Ed TALKS: Cloudy at the Breach – Your Software, Your Data, Your Loss

Presented by

Ed Adams, Security Innovation | Satish Janardhanan, Accenture | Nazira Carlage, Salesforce | Vlad Joanovic, Microsoft

About this talk

The use of cloud services and infrastructure continues to skyrocket. Meanwhile, the proliferation of turn-key SaaS solutions makes it compelling for enterprises to use cloud-based software. Organizations are spinning up servers and databases in minutes, moving their applications to take advantage of CSP scalability, and mistakenly assuming they are immediately more secure. There’s no doubt the cloud can deliver on the promises of improved scalability, availability, and security; however, consumers need to do their part. Come listen to 3 experts debate data and software security in the cloud. Topics include: • Key considerations - new skills, migration challenges, compliance implications • Unwanted surprises - misconfigurations, application rewrites, open data buckets • Attack vectors - how they impact data flow and storage models • Sunnier days - must-do’s for securing cloud software
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (70)
Subscribers (14850)
Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. We have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms. Our unrivaled proficiency in technical analysis, coupled with sound knowledge of business processes, results in world-class solutions that bridge the gap between application security holes and risk management optimization.