Cyber Risk Series: Cloud Security Edition

Gain valuable insights on how to respond to cloud security challenges

Cloud security is a complex landscape, and the challenges of protecting this landscape are unique. Many teams still do not fully understand what is most effective in today’s modern cloud environment.

Don’t miss this unique opportunity to hear industry experts offer their best advice on what security leaders need to know to protect their cloud assets from growing threats.

Key topics:

  • The Challenge of Silos in Cloud
  • Detecting Cloud Threats Requires AI
  • A CISO’s Perspective on Cloud Security in 2024
  • Choosing the Right Partner

February 28, 2024
9:00 AM – 1:00 PM PST

Confirmed

Add to calendar REGISTER

Something went wrong. Please try again.

As businesses shift more workloads to the cloud, the landscape of cyber threats evolves correspondingly. But securing your cloud infrastructure isn’t as simple as repurposing on-premises techniques. That’s why it’s more important than ever for Security and IT leaders to make sure they understand the latest challenges and the corresponding responses for measuring, communicating, and eliminating their risk in the cloud.

Featuring

Sumedh Thakar
President and CEO
Qualys

Jim Reavis
CEO
Cloud Security Alliance

David Linthicum
Globally recognized thought leader, innovator, and influencer in cloud computing, AI, and cybersecurity

Sean Atkinson
CISO
Center for Internet Security

Terry Barber
Manager, Security Operations
American Express Global Business Travel

Clayton Smith
Principal Security GTM Specialist
AWS

Rob Smith
Founder & CEO
Lionfish Tech Advisors

Shailesh Athalye
Senior Vice President, Product Management
Qualys

Nayeem Islam
Vice President, Product Management
Qualys

Agenda

9:00 AM PST

Navigating the Complexity of Cloud Security: Challenges, Vulnerabilities, and Common Solutions Needed in 2024

Clearly, we’re moving in two major directions. First, heterogeneity is appearing, established through years of best-of-breed technology applications that use any number of net new platforms added to existing platform. Second, the complexity that this brings. The use of public clouds, private clouds, SaaS-based systems, and the explosion of generative AI, has given us many more moving parts that needs to be tracked and secured. This presentation aims to shed light on the complexities that arise as organizations transition to the cloud and the subsequent impact on enterprise security.

David S. Linthicum

9:15 AM PST

Decoding Risk in the Cloud: A Fireside Conversation with CSA’s Jim Reavis, and Qualys’ Sumedh Thakar

Join us for an engaging Fireside Chat as Jim Reavis, the distinguished CEO of the Cloud Security Alliance, engages in a thought-provoking conversation with Sumedh Thakar, visionary CEO of Qualys. Together, they will delve into the ever-evolving landscape of Cloud Security Trends.

Jim will shed light on the preeminent cloud security trends observed among the nearly 200K members of CSA, sharing struggles they faced in securing and quantifying risk in the cloud.

Sumedh will share insights from Qualys’ extensive network of 10,000 customers that have been challenged as they grapple with stitching together cloud risk from a myriad of siloed tools when what’s needed is a unified view of risk.

Join us as they compare notes on the challenges and triumphs encountered by organizations grappling with the complexities of cloud security.

10:00 AM PST

Adoption of CIS Benchmarks™ to Enhance Your Cloud Security

This presentation explores the adoption of CIS Benchmarks™, with a focus on how you can use their guidelines to harden your multi-cloud environments. We’ll address future challenges, the role of the Benchmarks today in IaaS and SaaS environments, and the significance of partnerships in overcoming obstacles. Key insights include practical strategies for implementation of the Benchmarks and fostering collaborative efforts to enhance your cloud security.

10:30 AM PST

Navigating Business Growth and Transformation Through Rapid Hardening of Cloud-Native Environments

In an era where cloud infrastructure is a cornerstone of organizational growth and transformation, robust security in cloud-native environments is paramount. Therefore, it is of utmost importance to ensure that your cloud-native environments have robust security measures in place. In this session, Terry will discuss his best practices for establishing a resilient security framework and share strategies to effectively manage and secure your cloud infrastructure.

11:00 AM PST

Cloud Security 101: When, Why, and How Your Security Team Needs to Harness the Power of Cloud Security

Looking to understand how to harness the power of cloud security? This webinar will provide a deep dive into the strategic application of CNAPPs, sharing practical advice and guidance on when and why you should be using them. Join former Gartner lead analyst for Secure Remote Working, Rob Smith, as he addresses the real-world challenges of securing the cloud. He will demystify the alphabet soup that sometimes accompanies cloud security – CNAPP, CSPM, CDR, CWP, container security, Kubernetes? Finally find out what each of these acronyms mean and how they are used.

11:30 AM PST

Strong Cloud Security is a Team Sport

It takes more than one person, one tool, or even one team to ensure an effective security posture. Explore how partnership, open collaboration, a culture of security, and an open mind lead to better performing security practices. Many companies struggle with decisions around which tools to use and how to integrate those tools. During this session we will explore those difficulties along with discussing culture and how it plays a role in successful security outcomes.

12:00 PM PST

Prioritizing Risk In a Fragmented Cloud

Cloud is now an important part of most enterprise architectures, but for the those who are not vigilant, the cloud provides a broad attack surface where adversaries can exploit cloud misconfigurations and vulnerabilities to orchestrate breaches. In this session, we’ll discuss how to assess cloud risk, prioritization, and risk reduction.