Cloud Security Threats Enterprises Need to Watch

More businesses are shifting critical assets and operations to the cloud, as service providers enhance their security capabilities --and cyber attackers have adapted accordingly. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.

On Demand
1h 00min

Attend this webinar and you'll learn about:

  • The mistakes that can lead to devastating cloud bucket leaks

  • The threats and vulnerabilities causing cloud users the most trouble right now
  • Best practices to help embrace the cloud, while reducing risk

Featured Speakers

  • John Burke
    John Burke
    Senior IT Security Engineer
    Iberia Bank

    John Burke is a Senior IT Security Engineer for Iberia Bank. A graduate of Auburn University, John has more than 20 years in IT experience. John has worked in banking and healthcare technology risk systems, as well as broad experience managing security for other disciplines. He is a Certified Computer Forensics Examiner, Certified Web Application Penetration Tester, and a Certified Ethical Hacker.

  • Jonas Outlaw
    Jonas Outlaw
    Senior Product Manager

    As Senior Product Manager, Jonas works with a variety of stakeholders in the product development lifecycle to help drive product direction and enhancements. Jonas brings more than a decade of experience to BeyondTrust in various aspects of applications development, systems engineering and product management. Prior to joining BeyondTrust, Jonas was a systems engineer at a large life insurance company. He received his MBA with a concentration in Management Information Systems from Mississippi College.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By