Protecting your cloud-native data is a multi-stage effort. A thorough data discovery and classification exercise, is the starting point on this odyssey. An understanding of cloud host- or product-provided protective capabilities is another critical step. This journey will require iterations that involve multiple and most likely disparate engineering teams – but the end result is a truly stronger security posture. This session will take us through these steps and how to optimally implement them.