Could you please share some insights into your professional journey as APJ Field CISO Director at SentinelOne?
Prateek: The role of Field CISO is very interesting as it focuses on the value proposition of the security initiatives and deployments. This role helps me in cutting the prevailing noise in the industry because of the overwhelming number of jargon, overmarketing, and overpromises of the providers. At the same time, it helps the security leaders climb the maturity curve and define the security charter.
Can you provide an overview of the current cloud security landscape in the Asia Pacific Japan region and explain why it’s becoming an increasingly critical concern?
Prateek: The adoption of cloud technologies and platforms is only accelerating in the APJ region alongside the threat landscape, and the risks are increasing too. With businesses moving their critical business applications, data, and operations to the cloud, they are increasingly being targeted by threat actors as the organizations’ maturity level in cloud security is relatively lower than the traditional architecture. Additionally, the data protection and privacy laws in different countries and regions emphasize the need for cloud security.
According to you, what could be the key strategies and best practices that organizations should prioritize when securing their cloud platforms within the Asia Pacific Japan region?
Prateek: The first step is the realization that the approach to securing the cloud is different from the traditional approaches and understanding the shared responsibility model between the cloud service provider and the client. Cloud is not inherently secured but can be secured with the right policy, configurations, and controls. The journey to securing the cloud should start with Cloud Security Governance.
Can you identify specific challenges that organizations in the Asia Pacific Japan region typically encounter when it comes to maintaining the integrity and security of their cloud-stored data?
Prateek: Security in the cloud is more of an identity and access management issue. When the identities and access to cloud resources such as data storage are configured with secured configuration such as no public access to storage buckets, expiration of API tokens, etc, it will ensure the integrity and security of the data stored in the cloud.
To Know More, Read Full Interview @ https://ai-techpark.com/aitech-interview-with-prateek-bhajanka/
Read Related Articles: