Gain valuable insights on how to respond to cloud security challenges
Cloud security is a complex landscape, and the challenges of protecting this landscape are unique. Many teams still do not fully understand what is most effective in today’s modern cloud environment.
Don’t miss this unique opportunity to hear industry experts offer their best advice on what security leaders need to know to protect their cloud assets from growing threats.
- The Challenge of Silos in Cloud
- Detecting Cloud Threats Requires AI
- A CISO’s Perspective on Cloud Security in 2024
- Choosing the Right Partner
February 28, 2024
9:00 AM – 1:00 PM PST
As businesses shift more workloads to the cloud, the landscape of cyber threats evolves correspondingly. But securing your cloud infrastructure isn’t as simple as repurposing on-premises techniques. That’s why it’s more important than ever for Security and IT leaders to make sure they understand the latest challenges and the corresponding responses for measuring, communicating, and eliminating their risk in the cloud.
9:00 AM PST
State of Cloud Security
David Linthicum, a cloud pioneer, industry thought leader, and Cyber Risk Series host, will start the event by sharing his insights into the current state of cloud security. He will shed light on the pressing concerns that keep cloud development leaders awake, including the alarming risk of imminent security breaches. Additionally, he will offer commentary and reflections as he introduces the day’s sessions and provides a wrap-up at the end of the event.
9:15 AM PST
Decoding Risk in the Cloud: A Fireside Conversation with CSA’s Jim Reavis, and Qualys’ Sumedh Thakar
Join us for an engaging Fireside Chat as Jim Reavis, the distinguished CEO of the Cloud Security Alliance, engages in a thought-provoking conversation with Sumedh Thakar, visionary CEO of Qualys. Together, they will delve into the ever-evolving landscape of Cloud Security Trends.
Jim will shed light on the preeminent cloud security trends observed among the nearly 200K members of CSA, sharing struggles they faced in securing and quantifying risk in the cloud.
Sumedh will share insights from Qualys’ extensive network of 10,000 customers that have been challenged as they grapple with stitching together cloud risk from a myriad of siloed tools when what’s needed is a unified view of risk.
Join us as they compare notes on the challenges and triumphs encountered by organizations grappling with the complexities of cloud security.
10:00 AM PST
Adoption of CIS Benchmarks™ to Enhance Your Cloud Security
This presentation explores the adoption of CIS Benchmarks™, with a focus on how you can use their guidelines to harden your multi-cloud environments. We’ll address future challenges, the role of the Benchmarks today in IaaS and SaaS environments, and the significance of partnerships in overcoming obstacles. Key insights include practical strategies for implementation of the Benchmarks and fostering collaborative efforts to enhance your cloud security.
10:30 AM PST
Navigating Business Growth and Transformation Through Rapid Hardening of Cloud-Native Environments
In an era where cloud infrastructure is a cornerstone of organizational growth and transformation, robust security in cloud-native environments is paramount. Therefore, it is of utmost importance to ensure that your cloud-native environments have robust security measures in place. In this session, Terry will discuss his best practices for establishing a resilient security framework and share strategies to effectively manage and secure your cloud infrastructure.
11:00 AM PST
Strong Cloud Security is a Team Sport
It takes more than one person, one tool, or even one team to ensure an effective security posture. Explore how partnership, open collaboration, a culture of security, and an open mind lead to better performing security practices. Many companies struggle with decisions around which tools to use and how to integrate those tools. During this session we will explore those difficulties along with discussing culture and how it plays a role in successful security outcomes.
11:30 AM PST
Prioritizing Risk In a Fragmented Cloud
Cloud is now an important part of most enterprise architectures, but for the those who are not vigilant, the cloud provides a broad attack surface where adversaries can exploit cloud misconfigurations and vulnerabilities to orchestrate breaches. In this session, we’ll discuss how to assess cloud risk, prioritization, and risk reduction.