By Thyaga Vasudevan - Executive Vice President, Product
April 3, 2025 4 Minute Read
Over the past few weeks, I’ve had the opportunity to meet with CISOs and CIOs from Fortune 100 companies and highly regulated industries across the globe — Healthcare, Financial Services, and Public Sector. These organizations sit at the heart of our global economy and public infrastructure so, if you want to understand where cybersecurity is headed, listening to these leaders is a great place to start.
There were three recurring themes in every conversation:
Let me break each one down—and share what I believe it signals about where the puck is headed.
Despite predictions of cloud-only environments, the real world is hybrid—and it will be for the foreseeable future. Every customer I spoke with has a complex footprint: some workloads in the cloud, some in private data centers, some still running on legacy infrastructure. They’re modernizing—but with discipline.
Why it matters:
Security teams aren’t just managing cloud risks anymore; they’re navigating a complex maze of data movement across environments. That complexity creates blind spots, inconsistencies in policy enforcement, and challenges in achieving unified visibility.
Where the puck is headed:
The winning approach won’t be “cloud-only” or “on-prem forever.” It will be intelligent security that is location-agnostic. Solutions that can seamlessly extend controls, context, and visibility across hybrid infrastructures—without adding operational overhead—are quickly becoming non-negotiable.
We’re witnessing a shift in security focus—from protecting infrastructure to protecting data. And it’s not just about encryption or DLP anymore. CISOs are asking:
Enter Data Security Posture Management (DSPM).
Why it matters:
As data sprawls across SaaS, IaaS, and PaaS, the traditional “set-it-and-forget-it” controls don’t cut it. DSPM gives security teams the visibility, context, and automation they need to understand and manage data risk proactively.
Where the puck is headed:
DSPM isn’t just another tool—it’s becoming a foundational layer in the security stack. One that integrates with cloud security, identity, and analytics to give organizations a real-time view of their data risk surface.
AI isn’t coming—it’s already embedded into the enterprise. Every team, from marketing to engineering, is experimenting with generative AI tools. And with that comes a new category of risk: agentic applications that can mimic human behavior, make decisions, and move data.
What CISOs told me:
They’re less concerned about model accuracy and more worried about data exposure, malicious prompts, and lack of guardrails. And they’re asking urgently:
Why it matters:
AI is not just a new workload—it’s a new actor. One that moves fast, doesn’t sleep, and can be misused at scale.
Where the puck is headed:
Security for AI will evolve from point-in-time policies to continuous trust evaluation. This includes real-time visibility into what AI tools are accessing, behavioral analysis, and strict enforcement of who—and what—gets to see sensitive data.
The concept of Zero Trust is well understood. But many organizations are beginning to evolve from Zero Trust Network Access (ZTNA) to Zero Trust Data Access (ZTDA).
What’s the difference?
ZTNA ensures the right person can access the right application.
ZTDA asks a deeper question: What should they be allowed to do with the data once inside?
This shift reflects a more mature view of risk—one that assumes that breaches are inevitable, and that controls must follow the data, not just the user.
Why it matters:
Data is the crown jewel. Every conversation I had reflected this growing reality: It’s not enough to secure the perimeter. We must secure the payload.
CISOs today are navigating a world that is hybrid, AI-driven, and data-centric. The conversations I had reinforced one truth: security must evolve from being infrastructure-aware to being data-intelligent.
If we want to stay ahead of threats, we need to stop focusing just on where users are coming from—and start focusing on where the data is going.
Let’s keep the conversation going.
Thyaga Vasudevan is a high-energy software professional currently serving as the Executive Vice President, Product at Skyhigh Security, where he leads Product Management, Design, Product Marketing and GTM Strategies. With a wealth of experience, he has successfully contributed to building products in both SAAS-based Enterprise Software (Oracle, Hightail – formerly YouSendIt, WebEx, Vitalect) and Consumer Internet (Yahoo! Messenger – Voice and Video). He is dedicated to the process of identifying underlying end-user problems and use cases and takes pride in leading the specification and development of high-tech products and services to address these challenges, including helping organizations navigate the delicate balance between risks and opportunities. Thyaga loves to educate and mentor and has had the privilege to speak at esteemed events such as RSA, Trellix Xpand, MPOWER, AWS Re:invent, Microsoft Ignite, BoxWorks, and Blackhat. He thrives at the intersection of technology and problem-solving, aiming to drive innovation that not only addresses current challenges but also anticipates future needs.
Thyaga Vasudevan April 3, 2025
Sarang Warudkar and Hari Prasad Mariswamy March 13, 2025
Sarang Warudkar March 4, 2025
Rodman Ramezanian February 24, 2025
Hari Prasad Mariswamy February 20, 2025