{"id":200828,"date":"2024-12-26T05:01:00","date_gmt":"2024-12-26T05:10:13","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/"},"modified":"2026-04-27T10:31:23","modified_gmt":"2026-04-27T14:31:23","slug":"ep-68-cloud-security-collaboration-and-futuring-in-the-now","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/es\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/","title":{"rendered":"EP 68 &#8211; Cloud Security, Collaboration and Futuring in the Now"},"content":{"rendered":"<p>In this episode, Trust Issues host David Puner wraps up 2024 with a conversation with Red Hat\u2019s Field CTO Ambassador E.G. Nadhan about the future of cybersecurity. They discuss the importance of cloud security principles, the impact of emerging technologies like AI and quantum computing, and the challenges of managing machine identities. Nadhan emphasizes the need for organizations to prepare for future security challenges by understanding the attacker mindset and taking proactive steps today to protect for tomorrow. The conversation also touches on collaboration within the open source community and the role of Red Hat&#8217;s Field CTO organization in driving innovation and addressing market opportunities.<\/p>\n<div class=\"transcript\" style=\"white-space:pre-line\">[00:00:00] David Puner: You&#8217;re listening to the Trust Issues Podcast. I&#8217;m David Puner, a Senior Editorial Manager at CyberArk, the global leader in identity security. Whether you&#8217;re listening to this episode at the tail end of 2024 or in 2025 or beyond, the future is always now.<\/p>\n<p>Today&#8217;s show, our final release of 2024, is a fitting cap to the year in that it&#8217;s got some reflections, but it&#8217;s more focused on the importance of staying ahead of the curve and preparing for future cyber challenges together\u2014being cyber ready for whatever the future may deliver. Because years end, but reality does not. It evolves and morphs at varying haphazard speeds.<\/p>\n<p>Our guest today is Red Hat&#8217;s Field CTO Ambassador, E.G. Nadhan. Or, for those of you into the whole brevity thing, Nadhan, as he prefers it. In our conversation, Nadhan talks about the importance of cloud security principles, the impact of emerging technologies like AI and quantum computing, and the challenges of managing machine identities. He also discusses collaboration within the open source community and the need for organizations to prepare for future security challenges by understanding the attacker mindset and taking proactive steps today to protect for tomorrow, rather than waiting until after a breach happens.<\/p>\n<p>Thanks for spending time with us in 2024. We wish you a happy new year and a great now. Here&#8217;s my conversation with Nadhan.<\/p>\n<p>[00:02:00] David Puner: Nadhan, Field CTO Ambassador with Red Hat. Welcome to Trust Issues. Thanks so much for coming on to the podcast.<\/p>\n<p>[00:02:06] E.G. Nadhan: Great to be here, Dave. Honored to be here.<\/p>\n<p>[00:02:10] David Puner: Excellent. Well, thank you so much. I know the holidays are coming up. We&#8217;re getting toward the end of 2024. So, to start things out, what is the Field CTO organization at Red Hat, and what does your role as the Field CTO Ambassador entail?<\/p>\n<p>[00:02:30] E.G. Nadhan: Well, let me start by wishing a great new year to everyone. And, in that vein, the Field CTO organization\u2014like any other software firm, in fact, many other firms\u2014I would say we have the sales organization and then the engineering organization: global engineering, working with the product teams. So, building and evolving products, and then selling them, making the case for them. Two fundamental notions ever since the first lemonade stand, let\u2019s say.<\/p>\n<p>The Field CTO organization is really at that intersection. We have Field CTOs, technology strategists, and chief architects. We strategically engage globally\u2014we\u2019re a global team\u2014with customers to identify market opportunities. So, it\u2019s not just about making the case for the products on the truck, but also about identifying what markets we\u2019re not addressing, what opportunities are out there. Then, our architects and strategists work with customers to put repeatable solutions together to address those areas.