Top “Must Do” Steps for Securing Your Public Clouds
Many enterprises have inadvertently exposed proprietary information by failing to properly secure data stored in public cloud environments like Amazon Web Services, Microsoft Azure and Google Cloud Platform. While cloud computing has made it simple to spin up a new server without waiting for IT, this can also be a security nightmare. A simple misconfiguration or human error can compromise the security of your organization's entire cloud environment. Furthermore, "Cloud as an Attack vector"-based threats are increasingly breeding in IaaS, PaaS and SaaS environments to compound organizational risk. Good security hygiene should always be an integral part of any public- or multi-cloud environment, however, this isn’t the reality for many organizations.
Join Netskope for a lively session in which you’ll learn about some common cloud threats and security mistakes made by SecOps and CloudOps admins and how to avoid them.
In this webcast you will learn about:
- How to detect and remediate common misconfigurations in your cloud infrastructure
- How to identify and stop some of the top "Cloud as an Attack vector"-based threats (e.g. cloud phishing, malware, open redirection, coin miner attacks)
- How to follow best practices and maintain continuous compliance in your clouds.
RecordedApr 18 201958 mins
Your place is confirmed, we'll send you email reminders
Chris Scheels, Director of Product Marketing, Cyxtera
VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?
Join this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.
- VPNs cannot support your move to Zero Trust
- Managing VPNs is too complex for delivering granular access to a mobile workforce
- Eliminating VPNs can deliver Zero Trust secure access to the cloud, DevOps and third parties
Robert Healey | Senior Director Marketing, Asia Pacific, Tenable
Tenable Lumin lets you measure and benchmark your organisation’s cyber exposure, providing comparisons across your organisation internally (business units, geographies, asset classes) and externally against your peers. Using Lumin, you will gain business insights needed to improve strategic decision-making and security posture. Lumin correlates vulnerability data with other risk indicators, such as threat intelligence and asset criticality. It then automatically scores, trends and benchmarks your organization’s cyber risk.
By attending you’ll learn:
- What the Cyber Exposure Score means, how it is calculated and why it matters to your organization
- How you can compare the effectiveness of your internal operations with industry peers and across internal business units
- How you can more effectively prioritize your efforts to reduce cyber risk
- And, answers to your questions during live Q&A
Come learn how leading technology companies are optimizing cloud vendor security assessments by leveraging the recently-released CAIQ-Lite in their workflow. Also learn how and why the CAIQ-Lite came to be, as well as best practices from early adopters.
Takeaways from this webinar include...
- An introduction of the history/creation of the CAIQ-Lite
- Best practices for using CAIQ-Lite to perform security assessments of cloud vendors
- A "behind the scenes" look at how technology companies are using both the CAIQ and CAIQ-Lite in their assessment workflows
Over the past several years, we have developed and implemented Common Controls Framework (CCF) across Adobe, enabling our cloud products, services, platforms and operations to achieve compliance with various security certifications, standards, and regulations such as SOC2, ISO, PCI, HIPAA, FedRAMP and others. CCF is the foundational framework and backbone of our companywide security compliance strategy. It also provides the flexibility to quickly adapt to and tackle new compliance and certification requirements as needed for our business and solutions. We have also open-sourced CCF for other peer industries to leverage it for their compliance goals.
As the next level of organic maturity for the CCF strategy @ Adobe, we are now developing and implementing a controls automation framework which will help enable near real time monitoring of the controls operating effectiveness. The CCF controls automation framework is intended to change the controls testing strategy from a point in time/reactive mode to near-real time monitoring, tracking and alerting. This mode of controls assessment via automation not only increases the frequency of testing, but also enable quicker remediation to reduce the risk of controls failure. This framework will also enable with scaling the CCF controls framework by making it easier for new services and product teams to onboard the controls as well as help eliminate the compliance fatigue imposed on the operations and engineering teams, and still reducing risk. During this webcast we will share the automation platform that is being built by Adobe and how it aligns with CCF and Adobe’s approach towards faster adoption of controls.
Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS, Palo Alto Networks
Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is changing the approach for securing access to them. The right security capabilities will allow you to address risk while having you ready for tomorrow.
Dan Mellen, Accenture & Robert Scheutter, Valvoline & Lamont Orange, Netskope & Nate Smolenski, Netskope
Are you experiencing these common challenges in your cloud security program?
