Managing and securing your multi-cloud solution which has the different private and public cloud workloads and environments isn't as easy as you might hope. Despite its many benefits, multi-cloud adoption adds extra layers of management complexity, especially when cloud services are added in an ad hoc manner rather than being planned. This complexity creates management and operational challenges and increases operational costs. Even worse, few IT teams have the expertise to manage a mixed deployment of multiple public cloud, private cloud, and on-premises environments.
The right approach for adopting the security framework will enable and protect your business and allow it to maximize the full value of a multi-cloud environment. Thus, True IDC is presenting A New Approach for Multi-cloud Security.
RecordedJul 30 202124 mins
Your place is confirmed, we'll send you email reminders
Kat Traxler Senior Security Researcher and Joe Malenfant, VP of Product Marketing, Vectra AI
The rapid shift to remote work in 2020 saw adoption of public cloud skyrocket. Organizations quickly saw the benefits of public cloud from SaaS based applications, to the agility that PaaS provides. While the pandemic dominated the headlines last year, 2021 will likely go down as the year of ransomware. The question now is: What happens when ransomware targets your cloud infrastructure?
Join senior security researcher Kat Traxler and Vectra AI VP of Product Marketing Joe Malenfant, as they dive into ransomware, and predict where it’s going. You’ll learn:
-How ransomware has evolved and become big business
-How to detect ransomware behavior before encryption
-How ransomware is different in cloud environments (PaaS/IaaS) and what you can do stop it
-Open source tools you can use to test against exposure
Join Ashish Rajan, CISO and host of the popular Cloud Security Podcast and Nathan Burke, CMO at Axonius as they discuss the cloud security challenges facing a CISO in a new role, how to prioritize the fundamentals, and how to optimize and foster a symbiotic relationship with vendors (or at the very minimum how to tolerate them).
- Ashish’s background in cloud security, his world-famous podcast, being a fashion model, and a lion-tamer (only one of these is false).
- Nate’s background and promise that this won’t just be a full-on product infomercial.
- The big challenge: controlling cloud complexity and the confidence to grow.
- How to prioritize cloud security initiatives when joining as the new CISO.
- What are the fundamentals when getting started?
- Cloud security vs. Multi-cloud security - one of these is a fictional character.
- How to set cloud security goals and measure progress.
- The one and only slide about Axonius.
Alexei Rubinstein, Vice President of Sales Engineering at IntSights
The rapid-fire of cybersecurity threats hitting today’s businesses cause many security teams to “live in the moment.” It’s equally important, however, to receive and understand the early indicators cyber threat intelligence (CTI) provides. With these indicators in hand, your team can remediate issues before they become full-blown incidents.
For example, consider what your team could do if it learned that a bot was installed on a single corporate machine, and it was exfiltrating credentials from that machine including those for Citrix and Slack. This is a real-world story of a compromised UK company whose network access was for sale for just $8 USD.
In this session, we will explore the current dark web activity that reveals network compromises and sets the stage for future cyberattacks:
• How CTI provides clues about your company’s vulnerabilities
• What can be done when CTI shows that access to your network is up for sale
• Techniques for integrating CTI into your SecOps processes
Justin Somaini, Unity, Dr. Anton Chuvakin, Google, and Patrick Pushor, Orca Security
Meet Justin Somaini, Chief Security Officer at Unity. Somaini is an expert in securing large environments having done stints as the CISO of Yahoo! and SAP. The scale of operations at Unity is even bigger as their games and experiences reach billions of devices a year, powered in large part by a massive Google Cloud Platform estate as well as multi-cloud.
Upon arriving at Unity, Somaini had a decision to make. Should he focus his initial efforts on preventative controls or on deep asset management with continuous risk assessments?
Somaini will be joined by Google’s Dr. Anton Chuvakin and Orca Security’s Patrick Pushor as they invite you into a lively discussion on:
- How to reduce time-to-remediation by coupling continuous cloud risk assessments with automation
- How deep cloud asset inventory and configuration management can unlock rich enterprise-wide capabilities
- How to eliminate friction between Security and DevOps teams and empower DevOps with ownership of and accountability for security issues
- Selection criteria for choosing a cloud security vendor, including the pros and cons of agent-based tools and scanners, CSPM (cloud security posture management), as well as a new category Gartner is calling Cloud-Native Application Protection Platform (CNAPP)
Dr. LEE Hing-Yan, Stephanie King-Chung HUNG, May-Ann LIM, Ian LIM
The term “data sovereignty” has often been used by stakeholders (including cloud service consumers, cloud service providers, sectoral regulators) to mean different things. Just like the term "cloud computing" in the initial years, there are no widely agreed definitions; so the question "What do you understand by this term ?" naturally arises. Is it about: (a) data residency; (b) data localization; (c) data protection; (d) ... etc. What do these other terms mean anyway? Some parties commented that the above measures are too prescriptive and hide the real motivations, there are indeed innovative solutions to address those motivations. The panel discussion will identify the real motivations for data sovereignty. Some regulated sectors (e.g., finance, healthcare & healthcare) seem most paranoid about data sovereignty; they must have good reasons. Join us as the panelists endeavour to help us to understand the downsides and upsides to data sovereignty.
