Dispelling the Myths and Misconceptions of Cloud Security

Presented by

Palo Alto Networks | SonicWall | Trustwave | Crowdstrike | Towerwall

About this talk

Just as enterprise organizations are embracing cloud computing, so too are cyber attackers and everyone is justifiably concerned. For all the advantages of the cloud, the framework is not impervious to cyber threats and so security protocols must always be a priority. Yet the myth that cloud is less secure than owned, on-premise security is just that: a myth. A 2020 Gartner forecast stated IaaS workloads would experience 60% fewer security incidents than traditional data centers — at least. In order to comprehensively deploy a cloud security network, companies must understand the realities of their infrastructures. Identifying the responsibility of the cloud and that of the customer is critical, as is learning what services can be reasonably expected from a leading cloud provider. Only with the right facts can you build a truly secure network. Join this panel of experts as they discuss the most common myths of cloud security and what you should actually be building your strategy around: - Cloud vs. On-Premise Security: Which is easier to target? - Is a public cloud more vulnerable than a private one? - How automated can — and should — the cloud’s security protocol be? - Accessibility: How much is too much? Moderated by: Michelle Drolet, CEO, Towerwall Panelists to include: Jessica Charter, EMEA Security Principal, Trustwave Taylor Smith, Senior Product Marketing Manager, Prisma Cloud, Palo Alto Networks Rajesh Agnihotri, Senior Solutions Engineer, Middle East, SonicWall Scott Fanning, Senior Director, Cloud Security, CrowdStrike
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (190)
Subscribers (32632)
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.