Sonrai Security Releases Industry-First Risk Insights Engine 👉
Learn More
  • Solutions
      • Cloud Security Platform
      • Workload / CWPP
      • Platform / CSPM
      • Identity / CIEM
      • Data / Cloud DLP
      • Workflow & Automation
      • Sonrai Identity Graph
      • Use Cases
      • Least Privilege
      • Least Access
      • Cloud Misconfiguration
      • Vulnerability Management
      • Executive Reporting
      • Compliance
      • Cloud Environments
      • AWS
      • Microsoft Azure
      • Google Cloud
      • Oracle Cloud
      • User Roles
      • Cloud Teams
      • DevSecOps
      • Security Teams
  • Partners
      • Partner Alliances
      • Ecosystem Partners & Integrations
      • Global System Integrators (GSI)
      • Solution Providers (VARS, MSP, MSSP, CSP)
      • Cloud Alliances
      • Microsoft Azure
      • AWS
      • Google Cloud
      • Oracle Cloud
      • Register A Deal
  • Resources
    • Resource Library
    • Blog
    • Customer Stories
    • Events
    • Webinars
  • Company
    • Our Story & Leadership
    • Work With Us
    • Newsroom
    • Awards & Recognition
    • Contact Us
  • Login
  • Request Demo
  • Solutions
      • Cloud Security Platform
      • Workload / CWPP
      • Platform / CSPM
      • Identity / CIEM
      • Data / Cloud DLP
      • Workflow & Automation
      • Sonrai Identity Graph
      • Use Cases
      • Least Privilege
      • Least Access
      • Cloud Misconfiguration
      • Vulnerability Management
      • Executive Reporting
      • Compliance
      • Cloud Environments
      • AWS
      • Microsoft Azure
      • Google Cloud
      • Oracle Cloud
      • User Roles
      • Cloud Teams
      • DevSecOps
      • Security Teams
  • Partners
      • Partner Alliances
      • Ecosystem Partners & Integrations
      • Global System Integrators (GSI)
      • Solution Providers (VARS, MSP, MSSP, CSP)
      • Cloud Alliances
      • Microsoft Azure
      • AWS
      • Google Cloud
      • Oracle Cloud
      • Register A Deal
  • Resources
    • Resource Library
    • Blog
    • Customer Stories
    • Events
    • Webinars
  • Company
    • Our Story & Leadership
    • Work With Us
    • Newsroom
    • Awards & Recognition
    • Contact Us
  • Login
  • Request Demo
Back to Events & Webinars
Webinar

Find, Classify, Secure: Data Recon in AWS & Azure

Webinar Details
Date & Time: 07.21.2021, On Demand
Type: On Demand
Presenter(s): Eric Kedrosky, CISO & Director of Research, Sonrai Security
Dave Shackleford, Principal, Voodoo Security
Watch Now

Do you know where your data is? It seems like such a simple question. Many security teams think they do, because they have a map and a plan of where data is supposed to be. Seeing where data actually is in the cloud requires more than a static plan – you need the capacity for dynamic reconnaissance. You also need a deep understanding of how data can be accessed to assign it a true ‘location’ to harden.

Couple this complexity with the ever-growing scale of cloud, and data classification becomes critical: with an ever-growing cloud footprint, vulnerabilities need to be prioritized by sensitivity. PII in a public bucket is a much bigger problem than SOC compliance issues in a staging environment. They both need attention, but you’ll never have the resources to cover off every issue with the same speed.

Securing data starts with seeing data, and seeing it clearly. Where it lives, how sensitive it is, and how it can be accessed are the first pieces of information to gather to prioritize your security tasks. Then you can start the work of hardening the most vulnerable positions, adjusting posture management, and limiting access.

This is the first webcast in a series on securing data in the public cloud. Sonrai CISO Eric Kedrosky and Voodoo Security Founder’s Dave Shackleford team up to discuss the challenges of data reconnaissance and scanning in the cloud, covering topics like:

  • Common data visibility issues
  • Data classification: issues, best practices, and automation techniques
  • Mapping out a risk management based on data intel
  • Securing the objects and locations where sensitive data lies with posture management and other governance strategies
Watch Now
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Linkedin
Sonrai logo FC icon
Request a Demo Login
  • Twitter
  • Linkedin
  • Solutions
  • Cloud Security Platform
    • Workload / CWPP
    • Platform / CSPM
    • Identity / CIEM
    • Data / Cloud DLP
    • Workflow & Automation
    • Sonrai Identity Graph
  • By Use Case
    • Least Privilege
    • Least Access
    • Cloud Misconfiguration
    • Vulnerability Management
    • Executive Reporting
    • Compliance
  • Cloud Environments
    • AWS
    • Microsoft Azure
    • Google Cloud
  • User Roles
    • Cloud Teams
    • DevSecOps
    • Security Teams
  • Partners
    • Partner Alliances
      • Ecosystem Partners & Integrations
      • Global System Integrators (GSI)
      • Solution Providers (VARS, MSP, MSSP, CSP)
    • Cloud Alliances
      • Microsoft Azure
      • AWS
      • Google Cloud
      • Oracle Cloud
  • Resources
    • Resource Library
    • Blog
    • Events
    • Webinar
  • Company
    • Our Story & Leadership
    • Careers
    • News
    • Awards & Recognition
    • Contact Us
  • Twitter
  • Linkedin

© 2022 Sonrai Security. All rights reserved

Sitemap   |   Privacy Policy

Sonrai cloud security platform, products and services are covered by U.S. Patent Nos. 10,728,307 and 11,134,085, together with other domestic and international patents pending. All rights reserved.

Scroll to top