Join security industry veterans, Aviatrix CEO Doug Merritt, and a Leading Industry Analyst John Grady of Enterprise Strategy Group as they “Mind the Gap” in current security approaches.
The cloud has atomized your security perimeter — creating hundreds of thousands of dynamic, ephemeral pathways between workloads that your existing tools simply can’t see. These invisible gaps form the largest unprotected attack surface in your enterprise—and adversaries are exploiting them, undetected.
The cloud has atomized your security perimeter — creating hundreds of thousands of dynamic, ephemeral pathways between workloads that your existing tools simply can’t see. These invisible gaps form the largest unprotected attack surface in your enterprise—and adversaries are exploiting them, undetected.
Modern enterprises are contending with several cloud workload security challenges:
- Agentic AI Crisis – Shadow AI & autonomous systems are bypassing security controls
- App Modernization – Breaking the monolith can also break your security
- Data Exfiltration Prevention – Data loss propagates through unmonitored cloud pathways
- Multicloud Fragmentation – Policy fragmentation is occurring across incompatible systems
- Third-Party Data Sovereignty – Challenges arise with securely onboarding, isolations, and securing customer data
- Edge Explosion – Securing thousands of micro-perimeters
- Compliance – Delivering visibility and proof for evolving requirements
- Developer Requirements – Security policies are lagging behind automated deployments, slowing business deliverables or creating security gaps
- Securing east-west (or lateral) traffic with full workload-to-workload visibility
- Filling the new gap in zero trust architectures
- Enforcing security policies in real time, exactly where communication happens
- Integrating seamlessly with your existing tools to amplify their reach
Meet Your Hosts

Doug Merritt
CEO, Aviatrix

John Grady
Principal Analyst, Enterprise Strategy Group

Alex Escalona
Director of Brand Marketing, Aviatrix