Migration to Monitoring & Response: How to Build & Secure a Cloud Infrastructure

Logo
Presented by

Tim Segato, Dir, Prod Mgmt, eSentire; Ryan Westman, Mgr., Threat Intelligence, eSentire; B. Dunlap, Moderator

About this talk

Cloud adoption is accelerating at an exponential rate. Whether it’s for business collaboration or to store critical data assets, organizations are increasingly relying on the cloud. In the next 3 years, it is anticipated that 70% of workloads will be hosted in a cloud environment. The ease of deploying these workloads within cloud-based infrastructure enables rapid adoption of cloud services and greater business agility, but what about the risks? We have seen a sharp rise in the number of data breaches stemming from misconfigurations in the cloud. These misconfigurations occur as a result of improper settings being used when architecting and deploying services within the cloud platform. Ultimately, this means that cybercriminals have an expanded attack surface to access any data stored within the cloud environment, increasing the risk of a cyber attack. Join eSentire and (ISC)2 on January 18, 2022 at 1:00 p.m. Eastern for a discussion on the top threats associated with utilizing cloud-based infrastructure and explore how they are different from threats to your on-premises infrastructure. Key takeaways will include: • Cloud migration strategy: should you go all in? • Shared responsibility model: what are you on the hook to secure? • Top threat trends: how is cloud different? • Monitoring and response: what solutions should you consider?
Related topics:

More from this channel

Upcoming talks (12)
On-demand talks (444)
Subscribers (135605)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.