InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Securing the Human Element: Why People Remain Cloud Security's Top Vulnerability in 2025

Presented by

Simon Ratcliffe, Independent Management & Technology Consultant

About this talk

As organizations accelerate cloud adoption, sophisticated security technologies often create a false sense of protection while the most significant threats emerge from within. Human behaviour continues to be the weakest link in cloud security, not due to malicious intent, but through everyday mistakes that inadvertently expose critical systems. When they create friction, security measures designed to protect can inadvertently increase risk as users will find shortcuts to achieve their legitimate objectives. This session explores the psychology behind user decision-making and reveals how threat actors exploit human nature to bypass cloud defenses, turning legitimate business processes into attack vectors. Join Simon Ratcliffe, independent management & technology consultant, to discover practical strategies for human-centered cloud security. Key Takeaways: - Identify psychological triggers that make users vulnerable to cloud-based attacks - Recognize how security friction drives risky user behaviors and workarounds - Design user-centric security that reduces human error without compromising protection - Develop indicators to detect insider threats before they escalate - Build security awareness programs that create lasting behavioral change
Information Security

Information Security

258948 subscribers731 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics