Case Study: Live Oak Bank Tackles Cloud Security with Orca Security

CISO Thomas Hill and Orca Security CEO Avi Shua on Securing Public Cloud Estate
Avi Shua, CEO, Orca Security; Thomas Hill, CISO, Live Oak Bank

It’s an increasingly common story: Live Oak Bank was growing its cloud footprint and had specific needs for a cloud security provider. Bank CISO Thomas Hill is joined by Orca Security - CEO Avi Shua to detail the case study and key lessons learned.

In this video interview with ISMG, Hill and Shua discuss:

  • Live Oak Bank’s cloud security needs;
  • Criteria for selecting a cloud security provider;
  • Security challenges for banks moving into multicloud environments.

With more than 20 years of IT and security experience, Hill has spent the majority of his career working in senior IT, Risk, and Security positions in technology and financial service institutions. As CISO, Thomas leads Live Oak’s technology risk management and security operations. He provides leadership for developing and implementing technology and security initiatives that support the mission, vision, and long-term objectives of Live Oak Bank.

Shua has more than 25 years of experience in cybersecurity. Prior to co-founding Orca Security, he was the chief technologist at Check Point Software Technologies and held key positions within Unit 8200, the Israeli NSA. While at Check Point, he built and scaled cybersecurity solutions that continue to protect tens of thousands of organizations to this day. He believes that cybersecurity products should always support the organization and not the other way around.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.