark: Eu começaria com as pessoas, número um. Quero dizer, todos nós temos um... Há uma lacuna de talentos e acho que essa lacuna está cada vez maior. Muito disso é porque as pessoas que fazem isso há tanto tempo quanto nós, Mike, provavelmente às vezes ficam presas na maneira como fazem as coisas e, há 25 anos, não sinto vontade de aprender algo novo. Gosto apenas de trabalhar nos servidores do meu data center e na infraestrutura de rede. E à medida que essas coisas vão embora, como estamos investindo no crescimento de novas pessoas, ou no crescimento dessas pessoas para a transição, para se tornarem mais pessoas de DevOps, e ajudá-las nesse caminho, e mostrar-lhes o porquê, por que isso é importante para seu futuro . Temos um enorme problema de falta de talentos em segurança e vejo todo mundo falando sobre isso. Há muitas crianças que se formam na faculdade com diplomas em segurança cibernética e que não conseguem um emprego em segurança cibernética, mas, ainda assim, somos milhões de pessoas, milhões de empregos abertos. Só na minha cidade, acho que aqui em St. Louis, há 3.000 vagas de segurança abertas no momento. Conheço cerca de seis ou sete crianças que acabaram de se formar e não conseguem emprego, porque todo mundo quer alguém que já seja qualificado e experiente. Então, acho que todo líder de TI precisa dizer: “Quer saber? Vamos contratar gente que acabou de sair da escola, seja ensino médio ou faculdade”, e também perceber que não precisa ser faculdade, né? “E vamos contratar pessoas inexperientes e com as qualidades certas, para que possamos crescer muito rapidamente.” Eu sinto que seria [inaudível 00:33:58] assumir o compromisso de fazer isso, e acho que para mim isso é uma grande coisa, é investir no futuro. Esse é o lado das pessoas. Em segundo lugar, do ponto de vista da segurança, precisamos de um cérebro. Não existe um cérebro de segurança. Nós meio que temos uma memória, que é um sim. Isso é depois do fato. O que temos é que temos todos esses sistemas díspares. Eu tenho uma solução para VPN, uma solução para tráfego da web, uma solução para minhas coisas na nuvem e uma solução para "Ah, é o tráfego FTP de telnet passando por um firewall". É apenas um usuário acessando um aplicativo, certo? Então, acho que aqueles que não perceberam que “preciso de um cérebro para minha solução de proteção de dados” será uma grande mudança no jogo para eles. Acho que muitas pessoas, aquelas que não fizeram isso até 2030, vão... Ficarão muito atrasadas e terão uma série de complicações com isso.
Mike Anderson: Adorei seu argumento, o primeiro, quando você estava falando sobre pessoas. Acredito firmemente na contratação de habilidades interpessoais. Quais são as habilidades interpessoais de que as pessoas precisam e quais são algumas das habilidades básicas de que precisam? Se você tiver a fome certa e as habilidades interpessoais certas, poderá ensinar qualquer coisa a essa pessoa, certo? E acho que é isso que muitas vezes ignoramos. A realidade é que essas pessoas não foram definidas em seus caminhos. Porque muitas vezes você pega alguém que tem 10 anos de experiência, ele só pensa em uma maneira de fazer as coisas, e muitas vezes é mais difícil mudar alguém para pensar diferente do que conseguir alguém que é uma argila nova e então molde-os da maneira que você deseja que sejam, com as habilidades de que precisam hoje. Então eu acho que isso é... A qualificação é definitivamente um tópico chave. Vou fazer algumas perguntas rápidas, depois quero que você nos dê as respostas e então encerraremos nossa sessão de hoje. Primeiro, qual foi o melhor conselho de liderança que você já recebeu?
Jason Clark: O que teve o impacto mais significativo para mim foi não ter medo de colocar seu trabalho em risco. Foi um acordo de fusões e aquisições na vida real, em que estávamos adquirindo uma organização muito grande, e a maneira como eles queriam que criássemos essa organização nos colocou em um risco significativo, e o chefe de fusões e aquisições basicamente disse: "Ei, estamos vou levar isso ao seu CEO. Ele não vai ficar feliz por você estar retardando esse negócio. Isso vai nos custar muito dinheiro." E eu fiquei um pouco nervoso, certo? E eu levei para o meu chefe, e ele disse: "Não. Você não está fazendo seu trabalho a menos que o coloque em risco. Não tenha medo de fazer isso."
Mike Anderson: Ótimo conselho. A seguir, qual seria sua última refeição?
