The rise of enterprise cloud computing has brought an even greater
emphasis on data. According to an analysis compiled by Statista,
two zettabytes of data were created, captured, copied, and consumed
globally in 2010. That figure will reach 97 zettabytes this year
and 181 zettabytes by 2025. As the adoption of cloud computing
continued to evolve, so did how enterprises approached securing
their data. Today, enterprises find their data scattered throughout
their various cloud systems, and they have lost visibility into
where their sensitive data resides. The problems are about whether
there are any shadow data stores that developers left abandoned?
Who can access all of the enterprise data on these clouds, and are
there excessive privileges? What data is at risk of being breached
and falling out of regulatory compliance? Moreover, the growing
complexity of cloud computing is a big part of why breached data
records have risen (according to the Identity Theft Resource
Center) from 16 million in 2010 to more than 155 million today. A
recent survey from IDC found that 98% of organizations they queried
reported at least one cloud data breach in the past 18 months. With
all these challenges, cybersecurity professionals are faced with
the daunting task of understanding where their organization's
critical or regulated data exists across cloud platforms. The
process of identifying and securing cloud data is called the Data
Security Posture Management. In this talk, we will go over certain
techniques for discovering, analyzing and securing data in various
cloud platforms. We will then look at challenging problems that are
opening up more avenues for further investigation, and research.