This is the second installment of a two-part webcast exploring the security of cloud-computing services and platforms, and how effective they've been in helping IT security reduce organizations' exposure to the threat environment of the cloud. In Part 1, held on Wednesday, November 1 at 1:00 p.m. Eastern, attendees will learn about the survey results, with special emphasis on breach history and the top threats and challenges associated with cloud environments. Click here to register for Part 1.
The 2016 SANS Cloud Security Survey showed that 70% of companies planned to use public cloud platforms for computing services, but 62% said their No. 1 security concern is that unauthorized users would have access to sensitive data on those platforms.
Organizations facing the enormous, dynamic threat environment of the cloud have responded with perimeter controls and cloud-based security. But they've also made enormous organizational changes to reduce their exposure and shorten their response times. Many have adopted the rapid development and automated testing of DevOps into both their development and implementation workflows. Others have expanded their vulnerability scanning, incident response, threat intelligence and continuous monitoring efforts to try to catch intruders more quickly and eliminate weaknesses before they become points of attack. '
Those changes are a challenge even for established security organizations. It will take changes in organization, attitude, training and spending before IT security can consistently and reliably extend security to every workload, pool of data or hybrid cloud their organizations reach.
Register for this webcast to learn how and where cloud security has changed from 2016. Attendees will explore the following:
Register for this webcast to hear SANS cloud security guru Dave Shackleford discuss the results of the 2017 SANS Cloud Security Survey, the lengths to which InfoSec has already gone to try to secure the cloud and the changes it is going through to try to make those changes stick. You'll also be among the first with access to the associated results paper, including analysis of how quickly the cloud security market is maturing and how far it still has to go.
View the associated whitepaper here.