
Sign up to save your podcasts
Or
50 percent of all corporate data is stored in the cloud, according to Statista.
That's a lot of data in the cloud, given how much data is collected and produced daily. Most of this data is stored in Amazon S3 buckets, Google Cloud Storage, Azure Blob, and a host of different storage options available on cloud platforms.
The question then, is how do we secure the data stored in these storage options, and in particular, how do we secure the data stored in Amazon S3 buckets?
Vinoo, who oversees critical data pipelines as Head of Business Engineering at Citadel Investment Group, shares some advice on securing your S3 buckets and also talks about how IAM audits and the culture surrounding IAM audits should change.
Tune in to this episode of Ask A CISO to hear:
The Ask A CISO podcast is a production of Horangi Cyber Security, Asia's leading cloud security provider. The show is hosted weekly by cofounder and CEO, Paul Hadjy.
-- Show Notes and Transcript --
-- About Horangi Cybersecurity --
--- About the Guest --
-- Attributions --
50 percent of all corporate data is stored in the cloud, according to Statista.
That's a lot of data in the cloud, given how much data is collected and produced daily. Most of this data is stored in Amazon S3 buckets, Google Cloud Storage, Azure Blob, and a host of different storage options available on cloud platforms.
The question then, is how do we secure the data stored in these storage options, and in particular, how do we secure the data stored in Amazon S3 buckets?
Vinoo, who oversees critical data pipelines as Head of Business Engineering at Citadel Investment Group, shares some advice on securing your S3 buckets and also talks about how IAM audits and the culture surrounding IAM audits should change.
Tune in to this episode of Ask A CISO to hear:
The Ask A CISO podcast is a production of Horangi Cyber Security, Asia's leading cloud security provider. The show is hosted weekly by cofounder and CEO, Paul Hadjy.
-- Show Notes and Transcript --
-- About Horangi Cybersecurity --
--- About the Guest --
-- Attributions --