Webinar: Dig Secures data across multi-cloud environments with Plymouth Rock

Sharon FarberSharon Farber
table of contents
Webinar: Dig Secures data across multi-cloud environments with Plymouth Rock

In an increasingly cloud-driven world, it's more important than ever to protect sensitive data from unauthorized access. In this webinar, Dan Benjamin, CEO and Co-Founder of Dig Security, and Daniel Goldenberg, Director of Information Security at Plymouth Rock Assurance, met for a fireside chat and discussed the challenges and best practices for securing data across multi-cloud environments.

Here are some of the highlights of the conversation - and a link to the full recording.

Key questions and takeaways:

What are the current trends and concerns that are top of mind for CISOs?

According to Goldenberg, there are a few notable trends to look out for. First off, there's a growing movement towards the cloud. Many organizations, like Plymouth Rock, are shifting their data and applications to the cloud. This transition raises questions about when to make the move and how to adapt existing security tools and practices to the cloud environment. 

Goldenberg shared from experience how Dig’s platform helped with the challenges of migration: 

“That's the power in having that belt suspenders approach as you're going through that cloud modernization journey, as you're moving those workloads and you're spinning up those RDSs, you need to know - what's the security around it? What's the encryption? Are people making the right decisions and sticking to your standards? A lot of the telemetry is provided by dig’s platform in terms of what is going on with that data on and underneath the surface.”

Another challenge mentioned is securing diverse landscapes. Organizations have to handle the security needs of different public cloud environments (PaaS, IaaS) as well as managed DB services (DBaaS). Unfortunately, traditional tools fail to scale to the needs of these new environments, leaving organizations exposed to data misuse, ransomware and compliance breaches. 

What kind of data does Plymouth Rock keep and what are the challenges in keeping it safe?

Over the course of 40 years as a privately owned insurance company, Plymouth Rock has gathered a lot of data. As they shifted their core operations to AWS, they needed a solution that worked well with their cloud setup and offered better visibility. Their main concern was accidental breaches caused by misconfigurations and human errors. Therefore, their primary focus was on categorizing their data, understanding its sensitivity, and ensuring its protection within the company. They were looking for a targeted solution that could assess the risks associated with their workloads and the underlying data. They have been in pursuit of a solution that could weigh the risks tied to workloads and underlying data - and were thrilled to find Dig’s data security platform.

When asked about onboarding, Goldenberg said that it is one of his favorite things when it comes to Dig: 

“The onboarding is seamless. I have a small team and we don't have many cycles to do massive implementations of complex software. What we really need is to implement solutions that have a very quick time to value. Dig’s platform was linking up our AWS account number to the platform, launching a configuration script - and we were done!” 

Plymouth has both the AWS and GCP environments, and overall 10 accounts connected into the platform currently.

Who is typically involved in using data security solutions within companies?

Benjamin emphasized that understanding the roles of individuals using data security solutions is crucial for developing effective products. In his experience, organizations with a dedicated data security team or subject matter experts rely on them as the primary owners of data security solutions such as DSPM and DDR These experts have the responsibility of protecting data across different endpoints, on-premises infrastructure, and public cloud environments. Their ultimate objective is to ensure both data compliance and security. 

However, promoting collaboration by involving multiple teams and stakeholders in the implementation process will lead to far better results in overall data security. The most successful implementations often include teams from privacy, compliance, data science, data governance, cloud security, and even financial departments, all working together to optimize data security and privacy while also saving costs. Engaging various teams fosters better collaboration and leads to exceptional outcomes.

Dive Deeper: view full webinar recording here.

Learn more about the speakers:

Dan Benjamin is the Co-Founder and CEO of Dig Security, a leading cloud data security company that helps organizations discover, monitor, protect, and govern their cloud data stores through a unified policy engine. Dan is an entrepreneur with over a decade of industry experience founding and leading startup companies, and has held leadership roles at Fortune 100 companies, including cloud and security leadership roles at Microsoft and Google. Dan is also a former member IDF (8200), an Israeli Intelligence Corps unit of the Israel Defense Forces.

Daniel Goldenberg is the Director of Information Security at Plymouth Rock Assurance. He is responsible for all aspects of the company's information and corporate security, as well as governance, risk, and compliance. With nearly 20 years of experience ranging from startups to enterprises; spanning the healthcare, biotechnology, pharmaceutical, and digital consulting verticals, Daniel brings a wealth of knowledge and a unique perspective to cross functional teams, industry panels, and boards alike. Prior to joining Plymouth Rock Assurance in 2022, Daniel was Director of IT & Security at nference, where he architected a zero trust access model and developed solutions to detect and mitigate cyberattacks. 

FAQs

No items found.
Pro-Tip

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed consectetur do eiusmod tempor incididunt eiusmod.