Sean Heide, Research Analyst, Cloud Security Alliance
About this talk
In this session, we will be going over what the Top Threats survey report is, how it can be used to identify misconfigurations in your own environment, and placing controls to develop stronger coverage. We will also briefly be touching on the newest survey report results, which will be accompanied in the new Top Threats release later next month.
Go in depth into CSA's latest research on everything from IoT to containers to blockchain. Webcasts will break down the research, provide use cases, instructions for implementation, and further insights.…