Clarke Rodgers:
That's very, very interesting. You started the security program at AWS, so you know AWS backwards and forwards, how to secure it, the threats that are against it, the risk appetite, et cetera. As you moved into the CSO role, you now to learn about haqm.com or what we call internally stores, Whole Foods, Prime Video, MGM, Twitch, all of these different organizations.
First, how did you get up to speed on the security profile for each of those businesses and sort of the risk appetite and then how did you sort of bring it all together? So the common term, the single pane of glass that you felt comfortable that the risk profile for Whole Foods is appropriate, the one for AWS is also appropriate for AWS, how did you sort of figure all that out?
Steve Schmidt:
Well, first of all, one of the things that I love about my job is the diversity of the businesses. People often say you've been in your position for 16 years. That's really unusual for somebody in the security industry. Why is that? It's because of the diversity of work that this company has. It's an opportunity to continue learning, which is, I love it.
I'm not that young. People say, how long are you going to keep working? Are you going to retire, whatever? And I'm like, well, I'm enjoying myself. No, I don't want to. This is really a lot of fun. And it's because you go from building the world's largest cloud provider to putting satellites in space and running grocery stores and the diversity there is just an incredible challenge from the business perspective, but it's also an interesting opportunity to leverage the scale of the company to make things less expensive to operate.
When you look at operating security organizations, they are not cheap. But when you can scale it across a business as large as HAQM's, it means the unit cost can be driven down.
Clarke Rodgers:
For sure.
Steve Schmidt:
So every business benefits from the scale of the other businesses. And so finding ways that a grocery store can take advantage of the same security that a satellite business does, which they can in many areas, for example, vulnerability management, whether you're patched on a computer system, is not really fundamentally different when you're building satellites versus operating a grocery store.
And so that allows us to do things at a level that a standalone business really could not afford to and raise the bar for everybody. And that's part of what my job here is making sure that we have a standardized bar across the company, whether it's for vulnerability management or incident response or any of the other components that go into a typical security organization.
Then figuring out what are the bespoke components that have to be put in place for particular businesses because of their unique situations. That way we don't try and apply the sort of one size fits all to everybody because that would just drive costs through the roof. If you look at a grocery business for example, the loss of a unit there has a relatively de-minimize value, whereas the loss of a satellite is the opposite.
Clarke Rodgers:
For sure.
Steve Schmidt:
And so we have to tailor the security situation for individual components.
Clarke Rodgers:
How do you hold ... I'll back up. You have chief information security officers running the security programs for each of these other businesses. How do you hold them accountable to run their security business?
Steve Schmidt:
So one of the things that HAQM focuses on a lot across the company is the idea of a single threaded owner. So somebody whose job it is just to focus on one component of something. And in security, that's why we have a CISO for each individual business is because of two things.
One is I want somebody who every day just focuses on that, whether it's Amy Herzog who's in the devices and Kuiper space, or whether it's Chris Betz who's looking after AWS. But at the same time I use common measurements across all of those things. For example, I look at a vulnerability management monthly business review, which encompasses the entire company and it uses the same numbers, the same methodologies, the same presentation methods, et cetera.
So we get a common view that's consistent across every one of those businesses. And it allows us to do two things. One is to make sure that we're meeting the bar that we require, and the second is to ensure that we are applying the visibility that we want in every corner of the business. Because quite often where people have problems is they think, oh, this is not an important thing, this is a small piece, et cetera.
And that's where the bad guy gets in and we all get bitten. So by giving that sort of 10000 foot oversight on everything, we make sure that we're doing the things that we need to in every part of the company.
Clarke Rodgers:
And then you have centralized systems under the HAQM security or AMSEC umbrella that everyone can take advantage of.
Steve Schmidt:
So there are a lot of things that are fundamentally the same across all of our businesses. The way that you collect certain kinds of data, the way that you analyze that data or report on it, and rather than making every individual business do the same thing over and over and over, we decide to move them into one spot. That allows us to save on things like developer time.
So if you think about running a large scale, we'll go back to vulnerability management, collection engine for that you've got to have on-call engineers. If you've ever run an on-call organization, which you have, you figured to have one person on call, you've got to have approximately seven people in order to do that effectively to accommodate leave and vacations and everything else.
Clarke Rodgers:
We want people to take vacations.
Steve Schmidt:
That's right. And so by spreading that across a bunch of different businesses from one place, it means that we do so more effectively because we get better tooling centrally and at a lower cost.
Clarke Rodgers:
What practices have you either developed or followed to report the status of security across all these disparate businesses to the HAQM board?
Steve Schmidt:
The HAQM board first of all is really interesting. There are very few boards that have the technical acumen across the population that HAQM's board does, but also HAQM chose several years ago to create a security subcommittee. So unlike a lot of places where security may report to the audit committee, for example, there is a dedicated group of people whose job it is just to look at security on the HAQM board.
That's great and it also means there's a lot of scrutiny on us in the process. So we've had to build a reporting mechanism which evolves over time because of two reasons. One is because we get better at doing our job on reporting. And two is the board becomes even better informed over time. They ask more pointy questions and want to know more specific details about niches in the business. We generally find that it's important to report up to them on specific components of the business every single time we talk. Are we meeting our security bar in certain places?
Additionally, they have things that they're really interested in, tell us about this particular part of the business or this thing we're getting into we think has a lot of risks, so give us a rundown on blah, blah, blah. And that allows us to have a consistent component, a variable component that's based on their interest.
And then we decide to put in something called current events at the end where we take all of the stuff that you've seen in the news, we distill it down to things that we think have particular lessons or points for us and present that to the board as an informative component at the end. Here is something that happened out in the industry, here is why we were not affected.
Here is the investment that led to us not being affected. And I think that has tremendous value for the board. Number one, they understand that we're in a good place, but number two, it helps inform investment decisions down the road. So when we can come forward and say we invested in multi-factor authentication eight years ago, 10 years ago, and that prevented this particular threat actor who got into this other large company from affecting us, they say, okay, great. What are the other investments we should be planning now that will help us in 10 years to continue to avoid problems?
Clarke Rodgers:
So many of our CISO customers, they focus on the board a lot. Some of them don't get as much FaceTime as others. And you already called out that our board is unique because of their security savvy. What recommendations would you give to your CISO peers or CSO peers who are reporting to their boards to really help sort of drive their points home, speak the language of the board, et cetera?
Steve Schmidt:
So the number one thing that I've heard from board members about why they like the way that we do things is we are very careful to avoid jargon. A lot of people in the CISO roles are technical and they want to report on things in ways that the-
Clarke Rodgers:
The bits and the bytes.
Steve Schmidt:
Exactly, are reflective of the way they think about it. But we've got to remember the board is the customer here. So when we are presenting to them, we have to speak their language and we have to find ways to explain things in context that makes sense to that particular board.
So number one is find a consistent reporting mechanism rather than varying it each time because that makes it harder for someone to grok it, basically. Number two is figure out what are the really two or three super important metrics that you want to get across in there every single time.
Don't drown people in metrics. For example, we always, always report on vulnerability management. It is the single most important fundamental security control that we operate and I think anybody operates and then figure out what are those things that are interesting add-ons at the end, which help you develop the should we invest in, so make that intentional separation between components of the reporting process.
Clarke Rodgers:
And is if we invest in here, we reduce risk over here?
Steve Schmidt:
Yeah, it is a combination of both current risk reduction and forward-looking reduction and the forward-looking is actually probably the hardest part of our job as security professionals because we don't have an existence proof to use. And a lot of people look at it and say, is that really necessary?
Do we have to do it right now? Do we have to do it that big? Can we go smaller? Those are the arguments we all have to have and we need to be able to build up that sort of knowledge base on the board over time and say, these are the examples of the real-world exploitation of things that look kind of like this and we think it's going to apply to us in this amount of time, therefore we have to go act now or in two years or in three years or whatever.
Clarke Rodgers:
Got you. So at HAQM we're known for our innovation, working backwards, listening to our customer, et cetera. As a security leader, you have lots of choices, and this may come down to your CISOs reporting into you, you have lots of choices about what tools you purchase versus what tools you need to build. Oftentimes that comes down to scale.
So the commercial off-the-shelf software may or may not scale to HAQM's scale and you need to build something yourself. Over the last year we've talked publicly about tools like Madpot and Mithra and Sonaris. As the CSO, how do you make the pitch to get the dollars to actually put the engineering resources behind tools like that, and I imagine many other tools that we haven't talked about, how do you make the pitch to say this is a worthy of your investment and here's the value that we're going to get out of these?
Steve Schmidt:
Sure. So let's first differentiate between a purchased tool versus something we build. I think that's an important starting point. We will purchase tools when they're a commodity item. So for example, endpoint detection response, we buy that as opposed to build it ourselves. Why? Because the Mac laptops, the Windows laptops, the Linux laptops that we use are the same that lots of other people use as well.
We may have a little bit of different software on them, but it doesn't really differentiate our business. Whereas we are the only ones who can build a very large scale system like Madpot as an example. Where we can build something that nobody else can is where we tend to invest.
The way we do that investment process is just like we do a lot of other things. You prototype it, you try it, you see what works. You guarantee that you're not going to get it right the first time. So you've got to go and re-engineer something, change it a little bit, et cetera. Now Madpot has been incredibly successful but didn't just pop up overnight. It is an investment of many, many years That started off with a single engineer who said, huh, I really like this idea. Let's go see if it can get anything interesting.
And then it's turned into this engine that allows us to acquire really, really timely threat intelligence data that we can take out of that we can process and we can feed into the security tooling that all of our customers have access to. And I think that's the part that's most important. So for example, a lot of our customers say, ooh, I want raw threat intelligence feed.
And like, well actually no, you don't. What you really want is the stuff that's relevant to you in the context in which you are operating right now. The rest of it's just noise and the volume of it now is so huge that it's pointless to try and digest the whole thing unless you have a business that's like ours.
And so a lot of our customers have found that they really, really like taking things like threat intelligence and consuming it as part of a managed service. And that allows them to not have to spend their time winnowing down very large piles of data or missing context because it's not been applied across multiple customers.
And that context thing is important. That's where the centralized visibility that only we have to go back to the original part about commoditization versus custom-builds, really brings advantage.
Clarke Rodgers:
And then I guess the internal pitch, for lack of a better word, it's, this helps us secure AWS slash HAQM and adds benefit to our customers. So I mean it's a win.
Steve Schmidt:
And in typical HAQM parlance will start off with the customers first and say, this helps all of our customers better secure themselves. And at the same time, it helps us with our business because most of our businesses are HAQM AWS customers anyway. So it is beneficial across the board.