Cloud security isn’t just a buzzword – it’s the backbone of modern enterprise resilience. Few understand this better than Ryan Kazanciyan, CIO & CISO at Wiz, one of the most innovative cybersecurity firms in history. With a career spanning Meta, Tanium, Mandiant, and even technical consulting for Mr. Robot, Kazanciyan has witnessed firsthand the transformation of IT environments.
In this exclusive interview, he breaks down the evolution of cloud security, the challenges businesses face, and what’s next for the industry.
The Shift from On-Prem to Cloud-Native Security
As you saw in the video above, legacy IT teams used to manage infrastructure end-to-end, relying on perimeter-based security. Once breached, attackers moved laterally with ease, driving major ransomware attacks.
Today, businesses are cloud-first; many key applications are Internet-hosted, accessible through the web, and reliant on Single Sign-On for authentication and access control. This shifts many key security controls to per-application, per-access – instead of relying solely on device or network-level management.. But many companies still operate in a hybrid state, mixing legacy on-prem systems with cloud-native technologies. The challenge is migrating efficiently and securely without disrupting business operations.
Cloud Security: Easier, Yet More Complex
Cloud services offer scalability, faster deployment, and a unified security framework. But the speed of development creates new risks: the ease with which developers can adopt and build on cloud services is both a boon and a challenge – it means security teams have to embrace a faster rate of change, and new forms of complexity.
SaaS vs. Cloud Security: What’s the Difference?
Beware of this common misconception: cloud security and SaaS security aren’t the same thing.
Cloud Security
Cloud security refers to developing and operating systems on public cloud infrastructure. In other words, it refers to building and running systems using cloud platforms like Amazon Web Services (AWS), Microsoft Azure, or Google Cloud (GCP).
These platforms offer many tools that let businesses store data, run applications, and manage networks without needing to own physical servers. They are often called infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS). Developers can choose how much control they want over their setup, depending on their needs.
SaaS Security
On the other hand, Software as a Service (SaaS) is when companies provide fully managed applications, like Google Workspace or Salesforce, which run on cloud infrastructure behind the scenes.
Shared Responsibility Models
The key difference is who handles security. With SaaS, customers mainly focus on managing user access and settings. With cloud security, businesses have a bigger role in securing their systems, including protecting their data, applications, and network configurations.
Where Wiz Fits In
Wiz was built to simplify cloud security for both developers and security teams. We eliminate complexity by offering a seamless deployment experience and a unified view across all cloud environments. We help organizations prioritize the risks that matter—finding ‘toxic combinations’ of misconfigurations and vulnerabilities that attackers could exploit.
This proactive approach extends to AI security. Within a year of Azure OpenAI and Amazon Sagemaker’s release, over 70% of organizations had adopted them. Wiz added ‘AI Security Posture Management’ to ensure customers could extend security guardrails to these emerging technologies.
Cloud Security Trends for 2025
There are three major risks that cyber insurance professionals and insureds should be aware of this year:
- Exposed cloud assets: Attackers exploit misconfigured, poorly-secured databases, buckets, and services left open to the internet, and may use the stolen data to extort victims.
- Cloud resource hijacking: Threat actors abuse insecure cloud services for cryptomining or to stage attacks against other organizations, racking up massive costs for victims.
- Credential-based attacks: Attackers steal passwords or access keys from past data breaches and use them to gain unauthorized access to cloud systems with high-level permissions.
To stay ahead, Wiz continuously tracks cloud threats through their Cloud Threat Database and publishes insights at blog.wiz.io.
Assessing Your Insureds’ Cloud Security
Start with these foundational areas:
Visibility:
- How do they maintain visibility and coverage over all of their cloud resources?
- If they’re single-cloud, do they have insight into all the technologies in use?
- If multi-cloud, do they have a unified or disparate approach that covers the other clouds in use?
Risk assessment:
- How do they identify risks across all of their cloud environments?
- Do they have coverage of each layer (configuration, code, runtime, data, identity) in each cloud, or are there gaps?
Security ownership:
- How effectively do they democratize security?
- Is security owned by a single team, or are developers and DevOps collaborating as part of the process?
Incident response agility:
- How agile are they when responding to cloud-based threats?
- Do they have a security operations function (in-house or outsourced) that is equipped to conduct detection, investigation, and remediation tasks in cloud environments?
Time to Rethink Cyber Insurance Questionnaires?
There are some tweaks that could be made to the cyber insurance proposal forms that would provide a better sense of an insured’s coverage and maturity. Here are some staring points:
- Cloud provider inventory: What platforms are in use and what business functions do they support?
- Security tooling: What technologies manage vulnerabilities, posture, and detection?
- Cloud security ownership: Who is responsible for security operations?
- Authentication practices: How are permissions managed, and where are just-in-time privileges used?
Final Thoughts
As businesses accelerate cloud adoption, security teams must adapt to evolving threats, new technologies, and the increasing speed of innovation. Wiz is at the forefront, helping organizations cut through complexity and stay ahead of attackers.