<\/p>\n<p>At the same time, by meeting with customers and partners, we learn what\u2019s missing and how our portfolio of products and services should be augmented. What is the white space? So, it\u2019s an exciting intersection because we get to look ahead\u2014not just at the products on the truck but also at what\u2019s coming around the corner, what technology should be coming around the corner, and how we can be the catalyst for customers to apply it while continuing to work with our engineering and product teams to evolve what is eventually sold. That\u2019s the Field CTO organization, Dave.<\/p>\n<p>[00:04:00] David Puner: Really interesting, and thank you for that. I should note you are U.S.-based, correct? Where are you located?<\/p>\n<p>[00:04:10] E.G. Nadhan: I\u2019m based out of Chicago, but like I said earlier, our team is global.<\/p>\n<p>[00:04:15] David Puner: Okay. So, you\u2019ve been with Red Hat for a little over nine years at this point. How has your role at Red Hat, and what you do at Red Hat, evolved in those nine years?<\/p>\n<p>[00:04:30] E.G. Nadhan: Great question. Around this time of year, you tend to look back and see how we got to where we are, and then look ahead to the year ahead. So, it\u2019s a well-timed question. I joined Red Hat nine years ago, as you said. I started in sales as the Chief Technology Strategist for the central region. Account teams tend to focus on selling software or widgets\u2014making the case for what\u2019s available today. But my role was more strategic: to understand what the customer is looking for, what outcomes they\u2019re targeting, and how Red Hat could partner in their journey.<\/p>\n<p>That role grew from covering the central region, essentially the central time zone, to covering all of North America. I became the Chief Architect and Strategist for North America. That evolved into a global role where I became the role leader for the Chief Architect position at Red Hat, focusing on synthesizing and collaborating on strategies globally.<\/p>\n<p>A couple of years ago, the Field CTO role was introduced, acting as an extension of the CTO role at Red Hat. Field CTOs have geographical coverage, extending and localizing the CTO&#8217;s message for their regions. Chief Architects moved into the Field CTO organization under global engineering, and my current role as Field CTO Ambassador was born. It\u2019s about amplifying messaging, fostering dialogue with industry leaders and decision-makers, and co-engineering innovative solutions with customers and partners.<\/p>\n<p>The role is new, just a couple of months old. Talk to me a year from now, and I\u2019ll have more to share about what\u2019s been accomplished!<\/p>\n<p>[00:08:00] David Puner: So, this is somewhat theater of the mind for our audience, most of whom are consuming this episode in audio. But you are, in fact, wearing a red fedora, signifying Red Hat. When were you given that hat? Was it when you became the Field CTO Ambassador, or how did that come about?<\/p>\n<p>[00:08:20] E.G. Nadhan: Good question! I should probably ask my leader for a hat proclaiming the Field CTO Ambassador role\u2014point noted! This fedora, though, is something I take great pride in. I got it during my new hire orientation. Only Red Hat employees receive this particular hat, and it\u2019s distinct from replicas given out at conferences.<\/p>\n<p>During COVID, I started wearing it at home as a signal to my family that I was working and \u201coff limits.\u201d It also became a handy visual on Zoom calls\u2014no need to introduce who I work for; it\u2019s blatantly obvious, and I wear it with pride.<\/p>\n<p>[00:09:00] David Puner: So, with the hat comes efficiency as well. I like it.<\/p>\n<p>[00:09:05] E.G. Nadhan: Yes, I would say more the mindset, as in what does being a Red Hatter mean? It\u2019s not just about open source\u2014it\u2019s about collaboration, innovation, open culture, and sharing. All of those things come together when you\u2019re a Red Hatter.<\/p>\n<p>[00:09:20] David Puner: How did you come to be focused on cloud security and emerging technologies like AI and quantum computing?<\/p>\n<p>[00:09:30] E.G. Nadhan: When I was in sales, the focus was more on what customers could do with the products available today\u2014support, certifications, and services around those products. But the open source community is always experimenting. At Red Hat, we\u2019re the largest enterprise software company using an open source development model. We don\u2019t even have a traditional R&amp;D lab. The open source ecosystem itself is our R&amp;D lab, running 24\/7.