[PANEL] Cloud Security Risks and Solutions

Presented by

Clarify360 | PerimeterX | Google Cloud | Appgate | Anitian

About this talk

In a recent report, the Cloud Security Alliance (CSA) outlined the top 11 threats to cloud computing for 2020. Data breaches, misconfiguration and inadequate change control, a lack of cloud security architecture and strategy, and insufficient identity and access management were among the biggest security challenges for all industries operating in the cloud. These issues are not unique to any particular industry, but fortunately, they have common solutions. It’s clear that protecting public cloud assets is key. COVID-19 pandemic was a major accelerant for organizations to quickly move forward with the migration of business infrastructure and applications to the cloud. Cloud Controls and Breach Prevention are top of mind for IT leadership and team alike. In this panel discussion, we’ll discuss the importance of cloud controls and breach protection during this accelerated move to the cloud - What the C Suite Needs to Know about Cloud Security - Why Cloud Security is not an IT problem, it’s a business problem - The Revenue and Brand ROI of Preventing Data Breaches - Real productivity results from correcting misconfiguration and inadequate change control - The importance of building a cloud security architecture and strategy - Why managing sufficient identity, credential, access, and key policies - Cross Training and Upskilling your team Moderated by: Jo Peterson, Vice President, Cloud & Security Services, Clarify360 Dr. Anton Chuvakin, Head of Solution Strategy, Google Cloud Amir Shaked, VP R&D PerimeterX Tina Gravel, Senior Vice President, Appgate Charles Johnson, Cybersecurity Advocate, Anitian

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (1834)
Subscribers (187528)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.