Evolving towards a data-driven organization in the cloud requires a solid cybersecurity strategy. Find out how to achieve it.
An organization that evolves towards the data-driven paradigm in the cloud, that is, oriented or driven by the use of data hosted and processed on a cloud platform as the central axis of its operation, needs to have a solid cybersecurity strategy to protect information and ensure operational continuity. Let's see below how to achieve this.
HubSpot BLOG
We are seeing a demand in consumer goods and retail to do 99 acres database more strategically rather than technically. Boards want to see cyber strategies in place before investing more money, so CISOs and CTOs need to be more strategic in their thinking and bring the topic to the board level.
Source: EY Executive
Omer Singer, principal Cybersecurity Strategy at Snowflake, outlines some of the steps to follow for secure data management in the cloud , in line with the company's new vision called security data lake , which differs from the better-known SIEM (security information event management).
In the previous model, data collection, indexing and storage, as well as analysis and visualization, formed a stack that was repeated, in isolation, across third-party development providers (ISVs), infrastructure as a service (IaaS) and software as a service (SaaS) platforms.
In contrast, in the secure data lake architecture , there is a unified space in the cloud for storage and queries , another for data collection that includes the extraction, transformation and loading (ETL) process together with a scenario analyzer and methods for detecting and responding to incidents or threats (even in an extended way with XDR); finally, there is a third analysis and visualization environment with automated functions, including Business Intelligence and Analytics reports , together with a SOAR ( security orchestration, automation, and response ) solution.
New call to action
The centralized location of logs generated during application use, especially in the area of data security, provides a wealth of valuable information for carrying out different types of analysis, investigating significant events or behaviors, and detecting potentially dangerous situations.
What's more, dashboards and correlations between different events can be created for testing linked to SOC2 audits, to take advantage of them with the DevSecOps model and other data privacy and risk management tasks. Snowflake calls this 'the onion' because of the different layers that surround a core where all the information is concentrated.
Achieve a solid, data-driven and cloud-based cybersecurity strategy
-
- Posts: 1290
- Joined: Tue Dec 24, 2024 4:26 am