Training

Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

12 Top Cloud Threats of 2016

12 Top Cloud Threats of 2016

The Cloud Security Alliance (CSA) Top Threats Working Group released a report titled, "The Treacherous 12: Cloud Computing Top Threats in 2016." In this report, the CSA concludes that although cloud services deliver business-supporting technology more efficiently than ever before, they also bring significant risk.

Regardless of whether the IT department sanctions new cloud services or not, the door is wide open for the Treacherous 12. The CSA report points out that businesses need to take security policies, processes, and best practices into account.

Background

At the same time, Gartner predicts that through 2020, 95 percent of cloud security failures will be the customer's fault. This does not mean that customers lack security expertise. It does mean, however, that it is no longer sufficient to know how to make decisions about risk mitigation in the cloud. Automation is the key. Cloud security automation is where Cloud Access Security Brokers (CASBs) come into play. A CASB helps automate visibility, compliance, data security, and threat protection for cloud services.

In this webinar you will learn about:

  • The CSA Working Group's definition of the top cloud computing threats in 2016;
  • The role of CASBs in protecting you from the Treacherous 12.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.