<br \/>\n[00:12:00] E.G. Nadhan: The open source ecosystem is pretty much our R&amp;D lab. By that, I mean, we have paid Red Hat employees who are contributors and leads in the open source community. But we collaborate with our partners, our competitors, and contributors. It&#8217;s a community where participants do what they want to do, not just what they have to do.<\/p>\n<p>In addition to passion, there\u2019s co-engineering and co-innovation that happens. Some projects see the light of day, and some don\u2019t. Our model is to bring the ones gaining traction to the forefront and productize them. We give them lifecycle management, a roadmap, and stand behind them. That\u2019s what makes it to our platform.<\/p>\n<p>Because of that pipeline, roles like Chief Architects and Field CTOs require us to stay ahead of the game and look toward what\u2019s coming next. When the curious customer poses the question, \u00abThis is great, but what will we see in two years? Not just from the product, but what technologies do we see emerging?\u00bb we need to be ready. That\u2019s why we strive to stay ahead of the curve and, in some cases, drive what should come next, taking the lead.<\/p>\n<p>As we were absorbed into global engineering and the Field CTO organization, staying ahead of the curve became par for the course during the workday. That\u2019s how I got into emerging technologies overall. We also have a peer team focused exclusively on experimentation with different open source projects, and we are very closely tied to them.<\/p>\n<p>You asked specifically about AI and quantum computing. Who isn\u2019t into AI, you know, in some shape or form?<\/p>\n<p>[00:13:00] David Puner: Fair point.<\/p>\n<p>[00:13:02] E.G. Nadhan: Yes. That\u2019s just being part of the digital world we live in. The question wasn\u2019t whether we should be part of it, but rather, \u00abWhat is our role? What\u2019s our value-add? How can we help with the massive shift the industry is experiencing with AI?\u00bb<\/p>\n<p>My foray into quantum computing is very different. Red Hat is part of IBM as a wholly owned subsidiary, but we retain our independence, which I say with great pride. When we were acquired, people asked if we\u2019d be \u00abblue washed\u00bb or start wearing purple hats. None of that happened, even symbolically.<\/p>\n<p>IBM reached out to some Red Hatters, including me, to go through their training and certification program to become IBM Quantum Ambassadors. I\u2019m now one of those ambassadors, and I initiate conversations with customers and prospects who want to explore what\u2019s possible with quantum computing. I also lead the IBM Quantum Ambassadors in the central region as a Quantum Senior Ambassador.<\/p>\n<p>[00:14:00] David Puner: Is there some sort of formal training you need to go through to be a Quantum Ambassador?<\/p>\n<p>[00:14:05] E.G. Nadhan: Yes, there\u2019s training, an interview process, and ongoing engagements to maintain the certification. It\u2019s a continuous evolution and certification process.<\/p>\n<p>[00:14:15] David Puner: I do want to get back to quantum computing a little bit later, but first, what are the fundamental principles of security that organizations should adhere to regardless of whether they are operating in the cloud, on-prem, or hybrid environments?<\/p>\n<p>[00:14:30] E.G. Nadhan: I remember when we started talking about the cloud, just like we\u2019ve been talking about AI recently. The question back then was, \u00abCan you really be secure in the cloud? Are you taking on additional risks?\u00bb There were multiple schools of thought.<\/p>\n<p>The position I took was this: if you are secure as an enterprise, if you enforce and adhere to security standards and fundamental principles with proper governance, you will be secure no matter where you are.<\/p>\n<p>[00:15:00] David Puner: What are the key elements that constitute a strong security foundation for organizations moving to the cloud?<\/p>\n<p>[00:15:05] E.G. Nadhan: Absolutely. First, being secure by design is critical. Security cannot be an afterthought or a box to check at the end of the architecture process. It must be integrated into the design process.<\/p>\n<p>For example, having a default password of \u00ab1234\u00bb is not secure. When end-users install software, they often click through custom settings to start using the software quickly. This makes it essential to be highly sensitive to default configurations.