Better Understanding Cloud Security Risks Through ‘Context’
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps, users and network traffic, coupled with alert fatigue, means practitioners may need a clearer view of their environment – before low-and-slow network reconnaissance leads to a potential crypto-locking nightmare. As enterprises mature in the cloud and their technology stacks grow – it becomes increasingly important to quickly detect and respond to vulnerabilities, malware and compromised assets. Network defenders, then, must use “contextual risk” factors to determine their next action items.

Join ISMG’s Tom Field for a moderated discussion that will draw from the experience of the attendees, offering key insights around risk assessment, cloud security, critical assets, and more.

Discussion topics will include:

  • Is your organization currently cloud-first, still moving to the cloud, or still on-premises, perhaps with plans to migrate?
  • How comfortable are you in assessing risk or detecting vulnerabilities in your environment with potentially devastating consequences?
  • How intertwined are cloud security practices and instances of ransomware, shadow IT or other concerns?
  • Where do you see the state of cloud security in the near- and long-terms? And how will your enterprise evolve?
Tom Field
Tom Field
SVP of Editorial

ISMG
Gus Evangelakos
Gus Evangelakos
Director of Field Engineering

Orca Security
October 18, 2022 | 05:30 - 08:00 pm EDT | Empire Steakhouse West, NYC
Sponsored By
Orca Security

Orca Security, the cloud security innovation leader, provides cloud-wide, workload-deep security and compliance for AWS, Azure, and GCP – without the gaps in coverage, alert fatigue, and operational costs of agents. Unlike competing tools that operate in silos, Orca treats your cloud as an interconnected web of assets, prioritizing risk based on the severity of the underlying security issue combined with environmental context, including its accessibility and potential damage to the business. This does away with thousands of meaningless security alerts to provide just the critical few that matter, along with their precise path to remediation. Orca Security deploys in minutes – not months – because no opcode runs within your cloud environment. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments.

ISMG Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.

October 18, 2022 | 05:30 - 08:00 pm EDT

Better Understanding Cloud Security Risks Through ‘Context’