Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them

Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them

Navigating the cloud security landscape is no walk in the park. It requires IT professionals like you to not only tackle traditional security threats, such as managing data access and mitigating vendor risks, but also confront virtualization risks and ...
Navigating the cloud security landscape is no walk in the park. It requires IT professionals like you to not only tackle traditional security threats, such as managing data access and mitigating vendor risks, but also confront virtualization risks and tackle issues unique to the cloud.

With more and more programs and information relying on the cloud, maintaining robust security can feel like an uphill battle. Unsure where to start? We've got you covered!

Join us for this webinar where Roger A. Grimes, Data-Driven Security Evangelist at KnowBe4, will walk you through the ins and outs of cloud security. He’ll share:
  • Top threats named by the Cloud Security Alliance to watch out for
  • How to approach your organization’s cloud security and threat landscape
  • Real-world examples of cloud security breaches and their ripple effects
  • The risks of vendor-stored user data and strategies to prepare your organization for such threats
  • How to best protect yourself against today's top hacks and vulnerabilities both on and off the cloud
Learn about the most popular and successful threats against cloud environments and what you can do to best protect yourself against them.

Presented by:

  • Roger Grimes
    Roger Grimes - Data Driven Defense Evangelist, KnowBe4
    Roger A. Grimes, a frequent speaker on Truth in IT events, holds more than 40 computer certifications and has authored numerous books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.