Hi [[ session.user.profile.firstName ]]

Platform as a Service: Build Cloud Applications Rapidly and Reliably

CloudWATCH webinars aim to evangelise the merits of cloud services to SMEs and governments. This particular session on building cloud applications will explain Platform as a Service. Cloud technologies, such as Bluemix, make app development easier, more practical, and cost effective. Also, Achille Pinson, founder of PrepMyFuture.com, will share his experience as a cloud service provider close to app developers in education related apps. We offer the opportunity to ask questions in this interactive webinar.

Jonathan Sage, IBM Government and Regulatory Affairs
Mike Edwards, Senior Technical Staff Member at IBM's Hursley Park labs
Achille Pinson, PrepMyFuture.com founder
Recorded Mar 19 2015 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jonathan Sage, IBM; Mike Edwards, IBM; Achille Pinson, PrepMyFuture.com
Presentation preview: Platform as a Service: Build Cloud Applications Rapidly and Reliably
  • Channel
  • Channel profile
  • Nefarious Uses of Cloud: A Case Study from Defending a Security Conference Jul 29 2020 6:00 am UTC 45 mins
    Wong Onn Chee, CTO, Resolvo & Co-Chair, CSA APAC Research Advisory Council
    As organisations increasingly move to the cloud, so do the attackers. Come and listen to Onn Chee on how the cloud was used to attack a security conference's websites on the cloud, the profile of the attackers from cloud and how did the conference organisers defend against them. In addition, Onn Chee will share on lessons learnt and a new pro-active approach to cloud defense by looking at IoR - Indicators of Reconnaissance - which is the first step in the Cyber Kill Chain, instead of IoC - Indicators of Compromise - to achieve faster and pre-emptive disruption to the Cyber Kill Chain.
  • Emerging Top Threats in Cloud Computing – What We Can Do About Them Jul 15 2020 6:00 am UTC 45 mins
    Moderator : Jim LIM, Panelists: Raju CHELLAM | Nigel LIM | Steve NG
    With cloud becoming the preferred IT infrastructure, understanding the emerging security threats is important. A recent CSA study showed that traditional cloud security issues (such as DDoS, shared technology vulnerabilities, CSP data loss and system vulnerabilities) that are under the responsibility of CSPs are now overshadowed by the need to address security issues that are situated higher up the technology stack which are the result of senior management decisions (such as misconfiguration, inadequate change control, and a lack of cloud security architecture and strategy). Please join our panel of industry experts to appreciate the shifts in cloud security issues.
  • Key Security Controls & Practices for Moving to the Cloud: A CISO’s Perspective Jun 25 2020 4:00 pm UTC 45 mins
    Mark O’Hare, CISO, Mimecast
    In Cloud We Trust

    While Mimecast is a significant cloud security services provider to more than 38K organizations, we also rely heavily on cloud-based IT and security services to run our own business. Like all global organizations this digital transformation of our organization, with nearly 2K employees, didn’t happen overnight, didn’t happen without a plan, or without some bumps in the road. In this session Mimecast’s CISO for the last 9 years, Mark O’Hare, will review and discuss Mimecast’s transition to the cloud, how it eased our rush to completely work from home in mid-March, and what challenges we came across and how we overcame them.
  • How to Automate and Accelerate the Design of Secure AWS Cloud Environments Jun 24 2020 4:00 pm UTC 60 mins
    Archie Agarwall of ThreatModeler, Yeukai Sachikonye of AWS & Reef D'Souza of AWS
    Moderator: Ty Sbano, Chief Security & Trust Officer, Sisense

    Learn how to easily build an accurate architecture diagram for AWS services in under an hour, driving security fixes for threats quickly. DevSecOps can achieve consistent deployments of complete, security vetted design patterns, while reducing time-cost expenditures on threat modeling by 85%. Understand how this proactive approach reduces security efforts in infrastructure and application designs, increases efficiency in security control decision making and reduces overall risk.

    In this webinar, AWS Security Epics Automated and Threatmodeler will cover how to...
    - Identify latent security risks
    - Prioritize security backlog for Infrastructure-as-Code (IAC) development
    - Automatically generate secure CloudFormation
    - Highlight threat model drift from the live environment
    - Keep threat models synchronized with AWS environments using real-time updates
    - Increase sprint and epic velocity with prescriptive guidance from AWS knowledge-bases
  • Cloud Incident Response Need Not be Reactive Jun 24 2020 6:00 am UTC 45 mins
    Alex Siow, Chairman CSA Singapore Chapter
    In today’s connected era, a comprehensive incident response is an integral aspect of any organization aiming to manage and lower their risk profile. A good incident response needs to be useful not only when dealing with incidents caused by malicious threat actors, but should also be applicable in a variety of other situations such as downtime caused by an unexpected power outage or cut internet fiberfra due to roadworks. There are, however, different considerations when it comes to incident response for cloud-based infrastructure and systems, due in part to the nature of its shared responsibility.