Jason Clark: Eu gostaria de estar no Mediterrâneo, provavelmente com três coisas diferentes. O aperitivo seria uma sopa de gaspacho e uma massa incrível, picante e incrível com molho vermelho e, em terceiro lugar, algum tipo de frutos do mar incríveis do Mediterrâneo.
Mike Anderson: Parece incrível. Qual é a sua música favorita e o que isso me diz sobre você?
Jason Clark: São coisas com as quais cresci, que alimentam minha alma, que ouço, como ouvia quando criança. Seria Beatles, ou... Minha música favorita, provavelmente, é Grateful Dead, Friend of the Devil. O que isso diz a você? Não sei. Acho que provavelmente sou uma alma um pouco mais velha. Não sei.
Mike Anderson: Tudo bem, qual foi o último livro que você leu e qual foi o principal, ou o que você mais gostou nesse livro?
Jason Clark: O último livro que li foi The Gray Man. Eu gosto de coisas do tipo thriller militar.
Mike Anderson: Tudo bem, última pergunta. Quem você mais admira e por quê?
Jason Clark: Há tantas pessoas que admiro. Não sei se tenho uma pessoa que mais admiro. Provavelmente há pessoas ao longo da história, muitos dos nossos presidentes originais, certo? Ou Benjamin Franklin, etc. Mas vou lhe contar uma coisa, e isso é um pouco controverso para as pessoas, mas admiro o brilhantismo de Elon Musk. E embora haja muitas coisas aí que as pessoas talvez desafiassem ou discordassem, acho que a inovação que ele fez como uma pessoa, e como isso mudou nossas vidas, e continua a se concentrar em mudar nossas vidas, para uma pessoa fazer tanta inovação é... Quero dizer, é incrível.
Mike Anderson: Sim, ele definitivamente fez coisas incríveis. Então, Jason, isso tem sido incrível, e estou muito animado para ser o apresentador da segunda temporada e assumir o comando, e realmente agradeço por você ter lançado as bases para este podcast. Eu sei que tivemos muitos ouvintes no ano passado. Espero poder fazer justiça, tão bem quanto você fez no ano passado, e espero que tenhamos você de volta ao programa em breve, na segunda temporada, então, muito obrigado.
Jason Clark: Estou ansioso para ouvir todos eles, então vai ser divertido.
Mike Anderson: Obrigado por assistir ao episódio de hoje do podcast Security Visionaries com Jason Clark. Eu só quero deixar você com algumas lições. Você sabe, as três conclusões que tirei da minha conversa de hoje com Jason são: antes de mais nada, a segurança é um esporte de equipe e começa com os executivos. Temos que garantir o alinhamento, não apenas dentro do CIO e de sua organização, mas também no nível da equipe executiva. E isso também significa subir ao conselho. A segunda conclusão é que é fundamental que os CIOs e CISOs façam parceria com o seu líder de RH, porque têm de ajudar a incutir a segurança da confiança em toda a organização. Eles precisam ter certeza de que possuem os processos corretos em vigor, para garantir que, ao pensarmos na segurança como um esporte de equipe, ela esteja incorporada à fibra e à cultura da organização. A última conclusão é que os CIOs e CISOs deveriam investir em pessoas, porque as pessoas são o elo mais fraco quando se trata de segurança cibernética. Portanto, temos que ter certeza de que estamos capacitando nosso pessoal, dando-lhes o treinamento certo, e a última coisa que ouvi de Adam Grant é que temos que dizer às pessoas 22 vezes para que elas realmente retenham as coisas. Portanto, é importante investirmos em nosso pessoal e comunicar-lhes a importância da segurança. Espero que você tenha gostado do podcast de hoje com Jason Clark e fique ligado nos episódios posteriores.
Palestrante 3: O podcast Security Visionaries é desenvolvido pela equipe da Netskope. Rápida e fácil de usar, a plataforma Netskope oferece acesso otimizado e segurança de confiança zero para pessoas, dispositivos e dados, onde quer que estejam, ajudando os clientes a reduzir riscos, acelerar o desempenho e obter visibilidade incomparável de qualquer atividade na nuvem, na Web ou em aplicativos privados. . Para saber mais sobre como a Netskope ajuda os clientes a estarem prontos para qualquer coisa em sua jornada SASE, visite NETSKOPE.com.
Palestrante 2: Obrigado por ouvir os Visionários de Segurança. Reserve um momento para avaliar e comentar o programa e compartilhe-o com alguém que você conhece e que possa gostar dele. Fique ligado nos episódios que serão lançados a cada duas semanas e nos vemos no próximo.