Data Loss Prevention (DLP) , Endpoint Security
Beyond DLP: Embracing the New Necessities of Data Security
Cyera’s Yotam Segev on Need for DSPM and Enhanced Data Protection in Age of Gen AIData loss prevention tools have served their purpose over the years, but because of their inflexibility and push back from users, they never really caught on. It's time to adopt a more dynamic approach offered by data security posture management, advised Yotam Segev, co-founder and CEO at Cyera.
Digital environments are become increasingly complex as employees use external AI engines and large language models to analyze data, which is creating a "much, much more stressful situation" for security teams. Organizations should embrace the proactive capabilities of DSPM before it's too late, he said.
"At the heart of that is the ability to differentiate between the data that matters and the data that clutters because 98% of our data, we are absolutely fine with is going outside to these LLMs," he said. "But there are specific data types, specific documents and specific information that we really, really don't want to make it there."
In this video interview with Information Security Media Group, Segev discussed:
- The need for organizations to adapt to the changing digital landscape to secure their sensitive data;
- The integral role of DSPM in modernizing data security frameworks;
- How Cyera customers are using DSPM to gain unprecedented visibility over data.
Segev, who co-founded and leads Cyera, is a seasoned technology executive with over 15 years of experience in the software industry. He previously served as the head of the cyber department for Israeli Military Intelligence, Unit 8200, where he co-founded and ran the unit's cloud security division. Segev assumed that role after completing the Israeli Defense Forces' Talpiot program, where he served as cyber team lead. A frequent speaker at industry conferences and events and a recognized thought leader in the technology, data security and cybersecurity fields, Segev is passionate about the role of technology in solving complex data security and business challenges.