Cloud(y) With a Chance of Data Breach

  • Webcast Aired Thursday, 17 Dec 2020 12:30PM EST (17 Dec 2020 17:30 UTC)
  • Speaker: Dr. Torsten George

Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. Spending on cloud system infrastructure services (IaaS) is projected to grow from an estimated $50.4 billion in 2020 to $81 billion through 2022 according to Gartner.

However, a recent IDC survey found that the scale and complexity of IaaS/PaaS environments make it nearly impossible to understand access-related risk, let alone enforce least privilege across the multitude of users, applications, and resources. This cloud security readiness gap has not gone unnoticed by threat actors. In fact, data breaches in the cloud, due to misconfigurations and privileged credential abuse, have increased in the past few years, and the resulting costs of the ensuing customer churn, incident remediation, and reputation damage remain significant. Thus, it is vital for organizations to enable secure migration of workloads to the cloud to seize the advantages provided by cloud computing without compromising security or compliance. Doing this successfully, however, requires a security strategy supported by effective identity and access management.

This presentation will explore:

  • The state of cloud computing
  • Cloud as the new weak spot for cyber-attacks
  • Six best practices for boosting cloud security confidence in a world of Zero Trust
  • The strengths and shortcomings of common enterprise cloud security strategies
  • How businesses should migrate data and applications safely to the cloud leveraging an identity-centric security approach

Sponsor

centrify-logo-sized-768x384.jpg