Sonrai Security Releases Industry-First Risk Insights Engine 👉
Learn More
Search Login
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login
Sign In Sign Up for Free
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login

Interactive Product Tour

interactive tour Start a Tour Get a Demo
Search Login
Sonrai Security Logo
  • Product
    • Cloud Permissions FirewallA one-click solution to least privilege without disrupting DevOps.
    • CIEM +Discover, monitor & secure critical data.
    • Interactive TourExplore our products in a quick walkthrough.
      • Cloud Permissions Firewall Interactive Tour
A one-click solution to least privilege without disrupting DevOps.
      • CIEM + Interactive TourBreak toxic permission chains creating pathways to your data.
    • Start a 14- day free trial
    • Get Started
  • Solutions
        • Use Cases
          • Least Privilege
          • Third-Party Access
          • Just-in-Time Access
          • Privileged Access Management
          • Attack Path Disruption
          • Audit and Compliance
        • User Role
          • CloudOps
          • DevOps
          • Security
  • Pricing
  • Resources
        • Resource Library
        • Customer Stories
        • ACCESS
        • Blog
        • Webinars
        • Videos
        • From the research team
        • Cloud Permissions Firewall ROI
        • Identity Security Maturity Guide
        • ROI Calculator
        • Data Report: Cloud Access Risk
        • Get More Research
        • Read More
  • Customers
  • Company
    • About Us
      • Why Sonrai
      • Story & Leadership
      • Careers
      • News
    • Partners
      • Global System Integrators
      • Solution Providers
      • Empty Menu
    • Sign In Sign Up for Free
      Search Login

Interactive Product Tour

interactive tour Start a Tour Get a Demo
Search Login
Back to Events & Webinars
Webinar

Find, Classify, Secure: Data Recon in AWS & Azure

Webinar Details
Date & Time: 07.21.2021, On Demand
Type: On Demand
Presenter(s): Eric Kedrosky, CISO & Director of Research, Sonrai Security
Dave Shackleford, Principal, Voodoo Security
Watch Now

Do you know where your data is? It seems like such a simple question. Many security teams think they do, because they have a map and a plan of where data is supposed to be. Seeing where data actually is in the cloud requires more than a static plan – you need the capacity for dynamic reconnaissance. You also need a deep understanding of how data can be accessed to assign it a true ‘location’ to harden.

Couple this complexity with the ever-growing scale of cloud, and data classification becomes critical: with an ever-growing cloud footprint, vulnerabilities need to be prioritized by sensitivity. PII in a public bucket is a much bigger problem than SOC compliance issues in a staging environment. They both need attention, but you’ll never have the resources to cover off every issue with the same speed.

Securing data starts with seeing data, and seeing it clearly. Where it lives, how sensitive it is, and how it can be accessed are the first pieces of information to gather to prioritize your security tasks. Then you can start the work of hardening the most vulnerable positions, adjusting posture management, and limiting access.

This is the first webcast in a series on securing data in the public cloud. Sonrai CISO Eric Kedrosky and Voodoo Security Founder’s Dave Shackleford team up to discuss the challenges of data reconnaissance and scanning in the cloud, covering topics like:

  • Common data visibility issues
  • Data classification: issues, best practices, and automation techniques
  • Mapping out a risk management based on data intel
  • Securing the objects and locations where sensitive data lies with posture management and other governance strategies
Watch Now
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Linkedin
Sonrai Main Logo
  • Solutions
    • Cloud Permissions Firewall
    • CIEM
  • Why Sonrai
    • Interactive Tour
  • Platform Details
    • Free Trial
    • Pricing
  • Use Case
    • Least Privilege
    • Third-Party Access
    • Just-in-Time Access
    • Privileged Access Management
    • Attack Path Disruption
    • Audit & Compliance
  • User Roles
    • CloudOps
    • DevOps
    • Security
  • Learn
    • Resource Library
    • Customer Stories
    • Access Summit
    • Blog
    • Videos
    • Webinars
    • Cloud Permissions Firewall ROI
  • Company
    • Why Sonrai
    • Story & Leadership
    • Careers
    • News
    • Awards & Recognition
    • Contact us
  • Partners
    • Global System Integrators
    • Solution Providers
  • Link to Twitter
  • Link to Linkedin

© 2025 Sonrai Security. All rights reserved

Privacy Policy  |  

Sonrai cloud security platform, products and services are covered by U.S. Patent Nos. 10,728,307, 11,134,085, and 12,218,982, together with other domestic and international patents pending. All rights reserved.

Scroll to top