Last Updated on March 9, 2023
Traditionally, companies have relied on the promises of vendors when it comes to affirming their security stance.
However, LimaCharlie has a far more radical approach—a knowable security position through an “as-a-service” model.
How are they doing it?
In this episode of The Virtual CISO Podcast, Maxime Lamothe-Brassard, LimaCharlie’s founder, explains the “AWS approach” the company employs for cybersecurity and how being born in the cloud provides infinite scalability and enables clients to deploy a wide range of security capabilities.
Join us as Maxime and host John Verry discuss:
- Moving past promise-based security positions to knowable security
- The extra level of control and breadth of security you can create with LimaCharlie
- How LimaCharlie can support continuous compliance automation with wide-scale “sensor telemetry”
- The benefits of low-code approaches and integrations across the LimaCharlie toolset
A Knowable Security Position
A lot of cybersecurity hinges on a promise.
The landscape is unsafe, and a company needs security. So they go to a cybersecurity vendor and say, “Hey there, we are vulnerable, and we need protection. How can you help us?”
The firm then says something to the effect of “we promise we can keep you safe. See all these other companies we’ve kept safe? You can trust us to keep you safe.”
“Cybersecurity really has to evolve past this promise-based security into a knowable security position.” — Maxime Lamothe-Brassard
And that’s fine. That works. Until it doesn’t.
Applying the AWS model to security starts with the idea that there are tools that make it accessible for people to do cybersecurity. So instead of relying on the promise of a vendor, you’re relying on a knowable position that they have effectively created.
“We are able to do all these pretty magical things because we were born in the cloud, and we don’t have that legacy of racking and stacking.” — Maxime Lamothe-Brassard
In the past, you went and talked to your CISO. You ask if a vendor is safe on the endpoint or against ransomware. They say that the vendor has a good reputation. So you’re relying on a promise. What Maxime and his team are doing is going beyond promise-based security into a knowable security position based on LimaCharlie’s tools platform.
AWS Approach to Provisioning Security
How can AWS help you provision security?
Say you need an endpoint detection and response (EDR) solution. Typically, you’d start by talking to vendors, choosing a vendor, negotiating a contract that plans your usage over the next two years, dealing with licensing, and so on.
There’s a lot of friction in that process. Also often a lot of cost. And you’re left with a “best of breed” bunch of tools to manage and (maybe) integrate.
“We think the direction the industry is going is more and more security professionals wanting more than just the boxed product.” — Maxime Lamothe-Brassard
Maxime and his team are taking the AWS approach.
They’re making the tools available in a self-serve model under one common interface. Scale up, scale down, billed monthly, the whole package.
If their customers don’t like what they’re getting, they can bow out at the end of the month. Because they haven’t been locked into a longer-term contract.
It’s that simple.
Not every company has the technical resources to comfortably leverage LimaCharlie’s “tools on tap” model. But they’re making it easier all the time, by focusing on delivering low-code approaches and easy-to-use automation.
Not finding what you need in the toolbox? LimaCharlie maintains a tight feedback loop with its customers and is always expanding its use case support.
Try doing that with a boxed security product.
To hear this episode, and many more like it, you can subscribe to The Virtual CISO Podcast here.
If you don’t use Apple Podcasts, you can find all our episodes here.
Listening on a desktop & can’t see the links? Just search for The Virtual CISO Podcast in your favorite podcast player
Successful vCISO = All Security Roles Filled
This document outlines the 3 critical roles and responsibilities of a Virtual Chief Information Security Officer: Architect, Builder, and Operator.
Download the free inforgaphic now!