Dispelling the Myths and Misconceptions of Cloud Security

Logo
Presented by

Palo Alto Networks | SonicWall | Trustwave | Crowdstrike | Towerwall

About this talk

Just as enterprise organizations are embracing cloud computing, so too are cyber attackers and everyone is justifiably concerned. For all the advantages of the cloud, the framework is not impervious to cyber threats and so security protocols must always be a priority. Yet the myth that cloud is less secure than owned, on-premise security is just that: a myth. A 2020 Gartner forecast stated IaaS workloads would experience 60% fewer security incidents than traditional data centers — at least. In order to comprehensively deploy a cloud security network, companies must understand the realities of their infrastructures. Identifying the responsibility of the cloud and that of the customer is critical, as is learning what services can be reasonably expected from a leading cloud provider. Only with the right facts can you build a truly secure network. Join this panel of experts as they discuss the most common myths of cloud security and what you should actually be building your strategy around: - Cloud vs. On-Premise Security: Which is easier to target? - Is a public cloud more vulnerable than a private one? - How automated can — and should — the cloud’s security protocol be? - Accessibility: How much is too much? Moderated by: Michelle Drolet, CEO, Towerwall Panelists to include: Jessica Charter, EMEA Security Principal, Trustwave Taylor Smith, Senior Product Marketing Manager, Prisma Cloud, Palo Alto Networks Rajesh Agnihotri, Senior Solutions Engineer, Middle East, SonicWall Scott Fanning, Senior Director, Cloud Security, CrowdStrike
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (28)
Subscribers (1492)
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.