The Treacherous 12 – Cloud Computing Top Threats in 2016At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so, require that business-level security policies, processes, and best practices are taken into account. In the absence of these standards, businesses are vulnerable to security breaches that can erase any gains made by the switch to cloud technology.Seeing both the promise of cloud computing, and the risks associated with it, the Cloud Security Alliance (CSA) has created industry-wide standards for cloud security. In recent years, CSA released the “Security Guidance for Critical Areas in Cloud Computing” and the “Security as a Service Implementation Guidance”. These documents have quickly become the industry-standard catalogue of best practices to secure cloud computing, comprehensively addressing this within the thirteen domains of CSA Guidance and ten categories of service associated with the Security as a Service (SECaaS) Implementation Guidance series. Many businesses, organizations, and governments have incorporated this guidance into their cloud strategies.“The Treacherous 12 - Cloud Computing Top Threats in 2016” play a crucial role in the CSA research ecosystem. The purpose of this class is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies. The class will discuss the current consensus among security experts in CSA community about the most significant security issues in the cloud.CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. The Top Threats working group identified 12 critical issues to cloud security. Leighton Johnson will cover these in two distinct eight hour sessions as follows (ranked in order of severity per survey results):Wednesday, 11/2/2016:Data Breaches; 2) Weak Identity, Credential and Access Management; 3) Insecure APIs; 4) System and Application Vulnerabilities; 5) Account Hijacking; and 6) Malicious InsidersThursday, 11/3/2016:7) Advanced Persistent Threat (APTs); 8) Data Loss; 9) Insufficient Due Diligence; 10) Abuse and Nefarious Use of Cloud Services; 11) Denial of Service; and 12) Shared Technology Issues.Sign up at http://www.scisaca.org/index.php?option=com_dtregister&Itemid=80
Tuesday, December 20, 2016 6:00 PM - 10:00 PMEastern Time
Cvent Online Event Registration Software | Copyright © 2000-2016 Cvent, Inc. All rights reserved.