“Every cloud conversation should be also a security conversation,” says Anna Van Wassenaer, Cloud Business Development Leader, Europe, for IBM Security Services.
Abhijit Chakravorty, Partner & Cloud Security Competency Leader for IBM Security, joins Van Wassenaer for a conversation about why cloud strategy should go hand-in-hand with a security strategy. The conversation covers the cloud threat landscape; balancing CISO, CIO and developer objectives for cloud migration; and advice on where to start when developing a cloud security strategy.
For more on cloud security, visit the SecurityIntelligence blog: https://securityintelligence.com/category/cloud-protection/
All content for Security Intelligence Podcast is the property of IBM Security and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
“Every cloud conversation should be also a security conversation,” says Anna Van Wassenaer, Cloud Business Development Leader, Europe, for IBM Security Services.
Abhijit Chakravorty, Partner & Cloud Security Competency Leader for IBM Security, joins Van Wassenaer for a conversation about why cloud strategy should go hand-in-hand with a security strategy. The conversation covers the cloud threat landscape; balancing CISO, CIO and developer objectives for cloud migration; and advice on where to start when developing a cloud security strategy.
For more on cloud security, visit the SecurityIntelligence blog: https://securityintelligence.com/category/cloud-protection/
Time Is (Still) Money and Other Findings from the 2020 Cost of a Data Breach Report
Security Intelligence Podcast
24 minutes 22 seconds
5 years ago
Time Is (Still) Money and Other Findings from the 2020 Cost of a Data Breach Report
What are the top findings from the Cost of a Data Breach Report 2020? Charles DeBeck, a cyber threat intelligence expert with IBM X‑Force IRIS, talks about what drives costs higher for some organizations. "We observed a growing divide between organizations that were well prepared and organizations that weren't," DeBeck says.
DeBeck covers more highlights from the report, including top root causes such as cloud misconfiguration and compromised credentials. He also shares what the study found were the most successful security measures for mitigating costs: security automation and incident response readiness.
View highlights and download the report: https://www.ibm.com/security/digital-assets/cost-data-breach-report/
Security Intelligence Podcast
“Every cloud conversation should be also a security conversation,” says Anna Van Wassenaer, Cloud Business Development Leader, Europe, for IBM Security Services.
Abhijit Chakravorty, Partner & Cloud Security Competency Leader for IBM Security, joins Van Wassenaer for a conversation about why cloud strategy should go hand-in-hand with a security strategy. The conversation covers the cloud threat landscape; balancing CISO, CIO and developer objectives for cloud migration; and advice on where to start when developing a cloud security strategy.
For more on cloud security, visit the SecurityIntelligence blog: https://securityintelligence.com/category/cloud-protection/