<\/p>\n<p>Another element is separation of duties. There should never be a single person with full control or access. If that individual turns malicious, they could cause significant harm. Spreading responsibility across multiple people or systems mitigates this risk.<\/p>\n<p>Privilege management is another key factor. Giving everyone root or superuser access may seem easier, but it\u2019s incredibly risky. Users should have access only to the resources necessary for their tasks.<\/p>\n<p>Transparency is also vital. The open source principle of transparency should extend to security\u2014applied to data, designs, and algorithms.<\/p>\n<p>Finally, understanding the threat is essential. Security is like a game of chess. You need to think ahead and anticipate what could go wrong. This includes adopting the attacker mindset and considering, \u00abWhat would a hacker or bad actor do?\u00bb Attackers collaborate effectively, and we must mimic their strategies to stay ahead.<\/p>\n<p>[00:17:00] David Puner: Right. So, you\u2019re talking about the attacker mindset and getting into it.<\/p>\n<p>[00:18:00] E.G. Nadhan: Yes, exactly. Exactly. And then, usually, there\u2019s a lot spoken about defense in depth. I would say, I will mention that, but you\u2019re not secured just because you have defense in depth. You need to do everything else because all the layers of that said depth can be effectively penetrated as well.<\/p>\n<p>[00:18:30] David Puner: So then, those are the elements. How can organizations ensure that they have the right practices and governance in place to maintain security in the cloud?<\/p>\n<p>[00:18:40] E.G. Nadhan: First off, there needs to be collaboration. If there is shadow IT, then the IT organization overall\u2014from the CIO down\u2014should be respectful of how that came about. Instead of leaving them alone or not allowing them to bring their initiatives into the fold, ask: \u00abWhat is missing? Why did you have to create this? How can we do this better at an enterprise level?\u00bb<\/p>\n<p>Because the moment you become an enterprise with multiple units, different teams, different business units, and different projects doing their own thing, you are exposing yourself to vulnerabilities. Instead, governance should respect those efforts but bring everybody into the fold.<\/p>\n<p>\u00abOkay, we are all part of the same enterprise. There is a main door, but there are multiple entry points\u2014the patio doors, the roof, the ceiling, and so on. Let us collaborate on how to secure all these potential entry points. Let\u2019s collaborate on tracking what kinds of intrusions are happening.\u00bb<\/p>\n<p>We may have our own needs for functionality, business outcomes, and security in different domains, but it should be aligned at an enterprise level. Starting early, rather than making security an afterthought, is critical.<\/p>\n<p>[00:20:00] David Puner: Red Hat, as you\u2019ve mentioned, is known for its open source development model. In the context of open source, what are the key steps for organizations to establish a trusted software supply chain? What role do DevSecOps practices play, and what best practices do you recommend for managing, automating, and securing hybrid cloud environments?<\/p>\n<p>[00:20:30] E.G. Nadhan: There\u2019s a cycle from a software supply chain standpoint. In our case, it starts upstream, with the open source community and community leadership. When there are packages\u2014whatever tool is being used, whether it\u2019s Bugzilla, Jira, or others\u2014we ensure the package is reviewed and tracked for early release and inclusion into Red Hat Enterprise Linux.<\/p>\n<p>Next comes security scanning of what is actually going out. This includes using compiler flags set for hardening and security, followed by extensive quality engineering testing per release. We also ensure that all packages are digitally signed before distribution, with continuous security updates.<\/p>\n<p>Each step is essential to ensure not only a secure supply chain but also preparedness for any necessary mitigation efforts should something go wrong.<\/p>\n<p>In addition, from a Field CTO organization standpoint, we emphasize validated patterns. Let me explain what that means.<\/p>\n<p>There\u2019s an overused term: reference architectures. It\u2019s often vague\u2014\u00bbWe need a reference architecture for this use case.\u00bb What does that mean? We prefer the term portfolio architectures. We start by identifying the portfolio of capabilities needed for a given use case. Then we determine the technologies that enable those capabilities.<\/p>\n<p>Let\u2019s say we have 20 to 25 architectures. We analyze these to identify common patterns across multiple architectures. Those patterns are then brought to life using Red Hat and partner technologies. This includes architecture as code and single-click deployment of said patterns.<\/p>\n<p>[00:22:00] The key is validating these patterns. When there are new product releases\u2014whether from us or our partners\u2014we ensure that the integration of all the capabilities with different products continues to work. These patterns go through quality engineering to maintain their integrity.<\/p>\n<p>The reason this matters is that enterprises often expose themselves during product upgrades or version changes, especially when these span firewalls. Hackers look for weak links like these. So, it\u2019s not enough to secure a single product. The overall pattern\u2014the integrated solution that enables the capabilities\u2014needs to be secure.<\/p>\n<p>[00:23:00] David Puner: So then, how can organizations balance the need for security with the need for agility in hybrid cloud environments?<br \/>\n[00:24:00] E.G. Nadhan: The idea, again, is to make sure that it&#8217;s not taken for granted. In the cloud, when you are deploying containers, image scanning is something very basic that needs to be done. You want to make sure that you have open platforms, and whenever there is a new workload being deployed, ensure there is proper scanning.<\/p>\n<p>There\u2019s this notion that because it\u2019s a container, it\u2019s like a fire chest\u2014nothing can penetrate it. That\u2019s completely untrue. You cannot trust what is in the container, so you have to go through image scanning. Absolutely. That is one step. Then there\u2019s certification, as I mentioned earlier, and software signing, which absolutely needs to be done for each deployment.<\/p>\n<p>Looking at it holistically, it\u2019s not just about securing a single workload but ensuring the combination of capabilities being deployed continues to work securely through quality engineering.<\/p>\n<p>We also live in a world where it\u2019s not \u00abone cloud fits all.\u00bb There are multiple cloud environments\u2014it could be a virtualization environment in the data center, or it could be the edge. Just because a workload is secure in one environment, with one cloud provider, doesn\u2019t mean it\u2019s secure in another. You must ensure that the workload you\u2019re responsible for is secure wherever it is deployed.<\/p>\n<p>Let me use a metaphor. When we make a left turn in the United States, if there\u2019s a car ahead of us and we see that driver turned left because of the green arrow, that doesn\u2019t necessarily mean you have the green signal to follow. The environment is different. Time changes things. Just because something is secure in one environment doesn\u2019t mean it\u2019s secure in another. You need to go through the certification and validation needed for wherever the workload is being deployed.<\/p>\n<p>[00:25:00] David Puner: So then, shifting over to machine identities, what are some of the challenges and solutions related to managing machine identities in the context of AI?<\/p>\n<p>[00:25:10] E.G. Nadhan: Before I get to AI, let\u2019s talk about secrets management. It always helps to have a single system of record with enterprise-grade software that can be relied upon. This is critical because credential management can become a vulnerability. Even for human identities, you need a reliable platform for identity management overall.<\/p>\n<p>Enterprises often focus on human identities because bad actors are usually associated with disgruntled employees or someone making a mistake. \u00abTo err is human,\u00bb as they say. But when it comes to machine identities, you need to start by asking: What constitutes a machine?<\/p>\n<p>It could be an algorithm. It could be an API. It could be an edge device. It could even be a pacemaker in the medical field or a camera in a retail store. These are all examples of what we consider \u00abmachines.\u00bb And very quickly, the scale adds up. A rough metric I\u2019ve heard is that for every human, there are at least 45 corresponding machine actors.