Cloud Security , Digital Identity , Events

Despite Fervor for the Cloud, Here's Why Hybrid Is Forever

Richard Bird on Cloud and Hybrid Realities, Control Domains and Managing Identity
Richard Bird, chief product officer, SecZetta

Cloud has a dirty little secret: While most say moving to cloud is inevitable, not everything today can or even should run in the cloud, says SecZetta's Richard Bird. He explains why hybrid approaches are here to stay and how security teams must respond, especially when it comes to identity.

See Also: Webinar | Identity Crisis: How to Combat Session Hijacking and Credential Theft with MDR

In a video interview with Information Security Media Group at RSA Conference 2022, Bird discusses:

  • Why hybrid approaches will continue indefinitely;
  • Why identity is the only control domain that doesn't use security language;
  • Advice for managing identity, given the ongoing hybrid reality.

A globally recognized personality in data privacy and identity-centric security, Bird is building a unique approach to solving the problem of all other identities - AoID - in the digital world. A former CIO, CISO and chief customer information officer, he is one of the few identity experts to have served as a practitioner, adviser and solution provider.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.