Meeting The Challenge of Modern Security Threats In The Cloud

Meeting The Challenge of Modern Security Threats In The Cloud

As cloud adoption accelerates, cybersecurity experts are called upon to lock down increasingly distributed enterprises - even as skilled security staff remain thin on the ground.

October 6, 2022
11:00 AM – 5:00 PM ET (8:00 AM – 2:00 PM PT)

Enterprise attack surfaces are expanding, and the complexity of the cloud makes it not only an ideal playground for cyber criminals, but more vulnerable to internal threats, from misconfiguration to theft, damage, and data loss.

That’s why it’s critical that IT leaders prioritize cloud security expertise and capabilities. Unfortunately, traditional security strategies and tools aren’t cutting it anymore – they simply don’t scale and can’t keep pace with either the speed of digital innovation or increasingly sophisticated cyberthreats. IT leaders need to move beyond traditional approaches to security monitoring, detection and response to meet the challenge of an increasingly complex tech stack and modern security threats in the cloud.

Topics Include:
What strategies, tools, and policies cybersecurity leaders are turning to keep cloud environments secure
Where the real challenges in cloud and control security lie
Actionable insights and new approaches to protecting your organization’s data
Agenda
Keynote
11:00 AM – 11:45 AM

Tackle Your Top Cloud Security Issues

Sponsored by: Sysdig
Presented by: Joe Onisick, Principal, Transformation Continuum

These challenges might sound familiar. You lack visibility into what data is in your cloud applications and infrastructure. You’re worried about data being stolen from your cloud applications. And you can’t fully control who can access sensitive data. You’re not alone. This keynote will reveal the top cloud security issues of today and how to overcome them.

Fireside Chat
11:45 AM –12:00 PM

Fireside Chat with Michael Isbitski, Director of Cybersecurity Strategy, Sysdig

Sponsored by: Sysdig
Moderated by: Steven Hill
Keynote
12:15 PM – 1:00 PM

Cloud Security Assessments 101

Sponsored by: Mandiant
Presented by: Doug Saylors, Co-Lead, Cybersecurity Practice, ISG

Cloud security assessments are increasingly popular these days—and rightly so. According to a recent IBM/Ponemon study, 45% of breaches this year will occur on cloud platforms, with a large percentage the fault of your company, not your CSP. With so much at risk, it’s clear why organizations are turning to cloud security assessments to highlight vulnerabilities. But you’ve got options when it comes to assessments … everything from operational assessments using DIY checklists and open-source tools to enterprise solutions coupled with Cyber Risk Quantification solutions. This keynote breaks down the world of cloud security assessments to help you choose the right one.

Fireside Chat
1:00 PM – 1:15 PM

Fireside Chat with Paul Mudgett, Sr. Manage of Security Transformation Services, Mandiant

Sponsored by: Mandiant
Moderated by: Steven Hill
Premier Session
1:30 PM – 2:00 PM

The Future of Authentication for Employees and Customers

Sponsored by: Okta
Presented by: Jameeka Green Aaron, Chief Information Security Officer, Okta

A strong customer identity foundation should empower businesses with simple, secure, and adaptable identity platforms to fit their unique needs while creating a seamless experience for employees and customers. Identity is much more than logging-in and signing-up; it provides a way to connect with the people who matter most to your brand, to establish trust, and increase conversion opportunities. Discover ways to balance security with friction and to create a safe authentication experience without compromising on privacy.

Spotlight Custom Webinar
2:15 PM – 2:45 PM

Cloud Attacks Are Here: Threat Actors Like Containers, Too!

Sponsored by: Sysdig
Panelists: Anna Belak, Director of Thought Leadership, Michael Isbitski, Director of Cybersecurity Strategy, & Michael Clark, Director of Threat Research, Sysdig

Cloud adoption is the trend of the decade, and threat actors are tailoring their methods to this new attack surface. Cryptojacking is the most prevalent type of cloud attack due to the low risk and high reward for the perpetrator. But even newer technology like containers is being used for evil as attackers plant unpleasant surprises in public repositories, exposing your business to potential supply chain compromise.

 

Join us to learn about what Sysdig’s Threat Research Team is seeing out there and what you can do to protect yourself.   They will discuss their individual thoughts on these questions:

  • What types of attacks are popular in the cloud and why?
  • How cryptojacking works and how to avoid becoming a victim?
  • What is hiding in malicious Docker images and how to protect yourself?
Premier Session
2:45 PM – 3:15 PM

Rapid Ransomware Recovery with True Continuous Data Protection

Sponsored by: Zerto
Presented by: Chris Rogers, Technology Evangelist, Zerto

Ransomware is the biggest threat to all organizations of every size and every industry. The frequency and severity of attacks is ever increasing and the unprepared are paying ransoms of millions and ending up in the news. It is vital to understand how your organization can recover rapidly from any attack to avoid disruption without paying a ransom, especially in the cloud.

Join Chris Rogers from Zerto, a Hewlett Packard Enterprise company to learn more about:

  • Ransomware attack scenarios and how they cause downtime and data loss at different scales
  • Why recovery point objective and recovery time objective are crucial in a ransomware attack
  • The types of recovery needed to recover, including: files, whole application stacks, entire data centers, the cloud, and even multiple sites after an attack
  • How you can use best-in-class Zerto continuous data protection to beat ransomware every time
  • How you can Get Out of Ransomware Jail With Zerto Free Edition
Spotlight Custom Webinar
3:30 PM – 4:00 PM

Common Entry Points Exposed on the Internet

Sponsored by: Mandiant
Presented by: Jonathan Cran, VP, Research & Engineering, & Nader Zaveri, Sr. Manager, Incident Response & Remediation, Mandiant

Legacy tools designed before the cloud era do not deliver comprehensive visibility into the entire external attack surface, leaving assets out of sight and potentially vulnerable. Confirming this, Mandiant observed 21K+ critical and high severity issues across the customer base from January to March 2022.

Join Jonathan Cran and Nader Zaveri for a discussion on the common entry points identified by Attack Surface Management in Q1 2022. They’ll discuss:
• How organizations end up with exposed external assets
• The methodology behind issue identification at scale
• Actions the security team can take to harden the external attack surface
• Where an attack surface management approach fits into the overall cyber defense program at any organization

Panel
4:00 PM – 4:45 PM

How to Get the Most from Your Cloud Security Resources

Sponsored by: AttackIQ
Panelists: Fernando Montenegro, Sr. Principal Analyst, Cybersecurity, Omdia; Ben Opel, Director for Customer Success, AttackIQ

It may feel that cyber attackers have seemingly boundless time and resources, while you have neither. However, there are ways you can tighten your cyber defense that won’t require you to do battle with the CFO first. In fact, you may already be paying for cloud security tools that you aren’t using. In this session, learn how to best assess your cloud security risks, optimize your defenses, validate your controls, and orchestrate your security tools to ensure you’re using your cloud security resources most efficiently and protecting your organization against the most important threats.

Meeting The Challenge of Modern Security Threats In The Cloud
October 6, 2022
11:00 AM – 5:00 PM ET (8:00 AM – 2:00 PM PT)
Speakers
No data was found
Sponsors
Keynote
Premier
Panel
© 2025 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service