There is no question that the way we work has changed with the rise of cloud and the widespread access to mobile devices. This shift in how we work requires us to also shift how we think about security when it comes to the cloud.
Listen in as our panel of C-Level security leaders discuss common obstacles CISOs encounter when moving to the cloud and how you can overcome them.
Topics covered include:
- Tackling privacy regulations
- Protecting your company's sensitive data
- Shifting your existing security strategies to be more cloud-focused
Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. This new standard offers strong authenticators such as Touch ID or Face ID directly from your browser to keep attackers out while delivering first-class authentication experiences.
Watch this webinar to learn about:
- Use cases: Understand how the new standard enables low friction, phishing-resistant authentication
- Technology: Peak beneath the hood and see the core technical concepts that comprise WebAuthn
- User experience: Look at the user registration and authentication flows
- Business impact: WebAuthn helps security and product forge mutually aligned objectives
It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users.
While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization.
- Identity attacks that exploit insecure methods of authentication
- How to add a smart layer of security over your critical apps, services, and devices
- What to look for in a multi-factor authentication solution
Matthew McKenna, VP of International Operations at SecurityScorecard
This session will explore the emerging regulatory trends in Vendor Risk Management in APAC and demonstrate how Security Ratings can play a key role in supporting enterprises in the establishment of strong governance and compliance oversight for their vendor landscape.
The session will use a case study based approach and share with you how security ratings work, how to apply them, and how to leverage them to meet the emerging compliance mandates.
Amelie Darchicourt, Cloud Product Marketing Manager & Eric Thomas, Director of Cloud Product Marketing, ExtraHop
Without native network visibility in the cloud, enterprises have been limited to log or agent centric tools to support their cloud migration and to secure their workloads, making it challenging to detect and investigate complex threats in a timely manner. The introduction of Microsoft Azure V-Tap and Amazon VPC Traffic Mirroring finally provides access to context-rich network data for threat detection, investigation and response.
Join this webinar to learn how to gain visibility in your cloud workloads by leveraging the new network tap features released by the leading public cloud providers. During this session, Amelie Darchicourt, Cloud Product Marketing Manager at ExtraHop, will present the benefits of adopting a cloud-first approach to Network Detection and Response (NDR) and will share insights about how SecOps teams can hold up their side of the shared responsibility model and deliver unified security across the hybrid attack surface.
Steve Perkins and Erik Freeland of Nubeva & Anoop Dawani of AWS
Encryption of all traffic in the cloud is a widely adopted best practice. The new TLS 1.3 standard with Elliptic-Curve Diffie Helman (ECDH), perfect forward secrecy and ephemeral keys renders most traditional decryption methods ineffective and out-of-band decryption essentially impossible. Combined with the distributed and elastic nature of cloud computer architectures and the use of third party services, enterprises have been forced to choose between security and visibility or between security and modern architectures.
Join us for a “How To” webinar covering the newest possibilities for decryption in the public cloud. During the session, Steve Perkins, Chief Product Officer and Erik Freeland, Director of Customer Success at Nubeva, will discuss the complications and opportunities surrounding the new TLS 1.3 protocols. They will walk through how organizations can implement encryption best practices and also gain full decrypted traffic visibility for intrusion detection, threat hunting, incident response and beyond with the newly announced Amazon VPC traffic mirroring and industry-leading open source monitoring tools.
Tom Cignarella, Director, Security Coordination Center (SCC) at Adobe
Ten years ago, security leaders couldn’t wait to tell you about their cutting edge use of Linux – nowadays, that’s considered table stakes. Today, the big buzzwords are AI and machine learning – and for good reason. With the computational power we have today, we can apply straightforward math tricks to data and surface insights that are not only interesting and valuable but also may not have been possible five or ten years ago – helping us become faster, more effective and increasingly innovative in our approach to defending systems from the evolving threat landscape we face today.
While the excitement around machine learning is deserved, Tom believes that much like Linux, it will eventually be something everyone in security is doing. In this webcast, Tom will outline how machine learning fits into the broader cyber security toolbox as a tool to augment – not replace – security teams, surfacing data-based insights and automating mundane, time-consuming tasks to free up precious security analysts time. He’ll also include key learnings from Adobe that security organizations should keep in mind as they explore machine learning, including the type of talent needed to succeed and the importance of good data.
Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. In fact, spending on cloud infrastructure services will grow from $39.5 billion in 2019 to $63 billion through 2021 [according to Gartner].
