The rapid adoption of cloud technology by organizations has led to a shift towards both single and multi-cloud environments. Unfortunately, this shift has also resulted in cloud misconfigurations, which are one of the top risks associated in the cloud. Cloud misconfiguration refers to any errors or gaps in the security measures of a cloud environment. We will begin by discussing the root causes of cloud misconfigurations. We will then review case studies of organizations that have suffered data breaches due to cloud misconfigurations, such as Capital One in 2019, eBay in 2014, and World Wrestling Entertainment (WWE) in 2017. Finally, we will then walk through built-in tools provided by AWS, Microsoft Azure, and Google Cloud, that cyber professionals can leverage to mitigate security risks in the cloud. These tools are also known as Cloud Security Posture Management (CSPM) tools. Cloud Security Posture Management tools are automated solutions designed to identify misconfiguration issues and compliance risks in the cloud so that they can be remediated, reducing the risk of successful breaches. We will explore AWS Security Hub, Microsoft Defender for Cloud, and Google Security Command Center, and review how each tool can be used to gain visibility into the current security posture of each respective cloud. Furthermore, we will emphasize how these tools can be applied to determine alignment with relevant regulatory compliance standards and industry-standard benchmarks, as well as identify threats and potential security weaknesses. The key takeaways from this session are: - Most cloud breaches are due to misconfigurations or human errors. - Do not rely on your cloud service provider to secure your data (understand the shared responsibility model). - You cannot protect what you do not have visibility into (CSPM solutions can help). - Cloud security should begin with implementation of cloud governance.

Hora

17:00 - 18:00 hs GMT+1

Organizador

Information Security
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Febrero / 2026 240 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 26 de Febrero de 2026
Mar 27 de Febrero de 2026
Mié 28 de Febrero de 2026
Jue 29 de Febrero de 2026
Vie 30 de Febrero de 2026
Sáb 31 de Febrero de 2026
Dom 01 de Febrero de 2026
Lun 02 de Febrero de 2026
Mar 03 de Febrero de 2026
Mié 04 de Febrero de 2026
Jue 05 de Febrero de 2026
Vie 06 de Febrero de 2026
Sáb 07 de Febrero de 2026
Dom 08 de Febrero de 2026
Lun 09 de Febrero de 2026
Mar 10 de Febrero de 2026
Mié 11 de Febrero de 2026
Jue 12 de Febrero de 2026
Vie 13 de Febrero de 2026
Sáb 14 de Febrero de 2026
Dom 15 de Febrero de 2026
Lun 16 de Febrero de 2026
Mar 17 de Febrero de 2026
Mié 18 de Febrero de 2026
Jue 19 de Febrero de 2026
Vie 20 de Febrero de 2026
Sáb 21 de Febrero de 2026
Dom 22 de Febrero de 2026
Lun 23 de Febrero de 2026
Mar 24 de Febrero de 2026
Mié 25 de Febrero de 2026
Jue 26 de Febrero de 2026
Vie 27 de Febrero de 2026
Sáb 28 de Febrero de 2026
Dom 01 de Febrero de 2026

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado