Advanced Threats via Amazon S3 Workflows: Is the Public Sector Prepared?

Logo
Presented by

Mureed Nazir, CTO & CIO, A&T Systems, Inc. // Ed Casmer, Founder & CTO, Cloud Storage Security

About this talk

In the public sector, it’s critical to maintain trust, create efficiencies, and minimize expenses. So you use Amazon S3 as part of your application workflows and to store data. Naturally, you're managing misconfigurations and human error to prevent S3 data breaches. But have you considered the security and safety of the underlying data that pass through Amazon S3? Cloud-delivered malware is increasing. In fact, 68% of all malware downloads were delivered from cloud apps in 2021 - an all time high. Of cloud-delivered malware, 66.4% was delivered using cloud storage apps.* How many of the files you process are ticking time bombs containing ransomware, viruses or other threats? Tune in as we illustrate public sector use cases and discuss - The blind spot in Amazon S3 security - How storage is an expanded attack vector in the cloud that many are not postured for - What you can do to bolster security and prevent the spread of infection This event is designed for the following Public Sector roles - Application Owner - Business Owner - Program Owner - Chief Data Officer - Chief Risk Officer - Procurement Officer Join us! *In the second quarter of 2021. Source: Netskope Cloud and Threat Report: July 2021 Edition

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (12)
Subscribers (644)
At Cloud Storage Security, we pride ourselves on helping organizations protect their employees, customers and partners by keeping their data safe and free from malware. We offer two cloud-native security solutions: Antivirus for Amazon S3, which keeps objects free from malware, and SecureCloudDB, which keeps cloud databases free from vulnerabilities. Learn more at www.CloudStorageSec.com. Content on this channel is designed for CISOs, DevOp Engineers, MSPs, Auditors and others who are responsible for data security in the cloud.