Page 9 - Data Security Edition 2022
P. 9

Rise in Disruption to



       Be the Focus Area for



       Attackers in 2022










       Ajay Gupta
       Country Manager,
       India & SAARC, Netskope




    Netskope caters to businesses on  legacy  technology  environments             identifying  unauthorized  or
    the  lookout  for  cloud-native,  to  value  being  created  by  the           suspicious/anomalous data flows
    network,  and  data  protection  scale  of  customer  data  and  the           or transmissions.
    solutions.  The  company  was          ability  to  deliver  personalized      Best Data Security Practices
    recently  named  the  leader  in       service  with  personalized  pricing    There  are  eight  key  questions

    Gartner's  2022  Magic  Quadrant       in a trusted and private way.           that  organizations  should  ask
    for  SSE  (Security  Service  Edge)  With  the  data  growing  at  an          themselves  to  identify  where

    and  is  dedicated  to  helping        exponential  rate  and  with  the       they  need  to  prioritize  activity.
    organizations  accelerate  their       acceleration  of  cloud  adoption,      These include:
    SASE  journey.  Continue  reading      organizations  must  think  about         Do we know our threats?
    as  Ajay  Gupta  sheds  more  light    how they secure this critical asset,      Do  we  know  our  critical  assets,

    on  how  exponential  growth  in       not  just  for  the  company's            and who has access to them?
    data  and  cloud  adoption  is         business benefit but also to meet          Do we know their vulnerabilities?
    prompting  organizations  to           t h e   e x p e c t a t i o n s   o f   t h e i r   What are we doing about those
    secure their data.                     customers.                                vulnerabilities?
                                           The Role of DLP in Ensuring Safety        How  do  we  constantly  react  to
    The Need for a Robust
    Data Strategy                          from Data Breaches                        changing threats in the market?
    Companies  undergo  digital            There is a need to build a holistic       Have we got a playbook should
    transformation  to  not  only          data protection program covering          an  attack  be  successful?  Have
                                           several  areas,  including  access
    automate  processes  but  more                                                   we tested it, and what were the
    importantly, have greater access       control,  privilege  management,          results?
    to data to gain better insights. As a   key  management,  encryption,            How  do  we  quantify  cyber  risk
    result,  value  has  shifted  from     a p p l i c a t i o n   s e c u r i t y ,   d a t a   and prioritize this against other

    physical distribution channels and     classification,  and  data  leakage        operational risks?
                                           prevention  (DLP).  DLP  addresses        H o w   d o   w e   m e a s u r e   a n d
                                           the  unauthorized  transmission  of       monitor  the  effectiveness  and
                                           data between parties by -                 coverage of the security controls
                     March 2022                                                      in place?
   4   5   6   7   8   9   10   11   12   13   14