Application Security , Governance & Risk Management , Next-Generation Technologies & Secure Development

Cross-Vertical Data Security Strategies

Imperva's Ron Bennetan on Data Risk and Visibility in the Cloud
Ron Bennatan¸ Senior Vice President and General Manager, Data Security, Imperva

With digital transformation come new applications and efficiencies in the cloud. But governance, visibility and access challenges also emerge. Ron Bennetan of Imperva shares strategies for improving data governance and security in the cloud.

Bennetan, Senior Vice President and General Manager, Data Security, at Imperva, discusses cross-vertical data security strategies, including:

  • The benefits and challenges of digital transformation;
  • How adversaries are taking advantage of defensive gaps;
  • Best practices for gaining visibility and assessing risk of data in the cloud.

Bennatan joined Imperva through the acquisition of jSonar, where he served as CTO and co-founder. He has been a “data security guy” for 25 years and has worked at companies such as J.P. Morgan, Merrill Lynch, Intel, IBM and AT&T Bell Labs. He was co-founder and CTO at Guardium, which was acquired by IBM, where he later served as a Distinguished Engineer and the CTO for Data Security and Governance.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.