For the majority of organizations, data repositories hold our most sensitive, or mission critical, assets. When the Internet first became accessible to businesses, we all "got online", suddenly the threats our businesses face, and attack surface started to increase dramatically. While mostly only a nuisance, "SQL Slammer" in 2003 prompted the conversation within IT teams to start focusing on the protection of data repositories. Over the past 20 years attacks have become more nefarious in nature, and many organizations have suffered data breaches. In response, organizations continue to layer security tools upon security tools to try and address these security challenges, while simultaneously meeting increased audit and regulatory scrutiny related to access management. While organizations may wish to manage access in a consistent manner, there are no standards (like SAML), so features such as identity federation often require even more security tools, all of which are unique to the underlying data repository vendor. In the past decade new companies are mostly cloud native, and older companies are moving to the cloud at a rapid rate for scaling and cost benefits. Often traditional roles like IT are being deprioritized in favor of DevOps and SRE teams taking on a broader scope, including traditional DBA duties, along with the thousand other things on their plate. The Cloud Security Alliance published "Top Threats to Cloud Computing": the "Treacherous 12" in 2016, and "Egregious 11" in 2019. Since 2018 Cyral has been on a mission to help organizations safely democratize access to data repositories, using security as code patterns familiar to modern software engineering teams. Join our webinar to hear our observations of how clients are mitigating 7 of the Egregious 11, and strategies your teams can use to reduce risk to your organizational crown jewels.

Hora

21:00 - 22:00 hs GMT+1

Organizador

Cloud Security Alliance: CloudBytes
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2025 359 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 26 de Junio de 2025
Mar 27 de Junio de 2025
Mié 28 de Junio de 2025
Jue 29 de Junio de 2025
Vie 30 de Junio de 2025
Sáb 31 de Junio de 2025
Dom 01 de Junio de 2025
Lun 02 de Junio de 2025
Mar 03 de Junio de 2025
Mié 04 de Junio de 2025
Jue 05 de Junio de 2025
Vie 06 de Junio de 2025
Sáb 07 de Junio de 2025
Dom 08 de Junio de 2025
Lun 09 de Junio de 2025
Mar 10 de Junio de 2025
Mié 11 de Junio de 2025
Jue 12 de Junio de 2025
Vie 13 de Junio de 2025
Sáb 14 de Junio de 2025
Dom 15 de Junio de 2025
Lun 16 de Junio de 2025
Mar 17 de Junio de 2025
Mié 18 de Junio de 2025
Jue 19 de Junio de 2025
Vie 20 de Junio de 2025
Sáb 21 de Junio de 2025
Dom 22 de Junio de 2025
Lun 23 de Junio de 2025
Mar 24 de Junio de 2025
Mié 25 de Junio de 2025
Jue 26 de Junio de 2025
Vie 27 de Junio de 2025
Sáb 28 de Junio de 2025
Dom 29 de Junio de 2025
Lun 30 de Junio de 2025
Mar 01 de Junio de 2025
Mié 02 de Junio de 2025
Jue 03 de Junio de 2025
Vie 04 de Junio de 2025
Sáb 05 de Junio de 2025
Dom 06 de Junio de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado