Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

Modern Data Security Approaches: Is Cloud More Secure?

Modern Data Security Approaches: Is Cloud More Secure?

FromCloud Security Podcast by Google


Modern Data Security Approaches: Is Cloud More Secure?

FromCloud Security Podcast by Google

ratings:
Length:
28 minutes
Released:
Jun 1, 2021
Format:
Podcast episode

Description

Guests: Tim Dierks, Engineering Director, Data Protection @ Google Cloud Topics: What are the key components of data security in the public cloud today? Why do companies need specific data security plans and products? Do you think Google Cloud today has enough controls for processing the most sensitive data? Many organizations seem to be unaware of where sensitive data exists in their cloud environments, how do you think this problem will be fixed? What is your view on encryption's role in future cloud security? Do organizations mostly encrypt for security or for compliance? How do we help companies navigate the tradeoffs between complying with nation-state regulations and best practices for availability? I hear you are involved with some interesting key management innovations like HYOK via Cloud EKM, why do these matter for clients today? Resources: Forrester report “The Forrester Wave™: Unstructured Data Security Platforms, Q2 2021”  “New whitepaper: Designing and deploying a data security strategy with Google Cloud” “Hold your own key with Google Cloud External Key Manager” “Building Secure and Resilient Systems” book (free)
Released:
Jun 1, 2021
Format:
Podcast episode

Titles in the series (100)

Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.