Cloud Security , Incident & Breach Response , Next-Generation Technologies & Secure Development

Data Protection: Data Has No Jurisdiction

Skyhigh Security's Rodman Ramezanian on Securing Data From Devices to the Cloud
Data Protection: Data Has No Jurisdiction

"Data is the new oil" is an increasingly popular refrain, and there's no doubting data's importance in keeping the wheels of business in motion. Today's data also is highly prized by cybercriminals, said Rodman Ramezanian, global cloud threat lead at Skyhigh Security.

In fact, over 80% of data breaches are instigated by financial motives, according to Verizon's 2022 Data Breach Investigations Report.

Nowadays, Ramezanian said, data flows from devices through the web to the cloud. It is accessible everywhere, anytime, and is constantly growing as it moves throughout an organization. Vast amounts of data are flowing from internal and external sources, and as a result, data has no jurisdiction, he said.

"Imagine how difficult the task of protecting that data across all these different scenarios becomes, especially when security teams don't have a standardized platform or methodology to get visibility, governance and control of their data wherever it goes," Ramezanian said.

In this podcast with Information Security Media Group, Ramezanian discussed:

  • The underlying threats to data and why they continue to pose risks;
  • How security teams can ultimately defend themselves and remain secure;
  • The mindset security leaders must embrace in the future.

Don’t miss other installments of this podcast series, including Overcoming Federal Sector Compliance Regulation Challenges.

Ramezanian has over 11 years of cybersecurity experience. At Skyhigh Security, he is responsible for technical advisory, enablement, solution design and architecture, and he primarily focuses on Australian federal government, defense and enterprise organizations. He specializes in adversarial threat intelligence, cybercrime, data protection and cloud security. Ramezanian has a passion for articulating complex matters in simple terms to help the average person and new security professionals understand the what, why and how of cybersecurity.

Download the e-book of the podcast.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.