Webinar: Tackling Cloud Data Security with DSPM and DDR

Sharon FarberSharon Farber
table of contents
Webinar: Tackling Cloud Data Security with DSPM and DDR

With the growing reliance on cloud technology, cloud data security has become a top priority for many organizations. Protecting sensitive data stored in the cloud is critical to prevent cyber attacks and data breaches that can lead to devastating consequences. 

This workshop delved deeper into the importance of cloud data security and how to safeguard your organization's critical information. The speakers discussed a range of topics including the increasing need for cloud data security, the concept of data security posture management (DSPM) and data detection and response (DDR), building a strong security team, and much more. 

The featured speakers include:

  • Seth Spergel, Managing Partner at Merlin Ventures
  • Dan Benjamin, CEO and Co-Founder of Dig Security

Some of the key takeaways:

Why are we seeing such a high level of interest in cloud data security? 

As the usage of cloud data continues to grow, so do concerns regarding compliance and protection. Organizations are using multiple clouds to store sensitive data, but without automated means to discover, classify and secure it, they are facing numerous risks. Today's security teams face the challenge of effectively monitoring and securing sensitive information that flows across multi-cloud environments. Unfortunately, there is no one-size-fits-all solution for protecting cloud data stores, leading to the potential risk of data loss – which could not only damage an organization's reputation but also have financial implications. 

What should a data security platform look like?

A comprehensive data security platform should include components for discovering and classifying information, adding context to data, performing data security posture management (DSPM), and providing real-time protection against threats with DDR. These technologies are designed for the cloud and can be integrated into your environment without disrupting business processes.

How can organizations build the best data security team?

Securing your data in the cloud comes with many challenges, including the fact that cloud data security is relatively new and cannot be dealt with tools that were built for on-premises. That’s why it’s crucial to build the best data security team. In larger organizations, a dedicated data security team is common practice, and in the US, the presence of an information security team is less common than in Europe. A data security team should ensure proper controls are assigned to all data assets, prioritize risks, and work with business units to remediate and respond to risks in real time. They are also responsible for building out a data security toolkit.

Learn more best practices for building an Enterprise Data Security Team

How can we measure the team’s effectiveness?

Using a checklist can help measure the team’s effectiveness. Organizations should be asking themselves key questions such as what data they collect and store, where it resides, who has access to it, and what policies and controls are in place to protect it. Many organizations are still in the early stages of answering these questions, with some having good visibility of the data they own but not how it's being used. Others have good visibility of data usage but don’t know how to protect it. A checklist helps the security team track what their goals and objectives are – as well as progress, tools, and ownership of projects to accomplish their goals.

Get free access to the full webinar recording.

Learn more about the speakers:

Dan Benjamin is the co-founder and CEO of Dig Security. Previously, Dan held cloud and security leadership roles at Microsoft and Google and co-founded 2 successful startups (IdMlogic, eRated). Dan is an alumnus of 8200.

Seth Spergel holds more than 20 years of experience building, selling, and investing in software and startups. He is currently a Managing Partner of Merlin Ventures, where he is responsible for identifying cutting-edge companies to partner and invest in. Previously, Seth was VP for Infrastructure Technologies at In-Q-Tel, as well as the VP of Engineering for ThinkGeek. He also spent 12 years at IBM in roles ranging from software developer to sales manager.

FAQs

No items found.
Pro-Tip

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed consectetur do eiusmod tempor incididunt eiusmod.