There is a big push to a digital ecosystem during pandemic times and many organizations have looked to online cloud infrastructure to keep operating remotely. The key now is to integrate on premise applications and cloud infrastructure with security in mind. On premise and cloud are two totally different environments and traditional IT departments will have to learn how to configure, set-up and apply their expertise with cloud providers. With this in mind, Wilbertus will share his journey in a multi-cloud environment with existing on premise applications with focus on:
The modern data-driven economy has accelerated the adoption of cloud computing. In fact, analysts predict there will be more than 100 zettabytes (a billion terabytes) of data stored in the cloud by 2024.
As the volume of data and workloads grow across the cloud, so does the attack surface that needs to be protected from malicious actors. Highly sophisticated attackers are increasingly taking advantage of the vulnerabilities and blind spots introduced by the expanding attack surface in the cloud.
In this session CK Chim, CSO APJ at Cybereason will share more about how organizations can gain comprehensive visibility across the entire environment in order to detect malicious activity targeting cloud workloads and containers.
Key topics for the session to include:
How to Stop Cloud Workloads From Becoming Your Weakest Link
The current situation in Ukraine presents many humanitarian and security challenges. The world is obtaining a clearer view into a new form of hybrid warfare that we have previously only theorized about. This war is not only about missiles vs. tanks, but also about zero-day malware vs. threat detection and response, especially in cloud environments.
However, in hybrid and multi-cloud environments, security solutions need to evolve past a reliance on endpoint protection. Cloud Workload Protection Platforms (CWPP) that still use signature-based detection and anomalous behaviors to identify suspicious activity cannot protect government agencies and enterprises, because they can’t identify what they don’t know.
Join SentinelOne’s Cloud Workload Security experts to participate in a riveting discussion about Cloud Security in times of cyber warfare.
WHY YOU CAN’T MISS THIS SESSION:
In the year 2006, Amazon first launched S3 cloud storage and this was quickly followed by EC2. While S3 offers secure and scalable cloud storage, EC2 offers virtual computers on rent. This was revolutionary when cloud adoption was still at its nascent stages. Over the ensuing years, the cloud has caught on and today, it supersedes storage in physical data centers. We also now have Azure, Salesforce and the Google Cloud Platform. Added to this complexity is the high prevalence of cloud-based SaaS applications that employees use.
But what are the security pitfalls? How can you get complete visibility into user activity within a multi-cloud infrastructure? How can you stop data exfiltration that could happen in the cloud? Attend this session to find out.
One of the important parts of Cloud Security is there are constant innovations with IOTs, AIs and data analytics. There is a lot of interest from companies going through digital transformation on how to ensure data and access on cloud is protected at all costs with minimum risk of exposure. Soumo will talk about his journey, how it has been, the current state and what the future entails for cloud security with focus on: