Three Cloud Security Differentiators for Leaders

Sdílet
Vložit
  • čas přidán 13. 09. 2024
  • Cloud environments are attractive targets for hackers due to their complexity, which can make them difficult to defend. This presentation will cover three crucial cloud security strategies that can greatly impact your cloud's security posture. We'll kick off by exposing common vulnerabilities that hackers exploit to compromise cloud environments. Then, we'll dive into effective mitigation strategies in three areas and show you how to implement them in a practical and hands-on manner. Our insights on mitigations will apply to typical enterprise cloud setups.
    Learning Objectives
    - Lead your respective organization toward securing the three most crucial areas of cloud security
    - Effectively communicate with stakeholders the importance of the three crucial security aspects to peers and subordinates
    - Measure respective cloud environment against a best practice maturity model of cloud security
    The content of this webcast supports materials and concepts from LDR520: Cloud Security for Leaders, www.sans.org/c...
    About the Speakers
    Jason Lam holds a leadership role at a large global financial company. In this role, he’s accountable for global direction and management of cyber security defense and response. He has nearly two decades of experience in the information security industry, progressing from hands-on research work to securing large-scale enterprise environments. Over the years, Jason has performed and led intrusion detection, penetration testing, defense improvement programs and incident response in large enterprise environments. Jason is a co-author and instructor for SEC522: Application Security: Securing Web Apps, APIs, and Microservices as well as sole author of LDR520: Cloud Security for Leaders. Learn more about Jason at www.sans.org/p...
    Lysandra Capella is a Banking professional with more than 10 years’ experience in cybersecurity domain. Lysandra currently supports executive management at a financial institution with strategy formulation, security assurance and IT governance. Her background includes working as an SME for critical incidents investigations, forensics, vulnerability assessment, penetration testing, and cloud security assessments. As a Cybersecurity professional, she thrives on solving problems when leveraging native (cloud) services for building secure and supportable solutions. She has over 30 industry cybersecurity certifications and is very passionate about sharing her experience and knowledge as a SANS subject matter expert for a variety of courses. Learn more about Lysandra at www.sans.org/p...
    Learn more about SANS Cybersecurity Leadership Curriculum at www.sans.org/cybersercurity-leadership
    Connect with us on social:
    LinkedIn - SANS Security Leadership
    Twitter - @secleadership
    SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.

Komentáře • 4