With more complex workloads in the cloud, are organizations making the necessary changes to monitor and secure those workloads. This two-part webcast explores how both the need for cloud security and its implementation has changed in the past year.
In Part 1, held on Tuesday, October 11 at 1:00 p.m., attendees will learn about the survey results, with special emphasis on breach history and the top threats and challenges associated with cloud environments. Click here to register for Part 1.
In today's webcast, the focus is on how cloud security has changed, both in terms of effectiveness and choice of tools.
In the 2015 survey, half of respondents complained they couldn't see well enough into the cloud to know when a cloud-based workload was in trouble and had no way to respond to trouble they did know about. More than a third had no way to test how secure a workload was, once it moved to the cloud. Encryption and access controls did some good, even in complex environments. But respondents said even those were difficult to apply consistently across a mishmash of workplace/productivity apps, DropBox or other storage services, and a host of other services often chosen by business units rather than IT.
Register for this webcast to learn how and where cloud security has changed from 2015. Attendees will explore the following:
You can view the associated whitepaper written by SANS instructor Dave Shackleford using this link. In this paper, he provides analysis of how quickly the cloud security market is maturing and how far it still has to go.