Moving to Cloud? Assume Breach & Prepare

Logo
Presented by

Himanshu Dubey, Director Security Labs, Quick Heal Technologies Ltd.

About this talk

Countries, Cities and Companies have all traversed down the path of digitization in the hope of delivering on-demand services. In the case of enterprises, digital transformation has been engineered to drive process improvements, deliver newer customer experience, and biz model reengineering to capitalize on emerging trends At the centre of this transformation has been public cloud infrastructure, which has emerged as the backbone for innovation-driven growth. By embracing the cloud, enterprises can modernize their IT infrastructure and conjure solutions to serve customers digitally in new and innovative ways. Digital transformation & cloud adoption has further accelerated in recent times, as COVID-19 pandemic forced businesses to setup remote working at an unprecedented scale. Public Cloud services enabled fast & smooth migration to “working from home” by enabling connectivity from anywhere and supporting essential services such as video conferencing & real time communication This though exposes organizations to previously unseen cyber security risks. The increased attack surface alongside limited security capabilities, when it comes to public cloud, means organizations are more vulnerable than ever. To mitigate the risks, organizations must adopt a "assume breach" mentality and build a strong security culture within the organization In this talk I will discuss: Cloud security risks & challenges Some examples of vulnerabilities and how they have been used in attacks Assume breach mentality and how to use it to protect cloud workloads The need for Zero Trust. Made for the cloud! Security is everybody's business
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198876)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.