Top Threats to Cloud Computing

Logo
Presented by

Sean Heide, Research Analyst, Cloud Security Alliance

About this talk

In this session, we will be going over what the Top Threats survey report is, how it can be used to identify misconfigurations in your own environment, and placing controls to develop stronger coverage. We will also briefly be touching on the newest survey report results, which will be accompanied in the new Top Threats release later next month.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (178)
Subscribers (16275)
Go in depth into CSA's latest research on everything from IoT to containers to blockchain. Webcasts will break down the research, provide use cases, instructions for implementation, and further insights.