Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Vulnérabilités & Cloud Public : comment les détecter et les neutraliser Thomas Gressot, Solution Architect, EMEA & CALA Avec près de 70 % des workloads des entreprises exécutées dans le cloud, la protection des environnements cloud public contre les fuites de données es... 1 month ago | 42 mins Cloud Infrastructure Entitlement Management (CIEM): Another Security Acronym Eric Kedrosky, CISO & Director of Research, Sonrai Security and Dave Shackleford, Principal, Voodoo Security In the effort to keep your cloud secure, are you monitoring all your cloud identities - person and non-person - and their entitlements? Probably not, ... 1 month ago | 49 mins Build a Multi-cloud Strategy that Supports Governance and Compliance Panel of experts Spreading operations across more than one cloud enables organizations to choose from a variety of cloud services to cut costs, improve operations and ... June 15, 2022 3:00pm CSPM Best Practices for Multi-Cloud: Beyond Native Tools Alba Ferri, Security Product Marketing, Sysdig; Brandon Dunlap, Moderator As multi-cloud adoption accelerates, security teams are navigating the delta between each cloud provider’s native capabilities and comprehensive prote... 2 months ago | 56 mins Strengthen Your Cloud Security Posture: How to Evaluate Cloud Security Platforms Andy Ellis, Advisory CISO; Sagy Kratu, Dir, Technical Enablement; & John Alexander, Sr. Dir, Technical Product, Orca Security Cloud Native Application Protection Platforms (CNAPP) aim to strengthen cloud security with a robust set of capabilities within a single, unified plat... 2 months ago | 29 mins Supercharge your AWS security posture using identity and data controls Jeff Moncrief, Field CTO & Director of Solutions Engineering Identity and data permissions in AWS, properly used, will allow you to deliver security far superior to anything possible in a data center world. How... 2 months ago | 36 mins The Boulevard of Broken Buckets Tod Beardsley, Director of Research at Rapid7 and Bob Rudis, Senior Director, Chief Security Data Scientist at Rapid7 Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they loo... 5 months ago | 41 mins Moving from Cyber Security to Cyber Resiliency in the Cloud Grant Asplund, Chief Cyber Security Evangelist at Check Point Software Technologies How can cybersecurity catch up to the business, while still maintaining a dynamic, resilient, and secure operation? Transitioning and operating in th... 5 months ago | 31 mins Threats of Cloud Computing and Cloud Security Posture Management Se-Eun LEE (Member, CSA Korea Chapter) In Korean Language Cloud Computing has completely different features from the existing on-premise environment. Assets are in flux and complex. In ad... 6 months ago | 18 mins How I got ‘X-ray and thermal vision’ across our public cloud infrastructure Michael Meyer, Chief Risk and Innovation Officer of MRS BPO, Patrick Pushor, Technical Evangelist, Orca Security In this presentation learn about: - 5 risks hiding inside every public cloud estate - How to get instant-on, workload-level visibility across 100% of... 7 months ago | 57 mins Load more