The State of Cloud Security: Results of the SANS 2019 Cloud Security Survey

Sysdig

Cloud is part of today's infrastructures, and infrastructures are part of clouds. Are security infrastructures maturing to support the business and improve risk management in the cloud model? How are organizations using the public cloud to meet their business needs? This webcast will explore the results of the SANS 2019 Cloud Security Survey, conducted in cooperation with the Cloud Security Alliance, concerning organizations' use of the public cloud and will provide actionable advice for attendees to improve their cloud security. Attendees will learn about the: Types of applications that are implemented most frequently through the cloud. Number of public cloud providers most organizations use.
Watch Now

Spotlight

According to Gartner data, organizations spend over 80% of their security product dollars on their networks and endpoints. However, these spending priorities are increasingly at odds with the threat landscape. With the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users and the data they have access to, and the transactions they facilitate.


OTHER ON-DEMAND WEBINARS

5 Steps to Prevent Identity-based Attacks

"Identity-based attacks are a growing risk for all organsations. As security teams harden the corporate perimeter, hackers and criminals are looking for the weak spots – and that weak spot is all too often human. Using malware, phishing and social engineering is a common way of overcoming even the strongest defences, as well-intentioned insiders become the unwitting helpers of the attacker."
Watch Now

Cyber Security Special Webinar-How To Dial With Cyber Risk

Data Guidence Financial

DataGuidance, in conjunction with Sidley Austin, will hold a webinar on 17 July which will examine the legal aspects of cyber security risk as a source of corporate liability.Topics covered will include the recently announced UK Government “Cyber Essentials Scheme” which aims to encourage businesses to build cyber security into their operations, how to reduce cyber security risks through insurance and how to put in place governance structures and risk registers to evaluate and deal with cyber security as well as data protection compliance, information security reviews and vendor/supplier contract review programmes.
Watch Now

Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

Veracode

According to Gartner, the application layer contains 90% of all vulnerabilities. However, do security experts and developers know what’s happening underneath the application layer? Organizations are aware they cannot afford to let potential system flaws or weaknesses in applications be exploited, but knowing the distinctions between these weaknesses can make all the difference in removing them successfully. During this webinar, Jim Jastrzebski of CA Veracode will discuss how to identify risk factors within your application landscape and share his approach to helping security and development teams address them efficiently. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise, and hear how organizations rely on application security technology and services to gain visibility into their overall landscape—and act upon it in the right way.
Watch Now

"Cloud DLP: Revealing Shadow IT and Shadow Data"

Elastica

"In this cloud DLP webcast, “Cloud Security Alliance and Elastica: Revealing Shadow Data”, Jim Reavis, CEO of CSA, and Elastica delve deeply into the Elastica Q2 2015 Shadow Data Report and share insights into how organizations can unlock the full business potential of cloud apps and the sensitive corporate data stored in them, while staying secure and compliant."
Watch Now

Spotlight

According to Gartner data, organizations spend over 80% of their security product dollars on their networks and endpoints. However, these spending priorities are increasingly at odds with the threat landscape. With the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users and the data they have access to, and the transactions they facilitate.

resources