Moderator: Dr. LEE Hing-Yan (EVP APAC, CSA)
- Stephanie King-Chung HUNG (SVP Cloud Business, Mission Software and Services, Digital Systems, ST Engineering)
- May-Ann LIM (ED, Asia Cloud Computing Association)
- Ian LIM (Field Chief Security Officer, Palo Alto Networks)
WONG Onn Chee (Co-chair, CSA APAC Research Advisory Council & CTO, Resolvo)
Cloud native computing is a new software development approach, not an infrastructure approach as commonly miscontrued. Come and hear what constitutes cloud native and learn more about the various security guidelines from Singapore, NIST and CSA, which can guide you to adopt cloud native computing in a secure manner.
The Multi-Tier Cloud Security (MTCS) Singapore Standard was revised in 2020, and some changes have been made to reflect user concerns and changing technology. We look at what is new, and what is unchanged, and what (in the speaker's biased view) remains undone.
Presented by - Arun Vivek IYER (Head of Cloud & Container Security – Cyber Security Services, Standard Chartered Bank & Co-chair, CCM ABS Mapping WG, CSA)
In the technology space, there are also multiple frameworks and guidelines available, such as the above-mentioned TRM, ISO/IEC 27001 & 27002 and ISACA COBIT. There are also ISO/IEC 27018, the recently published ISO/IEC 21878, FedRAMP and the Cloud Computing Implementation Guide (CCIG) v2.0 issued by the Association of Banks in Singapore (ABS) that are specific to cloud computing and its related technologies. Because of this complex landscape, cross-mapping of frameworks is a useful and popular tool for FIs looking to seek compliance to multiple standards and best practices. This presentation will cover the mapping exercise the CSA WG did to evaluate the similarities and gaps between CCIG and the numerous frameworks mapped in the Cloud Controls Matrix (CCM). Singapore FIs who are already in line with CCIG will benefit through being able to easily identify and fulfill additional controls (gaps) on top of the CCIG to achieve adherence to another targeted framework within CCM, which is useful when expanding to other markets.
Ferdinand FONG, Brendan LAWS, Narudom ROONGSIRIWONG, Faisal YAHYA
Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so pervasive and popular. This panel of experts will endeavor to address the following issues: What are the differences between hybrid and multi clouds? What are the risks in a hybrid cloud environment compared to on-prem and how does one go about mitigating each of these risks. How does one assess the effectiveness of these mitigation measures? And finally how would these mitigation measures benefit organizations/businesses?
Moderator: Ferdinand FONG (Chair, Protem Committee, CSA Sarawak Chapter)
- Brendan LAWS (Director, Solutions Architecture, Rapid7)
- Narudom ROONGSIRIWONG (Head of Information Security, Thai Union Group PCL & Co-chair, Hybrid Cloud Security WG, CSA)
- Faisal YAHYA (Chair, CSA Indonesia Chapter)
William HO (Co-chair, Industrial Control System Security WG, CSA)
Operational Technology (OT) systems, especially Industrial Control Systems (ICS), are an increasingly attractive target for highly-sophisticate cyber actors around the world. A more worrying trend has developed with the increased connectivity between IT and ICS (IT-OT convergent). This creates a potential opportunity for adversaries who are now able to compromise IT systems connected to the Internet, secure their footholds, and move to the ICS to disrupt industrial processes if not enough attention directed to secure the IT-OT convergent endeavor.
The COVID-19 situation further challenged the convergent journey, just to name a few emerging challenges such as resources contention, supply chain cyber breaches, prevalent remote connections, etc are things seems to become the new normal. Leveraging Cloud Computing may be one of the strategies to help alleviate the challenges ahead.
In cloud incidents, it is necessary to coordinate and share information with stakeholders and other organizations which will be discussed. This presentation is for all cloud customers as well as cloud service providers who need a clear framework for sharing incident response practices with customers.
Debashish JYOTIPRAKASH (CTSO - APAC Managing Director – India & SAARC, Qualys, Inc.)
As we celebrate the Workers aren’t going to be returning to the office in 2021. Work from home is going to be in place until there is a full vaccine rollout, and maybe even longer. That means whatever cybersecurity systems that are incorporated now are going to have to stay in effect or be modified for workers who are in a hybrid model of home/office work weeks. Cybercriminals know this, so they will target remote workers with phishing and other targeted attacks. This topic will also cover devices that went home permanently and challenges now and when they begin to come back to office again.
The recent economic situation showed that companies that used cloud technologies to serve the customers anywhere anytime thrived better than companies whose businesses rely on customers visiting their shops physically. Companies that used cloud technologies also allowed their staff to work from home effectively and safely. Thus, the Cloud will definitely be a factor in your post-Covid recovery plan since the Covid virus will not be disappearing anytime soon. How can you fulfil your side of the ‘shared responsibility’ of using Cloud platforms and services when attackers have made Cloud one of their favourite hunting-grounds? Cyber Security Agency of Singapore is implementing a “Zero Trust” solution to help you especially the small and medium enterprises which have many constrains due to the Covid pandemic.
Dr. Neil Daswani, Co-Director of the Stanford Advanced Cybersecurity Program and Dr. Saumitra Das, CTO Founder, Blue Hexagon
Modern cloud threats with complex, multi-stage kill chains cannot be mitigated simply by compliance and configuration checks. The MITRE ATT&CK framework for Cloud provides a structure for security teams to reason about attacker tactics in their cloud. The newly announced MITRE D3FEND framework provides a standard vocabulary for countermeasures against attackers.
In this live session, we will provide an overview of D3FEND and how it maps to cloud security. We discuss the countermeasures security teams should consider that are specific to cloud attack tactics. We also discuss how ATT&CK maps to the technical root causes of breach that have impacted over 9,000 reported breaches to date.
Security experts and cloud DevOps/DevSecOps attendees will learn about:
- MITRE ATT&CK and differences between Cloud and On-premises
- How MITRE ATT&CK maps to the technical root causes of breaches
- MITRE D3FEND and how to apply and extend it for your cloud
- How to prioritize and deploy countermeasures based on D3FEND
Hear from Dr. Neil Daswani (former CISO of LifeLock and co-author of Big Breaches and Foundations of Security) and Dr. Saumitra Das (founder and inventor in AI security) about these frameworks and countermeasures and reason about where to direct your efforts to minimize risk.
Demi Ben-Ari, Co-Founder and CTO, and Dov Goldman, Director of Risk & Compliance, Panorays
Not much time has passed since the last supply chain cyberattacks: SolarWinds, Accellion, Codecov, and now Kaseya. Do you think Kaseya will be the last one? We don’t. While you’re probably wondering what can be done to predict or prevent an incident like this in the future, we think the better question is: What can you do to prepare for the next one?
The CAIQ (Consensus Assessment Initiative Questionnaire) created by the CSA (Cloud Security Alliance) covers all of the possible security controls (CCM - Cloud Controls Matrix) that a company can have as a SaaS provider. By mapping all of the possible mitigation options, companies can reduce the risk of using these cloud and SaaS providers.
In this webinar, we’ll discuss the usage of the CAIQ to be able to better prepare your organization for the next supply chain attack that happens—and it will. We’ll also provide some actionable steps you can take to respond to it when it happens and to mitigate compromising your data and your customers' data.
Participants will learn:
1. What actually happened in the recent Kaseya breach and how it compares to SolarWinds and the rest of the latest supply chain breaches
2. How to map your supply chain and know who your third parties are, as well as understand their possible impact
3. How to monitor the digital supply chain and your third parties’ cyber posture
4. How to conduct proper security risk management and remediation
5. How the CAIQ fits in this whole picture and how you can leverage it to be better prepared
We’ll share our experience and expertise as security practitioners who have implemented our own mitigation strategies and helped our clients understand the impact of third-party security incidents.
Roy Rodan, Partner Solutions Architect, AWS and Yonatan Klein, Director of Product Management, Cloud Security, CyberArk
90% of enterprises today have a footprint in the cloud. But is security top of mind?
As organizations are rapidly adopting the cloud, there has been increased diversity with a proliferation of identities, accounts, credentials & permissions. Securing identity in the cloud is more important than ever.
Join Roy Rodan, Partner Solutions Architect at AWS, and Yonatan Klein, Director of Product Management, Cloud Security, at CyberArk, as we discuss the importance of identity security in the cloud and foundational best practices.
We’ll share our recommendations on how to:
- Approach the AWS shared responsibility model
- Secure the highest privilege identities that have the potential to control an entire environment
- Build identity security into the fabric of your enterprise cloud strategy & application pipelines
- Leverage best practices to secure access to cloud assets including cloud management console, instances, native apps and secrets
Prioritize identity security without ever putting productivity second. Register Now.
Dr. Nantawan WONGKACHONKITTI, Dej (David) TITIVANICH, Philip Hung CAO, Keith PRABHU, Tanat TONGUTHAISRI
For many people, Zero Trust spells the end of an era – the end of the perimeter defence. McKinnon said: "It’s a failure of the paradigm that you can have a gate and castle wall and everything on the inside is fine".
Narudom ROONGSIRIWONG (Head of Information Security, Thai Union Group PCL)
Identity and Access Management includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on the protected resource, this assured identity, and other context information.
This presentation will focus only the identity management services in three levels. The first is a high-level overview of Identity Management as it is applied to Cloud Computing development and implementation. The second is the considerations and concerns that should be part of the decision making. And the last is a technical discussion of the architecture and implementation will be made.
Soros NUANGPIM (Senior Consultant, AC Infotec, Thailand)
In Thai Language
As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of expertise and provides an individual with the foundation they need to secure data in the cloud. Learn how CCSK can bridge the gap and provide an important first step in establishing baseline knowledge for individuals in cloud security.
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
New Approach for Multi-cloud SecurityTanat SANGKASEM (CTO & Cloud Business Unit Head at True Internet Data Center (True IDC), Thailand)[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]23 mins