    Additionally, with a number of incident response standards, frameworks and guidelines available, it could be confusing for cloud providers and users to make sense of them for their cloud incident response (CIR) procedure. CSA’s CIR Framework will serve as a go-to guide for cloud users to effectively prepare for and manage the aftermath of cloud incidents, along with serving as a transparent and common framework for CSPs to share cloud incident response practices with their customers.

    This talk will cover key contributions of the CIR Framework to the cloud community, and also make available a Quick Guide that distils the main objectives and overview of the CIR Framework.
  • See FIDO Run: Passwordless, From the Ground Up Jun 11 2020 4:00 pm UTC 60 mins
    Nick Steele, Senior R&D Engineer, Duo Labs
    Duo has been part of the passwordless authentication conversation from the start, as early adopters of the WebAuthn protocol and one of the first strategic partners of the FIDO Alliance. Advances like WebAuthn enable faster, easier, and more secure authentications, such as utilizing fingerprint readers already embedded in many of today's latest laptops. This fits our long term goal to simplify and reduce the number of authentication prompts while keeping logins secure and easy to use.

    Join Nick Steele, Senior R&D Engineer at Duo Labs, for a discussion of recent advancements in the passwordless evolution, why vendors are starting to embrace a passwordless experience, and how tools available today can help move us closer to a post-password world.
  • How to See AWS Workload-Level Risks Without Agents Jun 9 2020 5:00 pm UTC 60 mins
    Aaron Brown, Cloud Security Engineer, Sisense | Sounil Yu, CISO-in-Residence, YL Ventures | Avi Shua CEO Orca Security
    Learn modern AWS security best practices with Sisense, Orca Security, and Special Guest Sounil Yu, Former Chief Security Scientist, Bank of America

    We’ll start off with Sounil Yu, the former Chief Security Scientist at Bank of America, who will explain how to use his Cyber Defense Matrix to gain a thorough understanding of cloud security.

    Then we’ll dive into the practitioner’s perspective with Sisense Cloud Security Engineer Aaron Brown, who will speak to the challenges around rapidly scaling cloud infrastructure, while still maintaining security and visibility into your assets.

    Aaron and Sounil will be joined by Avi Shua, CEO and co-founder of Orca Security, former chief technologist at Check Point Software Technologies. It’s going to be a fast-paced hour as we start with the theoretical and quickly dive all the way down into Aaron’s “notes from the field”.

    Get ready to ask your toughest AWS security questions as we discuss:

    - How to use the Cyber Defense Matrix to gain a thorough understanding of cloud security

    - The 6 risks hiding inside every large AWS environment

    - Technical takeaways, advice, and pitfalls to avoid from Sisense

    - Pros and cons of different cloud security tools: AWS GuardDuty, traditional agent-based tools and scanners, and CSPM (cloud security posture management)

    - New approach to quickly eliminating hidden risks
  • The S in IoT stands for Security Jun 3 2020 6:00 am UTC 45 mins
    Moderator: Suresh AGARWAL, Panelist: Aleksandar ANDRIC | ​Jim LIM | Haojie ZHUANG
    Internet of Things (IoT) and connected devices promise tremendous benefits and a new wave of business opportunities. This hype is best balanced with caution especially with respect to security. Along with new revenue opportunities, IoT introduces points of vulnerability for data thefts and loss of device control. Such data breaches and loss create negative impact on a large scale. With devices connected to the Internet, the large attack surface offers numerous points of peril. Come and learn from our panel of experts on the risks and how to manage the perils effectively before you embark your IoT journey.
  • Build a Robust App Control Strategy for your Cloud Workloads Jun 2 2020 2:00 pm UTC 60 mins
    Itai Tevet, CEO at Intezer
    The use of application control (also known as whitelisting) is considered to be a robust and essential Cloud Workload Protection strategy largely due to the high predictability of cloud environments.

    But it does not prevent all cyber attacks. Attackers can exploit vulnerabilities in trusted applications or utilize whitelisted apps for malicious intent—referred to as “Living off the Land.” App control also presents some operational headaches, requiring strict and often unrealistic policies.

    This webinar explains how to build a robust application control strategy that is informed by these challenges. Learn what capabilities you should consider when evaluating a Cloud Workload Protection Platform (CWPP).
  • Cybersecurity, Data Protection Policies, and Cloud Adoption in APAC Recorded: May 27 2020 45 mins
    Lim May-Ann, Executive Director, ACCA
    Over recent months, there has been an increasing number of cyber-breaches being reported in Asia Pacific, particularly from the public sector. Yet there have also been an increasing number of cybersecurity and data protection policies being put in place. Are these sufficient to assuage the public’s concerns about cloud computing and shared services? What are the trends in cybersecurity and data protection regulations within the Asia Pacific and ASEAN region?
  • CSA STAR Town Hall - Governance, Risk and Compliance in the Cloud Recorded: May 26 2020 61 mins
    Douglas Barbin of Schellman | Larry Greenblatt of QAD | Shaun Van Niekerk of NHS | John DiMaria of CSA
    This session will provide a thorough overview of GRC in the cloud, from awareness to procurement expectations, to implementation to certification/Attestation.

    Our panel includes a Cloud Service Provider, Cloud User and Certifying Body who will discuss all sides of cloud security peeling back and revealing those layers of accountability and responsibility between Cloud Service Providers and their Tenants, applying measurable risk-based decision making for both assessing and attesting to governance, risk and compliance best practices.

    Additionally, this panel is here to answer your pressing questions. We urge attendees to submit questions before the session and we will use them for our panel through twitter using hash tag #CSATOWNHALL
  • CSA's Executive Series: Connectedness and Data Privacy in the Cloud Era Recorded: May 20 2020 28 mins
    Jerry Archer, SVP & Chief Security Officer, Sallie Mae
    As businesses are transitioning to new cloud services increasing their connectedness, it creates new issues like decreased visibility, new obscure vulnerabilities and cyber criminal opportunities. Simultaneously, new laws like GDPR and CCPA require data owners and aggregators to have visibility and understanding who is capturing, accessing, and using and the security around it. Techniques such as tokenization, data masking, data substitution and field encryption are being used to lower the risk of sensitive data exposure. While these techniques may satisfy data breach laws, the court of public opinion does not yet understand or appreciate these technologies.

     In this webinar, Jerry Archer, CSO of Sallie Mae will discuss liability, data lineage, retention, deletion and other aspects of the proliferation of cloud based services as well as considerations as businesses transition to the cloud.
  • Thinking Like a Cybercriminal Recorded: May 19 2020 64 mins
    Etay Maor, Chief Security Officer, IntSights
    We read about hacks and breaches on a daily basis, but what do we actually know about these cybercrime groups and how they conduct these attacks?

    In this session, we will dive into basic hacking techniques, demonstrate what types of tools hackers are using today, examine the scope of these attacks, and discuss best practices on how to protect ourselves and our businesses. During the session we will review security issues with people, process and technology, see how OSINT (Open Source Intelligence) is leveraged for social engineering attacks and review some of the latest attacks seen in the wild. We will close the session by examining how to operationalize threat intelligence using security frameworks such as MITRE ATT&CK framework in conjunction with cyber threat intelligence best practices.
  • Creatively Scaling Application Security Coverage and Depth Recorded: May 14 2020 61 mins
    Prithvi Bisht, Senior Manager of Secure Software Engineering at Adobe
    One of the biggest challenges and opportunities for an application security (AppSec) team in a cloud-centric world is to scale effectively. The general “shift-left” recommendation for security in the software development life cycle (SDLC) emphasizes early course correction to help bake in security controls and to reduce potential cost of changes introduced later in the SDLC. Shifting left then entails finding potential security concerns and the need for security controls by reviewing artifacts produced in requirements, architecture, design and coding phases. Unfortunately, outside of the coding phase, adding security in earlier phases can be mostly a manual activity. This limits security coverage and depth of exploration of products often manifesting as potential blind spots in product portfolios. As we move through the phases of the SDLC, the artifacts describe “intended” system functionality that may behave differently when implemented. The divergence in translating intentions (e.g. requirements/design) into reality (e.g. code) is, unfortunately, how bugs (including security) can get introduced.

    Join Prithvi Bisht, senior manager of secure software engineering at Adobe, as we discuss these challenges as well as potential solutions to help you better scale your own application security efforts.
  • Shifting Cloud Security Left to Protect Data & Customers Recorded: May 12 2020 40 mins
    Sadi Steffl, Cyber Security Analyst at ViacomCBS Digital & Chris DeRamus, CTO at DivvyCloud
    Sadi and Chris will explore how her team at ViacomCBS Digital have shifted cloud security left in order to prevent issues from ever manifesting, deliver better experiences to developers, and be able to meet the rapidly scaling demand for cloud computing. This approach has enabled a lean team to support dozens of business units as they harness the power of public cloud in the production and distribution of online content covering news, sports, entertainment, technology, and business drawing in over millions of viewers making it the 6th largest internet brand. They will also dive into the important facets of making cloud security continuous including visibility, prevention, detection, remediation, automation, and reporting.
  • Break the Top 10 Cloud Attack Kill Chains Recorded: May 7 2020 61 mins
    Rich Mogull, VP Product, disruptOps
    As cloud adoption matures, so do cloud attacks. This session will highlight the top 10 cloud kill chains and how to break them. The presenters will lay out each step of the chain, which are the easiest to snap, and which common security defenses work across multiple chains.
  • How to Start Secure and Stay Secure with Cloud Best Practices Recorded: May 5 2020 22 mins
    Center for Internet Security
    The Center for Internet Security (CIS) provides organizations with a collection of integrated cybersecurity resources to help users evaluate and apply secure configuration settings to various cloud environments. With our global community of cybersecurity experts, we develop the CIS Controls and CIS Benchmarks. These best practices offer prescriptive guidance and configuration recommendations for various technology groups to safeguard systems against today’s evolving cyber threats. From foundational security recommendations to pre-hardened virtual machine images available on major cloud computing platforms, CIS provides resources to start secure and stay secure in the cloud.

    What You Will Learn
    - What resources are available at no cost?
    - How to apply and interpret the CIS Controls Cloud Companion Guide.
    - How to apply and interpret the CIS Foundations Benchmarks.
    - How CIS Hardened Images are built and maintained.
    - The benefits of utilizing CIS Controls, CIS Benchmarks, and CIS Hardened Images.
  • Securely Enable Your Remote Workforce Recorded: May 1 2020 35 mins
    Lior Cohen, Sr Director Product Marketing from Fortinet & Sameer Vasanthapuram, Solutions Architect from AWS
    Join Lior Cohen, Sr Director Product Marketing from Fortinet and Sameer Vasanthapuram, Solutions Architect from AWS to learn about how you can leverage the dynamic nature of cloud security to improve remote productivity, digital transformation initiatives and rapidly address the immediate needs of your organization. In this session you will learn about technical considerations, solutions and technologies that will help you:
    - securely enable remote access for very large user populations
    - securely enable access to business critical and sensitive web applications
    - and extend on premise security functionality to control various AWS end user productivity services.
  • A recipe for automating privileged access into your DevOps pipeline Recorded: Apr 30 2020 43 mins
    Tim Keeler and Paul Lanzi, Co-founders, Remediant
    Engineering teams are adopting DevOps as a way to improve time to market and ensure high availability. In addition, these teams are becoming more and more distributed as a way to access a broader talent pool, drive down fixed costs and improve employee retention.

    What this implies, especially in firms with a technology heavy workforce, is that you now have more privileged users (e.g., engineers, DevOps, SRE) than ever before deploying on cloud infrastructure and operating with elevated privileges over a remote connection.

    Join us as former security practitioners (Genentech, Roche) and Remediant co-founders Tim Keeler and Paul Lanzi discuss a re-imagined privileged access management model for this new paradigm. In addition, they will also demo a practical implementation of this new model.

    After this talk, you will walk away with a blueprint on how you can easily incorporate the following into your cloud workloads:
    - Establish strong, VPN-less authentication and secrets management
    - Enable just-in-time, just enough access to the workload with multi-factor authentication (MFA)
    - Zero-trust authorization through removing standing privilege
  • Managing security in the cloud today VS networks "back in my day" Recorded: Apr 28 2020 61 mins
    Jim Reavis, CEO, CSA | Karen F. Worstell, CEO, W Risk Group | John DiMaria, CSA | Vincent Campitelli, CSA
    In our increasingly interconnected world, the cloud is the answer. Services like Microsoft Office 365, Google Drive and AWS have embraced its ability to store data online and have created services to capitalize on its potential. Data access is never a problem if you have an internet connection. But before the dawn of the Internet, cloud computing didn’t exist. It simply couldn’t. The panel on this session was certainly around before the dawn! That’s why they don’t sweat the challenges that come with the cloud today, because they lived through the early days when solutions to IT Security problems had to be invented as you go “and they liked it”!

    Join us as this distinct panel that represents the “grumpy old people” of security today discuss the evolution of compute and how being in the trenches of the “old days” has allowed them to make significant contributions to better security solutions today.
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. It also allows audience members the opportunity to earn (ISC)2 CPE Credits.

Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa, @CSAResearchGuy

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Platform as a Service: Build Cloud Applications Rapidly and Reliably
  • Live at: Mar 19 2015 1:00 pm
  • Presented by: Jonathan Sage, IBM; Mike Edwards, IBM; Achille Pinson, PrepMyFuture.com
  • From:
Your email has been sent.
or close