<\/p>\n<p>[00:27:00] That means we\u2019re talking about significant scale. Just because you have a solution for secrets management and a single source of truth for human identities doesn\u2019t mean it will automatically scale to accommodate machine identities. That\u2019s the challenge.<\/p>\n<p>This is where the right software providers come in\u2014ones that can address both human and machine identities at scale. Standardization and automation are essential, especially given the volume and proliferation of machine identities. For every one human identity, you need to be able to manage 45 machine identities with the same level of security and oversight.<\/p>\n<p>[00:28:00] David Puner: As promised, I wanted to shift back to quantum computing, particularly because you\u2019re an IBM Quantum Senior Ambassador, as you mentioned earlier. Quantum computing is fascinating, fast-moving, and has the potential to change everything. So, at this point in time, how should organizations prepare for the security challenges posed by quantum computing?<\/p>\n<p>[00:28:30] E.G. Nadhan: From a security standpoint, cryptography is what comes to mind.<\/p>\n<p>[00:28:35] David Puner: And when you say cryptography, you mean the practice of securing information by transforming it into a format that only authorized parties can understand?<\/p>\n<p>[00:28:45] E.G. Nadhan: Yes. That being said, the way you framed it is very interesting. Let me start by saying that everything we do on a computer for good reasons uses cryptography. This is why even bad actors\u2014especially beginners\u2014cannot read emails, access medical records, or post from social media accounts. That\u2019s where cryptography plays a crucial role.<\/p>\n<p>[00:29:00] David Puner: So it boils down basically to secure transmission or storage, right?<br \/>\n[00:30:00] E.G. Nadhan: Yes, absolutely. And the fact is, cryptography today is so good that when a secure data or systems breach occurs, it\u2019s not usually because the encryption key or algorithm was broken. It\u2019s not as if attackers suddenly gain access and visibility to data that seemed like gobbledygook and suddenly it makes sense in plain English.<\/p>\n<p>That\u2019s not usually the reason why breaches happen. Breaches typically occur because someone used a weak password like \u00ab1234,\u00bb didn\u2019t follow the rules to implement robust security practices like two-factor authentication, or made a human error. For example, someone might have a great password, but it\u2019s written on a Post-it note stuck to their laptop. That\u2019s how breaches happen.<\/p>\n<p>Modern encryption methods\u2014like 2048-bit public keys\u2014are like the sturdiest walls we\u2019ve had for many years. But quantum computing can do things that classical computing cannot even fathom. It opens up a whole new domain of problems, both good and bad. Like any new technology, it can be used by both good actors and bad actors. If quantum computing falls into the wrong hands, it could be used to decrypt what is encrypted today.<\/p>\n<p>[00:31:00] Suddenly, what seemed impossible could become possible if quantum computing is applied for the wrong reasons. A term that is loosely used to describe this risk is Y2Q.<\/p>\n<p>[00:31:10] David Puner: Y2Q. I remember Y2K, but I\u2019m not familiar with Y2Q. What is that?<\/p>\n<p>[00:31:15] E.G. Nadhan: It\u2019s a term we use at IBM. The question often comes up: \u00abWhen is this going to happen?\u00bb I wish I could give you a precise answer, like predicting the landfall of a thunderstorm, or the exact timing of Y2K\u2014December 31st at midnight. But we can\u2019t say the same for Y2Q.<\/p>\n<p>It will happen. There are predictions\u2014some say a few years out\u2014but the point is that we need to act on it today. Like they say, \u00abLive today as if it\u2019s your last day on Earth.\u00bb Enterprises need to prepare as though Y2Q could happen tomorrow. What if it does? Are we ready?<\/p>\n<p>That\u2019s where enterprises must take steps today to protect themselves. It\u2019s not about using quantum computing just yet, but about ensuring that their classical assets\u2014data, systems, and so on\u2014are quantum-safe. Essentially, it\u2019s about rebuilding the cryptographic vault to make it secure against both quantum and classical attacks.<\/p>\n<p>The worst-case scenario is realizing this need the day after Y2Q\u2014that\u2019s too late. Enterprises should act now. IBM offers services to help enterprises become quantum-safe. At a fundamental level, this involves rebuilding the cryptographic vault and ensuring it\u2019s secure against quantum and classical attacks.<\/p>\n<p>[00:33:00] The good news is that there are concrete steps enterprises can take today. It\u2019s not a matter of figuring out what to do; the steps are already available.<\/p>\n<p>[00:33:10] David Puner: If you were a betting man\u2014and I\u2019m not sure if you are\u2014I see you smiling, so maybe you are\u2014when would you predict quantum computing will be accessible to the masses?<\/p>\n<p>[00:33:20] E.G. Nadhan: I can\u2019t give you a specific year, but I can definitely see it happening in this century, possibly even before 2050.<\/p>\n<p>[00:33:30] David Puner: Okay. Then we\u2019ll have you back in a year to see if your prediction changes. When quantum computing finally arrives, will it bring about a shift similar to what we\u2019ve seen with AI, or will it be an even bigger change?<\/p>\n<p>[00:33:50] E.G. Nadhan: First, it could happen anytime before 2050. I only put that date out there as a marker of how far off it could be. Where quantum computing is today, there\u2019s a lot of research and experimentation happening. Quantum computing is based on probability, unlike classical computing.<\/p>\n<p>In classical computing, a bit is either 0 or 1\u2014like heads or tails on a coin. But in quantum computing, when you toss the coin, depending on how high it\u2019s tossed, there could be 100 different states the coin could be in. The probability of the coin being in a particular state is the type of metric quantum computing uses.<\/p>\n<p>[00:35:00] Because of this, a quantum bit, or qubit, can store exponentially more information than a classical bit, which has only two states. This opens up incredible possibilities but also introduces challenges like error correction. There\u2019s experimentation happening, and success in some areas, while others still require further exploration. There\u2019s tremendous curiosity and promise surrounding quantum computing.<\/p>\n<p>As for AI, tools like ChatGPT have made AI ubiquitous. My mom, for example, recently asked me about ChatGPT\u2014which I didn\u2019t expect! AI has penetrated so far that almost everyone is aware of it or using it.<\/p>\n<p>Quantum computing is not there yet. The implementation behind the scenes isn\u2019t as easily accessible. For example, asking a quantum computer to solve a complicated math problem isn\u2019t as straightforward as using AI to draft an email. Quantum computing\u2019s adoption will likely start at an enterprise level, where businesses gain competitive advantages through new models and products.<\/p>\n<p>[00:37:00] However, end-users probably won\u2019t directly use quantum computing to do everyday things like buying milk. Instead, enterprises will leverage quantum computing to differentiate their services, which could eventually benefit end-users indirectly.<\/p>\n<p>[00:38:00] David Puner: So then, looking into 2025 and going into the new year, what trends or topics are top of mind for you?<\/p>\n<p>[00:38:10] E.G. Nadhan: I would say being safe with AI is going to be a major focus, especially given the discussions around AI, what it\u2019s yielding, and the type of information it\u2019s providing. The need for open source AI is going to be felt more and more. It\u2019s not just about the models\u2014you\u2019re kind of held hostage to the type of data served by the models if it\u2019s proprietary.<\/p>\n<p>By going open source, you can be more cognizant of what data is available, ensure the use of the right data, and enable transparency across the models. Open source fosters transparency by providing accessible models and data to promote accountability, as well as ethical and fair AI innovation without dominance by a few entities. These are all things that come to mind when I think about AI safety. That\u2019s one area.<\/p>\n<p>The other is compliance. How much risk are enterprises willing to take? Security, compliance, and overall enterprise risk management are deeply interconnected. I can see regulations for AI coming through, if they haven\u2019t already. The EU has already started working on some frameworks. Companies need to be more cognizant of what types of regulatory frameworks they need to adhere to from an AI perspective and take the appropriate steps.