t cht lk
t cht lk
James Wright , Senior Director , Asia Pacific and Japan , Cloudian system controls , testing , monitoring , evaluation and reporting .
And as the Government moves to reshape the cyber legislative landscape to support the Cyber Security Strategy , new requirements may come into effect .
It ’ s also well established in the cyber security industry that there ’ s no way to fully shut out cybercriminals , which means organisations using more data for more uses need to think creatively .
With this in place , companies can reinject their crown jewel data without needing to pay the ransom and keep operating , selling and using tools like AI and data lakehouses to help them do that .
Whether they understand the lakehouse world or not – Australian organisations need to understand that security and sovereignty must be prioritised when spending time there . p
They have to create an immutable , unencryptable version of their key data , siphoned away from cybercriminals even after they infiltrate .
Data sovereignty is important in this context as data lakehouses regularly use public cloud infrastructure to host data , meaning that data can be removed from Australian shores and be accessible from abroad .
Immutable copies of sensitive and critical datasets should be kept on-premises , regardless of the rounds they ’ re doing at the lakehouse .
www . intelligentcio . com INTELLIGENTCIO APAC 77