Top Threats to the Cloud for the Business

Logo
Presented by

John Yeoh, Global Vice President of Research | Cloud Security Alliance

About this talk

The cloud landscape is complex with different threats, risks, and vulnerabilities that can overwhelm a business and its security teams. An annual report released by CSA tracks the top concerns reported by security professionals to understand how threats and breaches impact the business. Organizations must prioritize how cloud security affects the organization, break down recent cyber attacks, and implement controls that protect the organization from future threats. Some of these tools include the Top Threats initiative complements industry tools for a richer business context. IT leaders should also compare industry perception with actual threat data in the Verizon DBIR. Another strategy is to take real-world attacks and use alternative lateral techniques from the MITRE ATT&CK framework. Finally, security leaders can implement cloud security controls with the Cloud Controls Matrix to mitigate business risk and cyber attacks. Tune into this webinar as Cloud Security Alliance's John Yeoh shows how to use these tools and better communicate cloud security for the business. About the speaker: With over 20 years of experience in research and technology, John Yeoh has held technical analyst, executive, and board member positions in the industry. He is also a Technical Advisory Council Member for the Federation Communications Commission, Standards Officer for the International Standardization Council, and representative on multiple industry professional consortiums. Yeoh is a published author, researcher, and technologist with areas of expertise in cybersecurity, cloud, and next generation technologies. His works and collaborations have been presented in The Wall Street Journal, Forbes, SC Magazine, USA Today, Information Week, and others.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (784)
Subscribers (198302)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.