The Cloudcast

Logging Governance and Sensitive Data


Listen Later

Pranay Kamat (Prod Mgmt @datadoghq) talks about the challenges is protecting sensitive data, internal vs. external attacks, evolution of DLP, the role of Governance in DevSecOps. 

SHOW: 617

CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw

CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"

SHOW SPONSORS:

  • Revelo: Sidestep the competitive US talent market by hiring remote engineers in Latin America. Source, hire, and pay Latin American engineers in US time zones with one service. Revelo manages all the paperwork including benefits, payroll, and compliance. Hire a full-time engineer with a 14-day trial. Revelo.com/cloudcast
  • Monitor CI Pipelines and Tests with Datadog CI Visibility
  • Datadog CI Visibility supports shift-left testing Identify and resolve front-end issues on your web applications before your customers notice. Start a free trial today.
  • strongDM - Secure infrastructure access for the modern stack. 
  • Manage access to any server, database, or Kubernetes instance in minutes. Fully auditable, replayable, secure, and drag-and-drop easy. Try it free for 14 days - www.strongdm.com/signup

SHOW NOTES:

  • Datadog Sensitive Data Scanner
  • Best practices for reducing sensitive data blindspots and risk
  • Building a Modern Compliance Strategy [video]

Topic 1 - Welcome to the show. Let’s talk about your background and the areas where you focus at Datadog. 

Topic 2 - We continuing to see headlines about critical data being stolen, which is a trend that doesn’t seem to be slowing down. Give us a picture of where we are with the problems that are still causing this, and what new things companies can do to prevent it.

Topic 3 - Where are some of the differences between traditional Data Loss Prevent (DLP) strategies and strategies that proactively look at logs to identify data access and breaches? 

Topic 4 - We often think about attacks coming from the outside, but oftentimes attacks happen from inside the house (directly or indirectly). How important is it to be able to control access to logs and what is visible within logs to prevent internal attacks and vulnerabilities?  

Topic 5 - What are some of the more dynamic, modern ways to identify sensitive traffic and tag it properly so systems can act on it? 

Topic 6 - It’s often said that security is everyone’s issue. In modern teams (DevOps, DevSecOps, etc.), where are you seeing as the owner of this Governance and Sensitive data?



...more
View all episodesView all episodes
Download on the App Store

The CloudcastBy Massive Studios

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

147 ratings


More shows like The Cloudcast

View all
The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

The a16z Show by Andreessen Horowitz

The a16z Show

1,092 Listeners

Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

624 Listeners

Talk Python To Me by Michael Kennedy

Talk Python To Me

583 Listeners

Soft Skills Engineering by Jamison Dance and Dave Smith

Soft Skills Engineering

288 Listeners

Super Data Science: ML & AI Podcast with Jon Krohn by Jon Krohn

Super Data Science: ML & AI Podcast with Jon Krohn

302 Listeners

NVIDIA AI Podcast by NVIDIA

NVIDIA AI Podcast

343 Listeners

Tech Brew Ride Home by Morning Brew

Tech Brew Ride Home

961 Listeners

Practical AI by Practical AI LLC

Practical AI

204 Listeners

AWS Podcast by Amazon Web Services

AWS Podcast

205 Listeners

The Real Python Podcast by Real Python

The Real Python Podcast

141 Listeners

Big Technology Podcast by Alex Kantrowitz

Big Technology Podcast

502 Listeners

This Day in AI Podcast by Michael Sharkey, Chris Sharkey

This Day in AI Podcast

227 Listeners

AI + a16z by a16z

AI + a16z

36 Listeners

The Pragmatic Engineer by Gergely Orosz

The Pragmatic Engineer

71 Listeners