<\/p>\n<p>[00:39:00] I would also double down on machine identities again, especially with the rise of AI. AI models can function as logical machines, if you will. When I mentioned devices, APIs, algorithms, and so on, AI models fit within that scope. We need to ensure we\u2019re clear on what the model is doing, what outcomes it\u2019s producing, and what actions or insights are coming from it. Machine identities will play a critical role in this space as well.<\/p>\n<p>Those are the three key areas that come to mind for 2025: AI safety, compliance, and machine identities.<\/p>\n<p>[00:40:00] David Puner: Thanks, Nadhan. I know you\u2019re active on LinkedIn, putting out a lot of what we call in the business \u00abthought leadership.\u00bb If folks want to catch more of your insights, they can check you out there. Is there anything else people should know? Where can they find you?<\/p>\n<p>[00:40:15] E.G. Nadhan: LinkedIn is a good start. I have multiple thought leadership avenues, but following me on LinkedIn would be a great way to begin.<\/p>\n<p>[00:40:25] David Puner: All right. Well, Nadhan, Field CTO Ambassador at Red Hat, thank you so much for coming on the podcast. I really appreciate it, and Happy New Year.<\/p>\n<p>[00:40:35] E.G. Nadhan: Happy New Year to you as well. The honor is mine.<\/p>\n<p>[00:40:40] David Puner: Thanks for listening to Trust Issues. If you liked this episode, please check out our back catalog for more conversations with cyber defenders and protectors. And don\u2019t miss new episodes\u2014make sure you\u2019re following us wherever you get your podcasts.<\/p>\n<p>[00:41:00] Oh yeah, drop us a line if you feel so inclined\u2014questions, comments, suggestions (which, come to think of it, are kind of like comments). Our email address is trustissues, all one word, at cyberark.com. See you next time.<\/p><\/div>\n","protected":false},"featured_media":213873,"template":"","class_list":["post-200828","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 68 - Cloud Security, Collaboration and Futuring in the Now | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 68 - Cloud Security, Collaboration and Futuring in the Now\" \/>\n<meta property=\"og:description\" content=\"In this episode, Trust Issues host David Puner wraps up 2024 with a conversation with Red Hat\u2019s Field CTO Ambassador E.G. Nadhan about the future of cybersecurity. They discuss the importance of cloud security principles,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T14:31:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"26 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/\",\"url\":\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/\",\"name\":\"EP 68 - Cloud Security, Collaboration and Futuring in the Now | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg\",\"datePublished\":\"2024-12-26T05:10:13+00:00\",\"dateModified\":\"2026-04-27T14:31:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 68 &#8211; Cloud Security, Collaboration and Futuring in the Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 68 - Cloud Security, Collaboration and Futuring in the Now | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/","og_locale":"es_ES","og_type":"article","og_title":"EP 68 - Cloud Security, Collaboration and Futuring in the Now","og_description":"In this episode, Trust Issues host David Puner wraps up 2024 with a conversation with Red Hat\u2019s Field CTO Ambassador E.G. Nadhan about the future of cybersecurity. They discuss the importance of cloud security principles,...","og_url":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-27T14:31:23+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"26 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/","url":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/","name":"EP 68 - Cloud Security, Collaboration and Futuring in the Now | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg","datePublished":"2024-12-26T05:10:13+00:00","dateModified":"2026-04-27T14:31:23+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/12\/NGUxMi5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-68-cloud-security-collaboration-and-futuring-in-the-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"EP 68 &#8211; Cloud Security, Collaboration and Futuring in the Now"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/podcast\/200828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media\/213873"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=200828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}