The Top Mistakes in Cloud Security and How to Avoid Them

Presented by

Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder

About this talk

Gartner Research recently predicted that “through 2025, more than 99% of cloud breaches will have a root cause of customer misconfigurations or mistakes.” Now that we know where we should focus our efforts to secure the enterprise cloud services we use, we should be able to move quickly to address mistakes and mitigate risk. Right? It's never that easy. But if we understand where our cloud security weaknesses exist and if we effectively prioritize risk and mitigate self-induced vulnerabilities, we'll be way ahead of the game. Cloud security is almost never the cloud service provider's problem and the sooner we take responsibility for the security of our cloud application infrastructure, the quicker we can mitigate risk. Unfortunately, cyber security initiatives too often fall short of objectives to actually secure cloud infrastructure. Lots of scanning and configuration checks, but not a lot of mitigation and remediation. There are so many moving parts in modern cloud application infrastructure, with dozens of stakeholders, and a crush of vulnerabilities and misconfigurations that are growing exponentially. Join Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO, to learn from the top mistakes we've seen time and again in enterprise cloud security. Join us to learn about: • The top five mistakes in cloud security. • How to avoid these mistakes. • The latest native AWS, Azure, and Google Cloud security tools available today to help you enforce cyber hygiene across your multi-cloud surfaces.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (39)
Subscribers (2429)
Vulcan Cyber is the world's first continuous vulnerability remediation platform. Entirely focused on remediation, not just vulnerability management, we help enterprise security and IT teams collaborate to get fix done by orchestrating and automating the full remediation lifecycle. Vulcan reduces business exposure to vulnerability dwell from months to hours by providing actionable prioritization, the right remedy for the task, and automation of the entire workflow.