The Risk of Public Cloud

Presented by

Ben Verschaeren; Global Solutions Engineer; Sophos

About this talk

Ben Verschaeren joined Sophos in 2015 as a Sales Engineer and has since become a Global Solutions Engineer. Based in Melbourne, he supports the high value and strategic initiatives throughout the Asia Pacific and Japan. Ben is responsible for researching the threat landscape and educating the Sophos team, customers, and partners on the latest threats. This includes building demonstration and training tools, focusing on real-world exploits and malware. Ben has more than 15 years of experience within the IT industry, with experience in both sales and engineering. He previously worked for JB HiFi Commercial and Thiess. - In this session, we'll review the risks associated with using public cloud and the common assumptions and mistakes organisations make when migrating. We'll also explore the difference in responsibilities between the cloud hosting provider and the users of their platform, to have you walk away with some actionable items to address in your own environments. This session will include valuable insights and statistics based on a Sophos commissioned research survey on IT managers currently hosting data and workloads in the public cloud about their experiences with cloud security.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (369)
Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.