However, when transitioning to the cloud, it’s critical to understand that cloud security is a shared responsibility between the cloud service provider and the customer. The cloud service provider typically secures the core infrastructure and services while securing operating systems, platforms, and data remains the responsibility of the customer.
As your organization formulates a cloud security strategy, it is important to remember that the #1 cause of today’s breaches is privileged access abuse. And it takes just one single compromised privileged credential to impact millions of data records and result in millions of dollars in fines.
To limit their exposure to these attacks, organizations need to move to an identity-centric approach based on a Zero Trust model: “never trust, always verify, enforce least privilege”. This concept should be extended to the organization’s workforce, as well as partners, privileged IT admins, and outsourced IT.
Our webinar, Best Practices for Securely Moving Workloads to the Cloud:
- Reviews the state of cloud computing;
- Details the key threats for cloud environments;
- Identifies 6 best practices for boosting cloud security confidence in a world of Zero Trust;
- Showcases how to apply these best practices to critical privileged cloud access use cases;
- Shares a customer success story; and
- Outlines the benefits of Zero Trust Privilege.
Robert Healey | Senior Director Marketing, Asia Pacific, Tenable
Security teams are frequently blind to the IT and Operational Technology (OT) assets, internal and external connections, and vulnerabilities on their industrial control system networks. This visibility gap is one of the key challenges highlighted in a new survey report from the Ponemon Institute.
To learn more about the report and how its findings compare with your organization’s experience, please join Robert Healey, APAC Marketing Director, Tenable, for the webinar: “Cybersecurity in Operational Technology: 7 Insights You Need to Know.”
All infosec professionals responsible for and interested in effectively securing converged IT/OT environments are encouraged to join this webinar.
Miju Han, Director of Product Management, HackerOne
Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. Using 6 years of data from 1,300+ bug bounty programs & 100,000+ valid vulnerabilities, this talk offers new analysis of the most common vulnerabilities not found on the OWASP top 10.
Thomas Robinson, Solution Architect, AWS & Dan Hubbard, CEO, Lacework
Using containers in AWS enables agile orchestration of application capabilities and require less coordination and oversight than on-premises or virtualization infrastructure. While containers allow you to build and release fast, security teams need to assess how they maintain security for these new capabilities.
In this session, experts from AWS and Lacework will explain how to use Amazon Container Services to easily deliver applications, and how to automate container security so you can enable your DevOps team to build fast while remaining secure.
In modern cyber battlefield, we face new threats daily where signatures are not necessarily known. Identifying these anomalies in regular behavior is the core of User Behavior Analysis (UBA). Common UBA applications include detection of malicious insider threats, privilege misuse, and compromised accounts. Analytics tools help make sense of varied information provided by security systems to identify potential risks. At Adobe, we generate vast amounts of security data in form of application, system and other logs. In addition, we have environment context data like employee role details and configuration management database (CMDB) data. This security data is an immense source of security intelligence. If collected diligently, the answers are already present, but the trick is to ask the right questions. This information can be compared against a security standard to find security gaps that need to be remediated, which is reactive security. However, if we use machine learning techniques and other analytics tools to ask the right questions, we can proactively identify anomalous activities.
All of this is part of our broader strategy around Project ZEN – our zero-trust enterprise network initiative first introduced to the ISACA audience at CSX 2018. This talk will dive into more specifics about how ZEN works – specifically around UBA. We leverage UBA to help meet the most recent NIST guidelines around user passwords and remove the need for password changes at regular intervals. We will provide summit attendees with a blueprint they can use for a significant part of their own zero-trust network efforts. We hope that you can learn best practices from our approach that you can leverage in implementing more effective UBA at your organization.
Christopher Scheels, Director of Product Marketing, Cyxtera
Zero Trust is trending. Every expo show floor is inundated with this concept that promises to transform of corporate security from a well-known failed perimeter-centric model. In this session, we will discuss what is Zero Trust, why are enterprises adopting it to fix some of security’s biggest challenges and how to get started.
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. It also allows audience members the opportunity to earn (ISC)2 CPE Credits.
Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa, @CSAResearchGuy
Top “Must Do” Steps for Securing Your Public CloudsGreg Mayfield, Sr. Director, Product Marketing & Michael Koyfman, Principal Global Solution Architect at Netskope[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]58 mins