Cloud Security , Next-Generation Technologies & Secure Development , Security Operations

How to Achieve Cloud Security and Visibility Through Threat Detection

Cloud Security and Visibility Through Threat Detection: Threat Stack Case Study Featuring Russell Shupert of Veeva Systems
Russell Shupert, senior director of security engineering, Veeva Systems

The core challenges of securing apps and infrastructure in the cloud go beyond just detecting known threats. Cloud security also requires comprehensive data on all vulnerabilities, the ability to remove systems with high privileges and - more than ever - the ability to review third-party software.

Russell Shupert of Veeva Systems explains the challenges faced in securing a complex environment. He discusses how his team overcame these challenges, the benefits they achieved and how Threat Stack's Cloud Workload Protection and Application Infrastructure Protection tool helped along the way.

In this video interview with Information Security Media Group, Shupert discusses:

  • The key functionalities needed to achieve visibility in the cloud;
  • How a single tool delivers API threat detection, infrastructure protection, compliance in the cloud and more;
  • Why Veeva partnered with Threat Stack as its core cloud security tool.

Shupert is responsible for the holistic security and compliance of Veeva's product application platforms, SaaS security tools, secure architecture, code scanning, DevSecOps, offensive security and system testing. He has more than 25 years of experience leading global teams focused on network security, cloud security, compliance, audit, threat management and creating new teams based on emerging technology or threats. Shupert has served in multiple leadership positions spanning a wide range of industries including global technology, utilities, manufacturing, aerospace, finance and defense. He served for eight years in the United States Air Force before entering the civilian workforce.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.