Detecting threats in the cloud presents several challenges: dealing with new technologies, facing new threat scenarios, and accelerated cloud adoption as exacerbated by the COVID-19 pandemic
Gartner indicates that organizations have been expanding their adoption of cloud security-oriented tools, such as Cloud Security Posture Management (CSPM) and Cloud Access Security Broker (CASB), as they try to keep cloud-related threats under control. However, not all organizations have an interest in adopting all these added technologies, and even when they do, the challenge of integrating them into their security monitoring infrastructure remains.
What should they do to develop the appropriate level of threat detection capabilities for their cloud systems?
This session goes over the specific characteristics of threat detection in cloud environments, and what organizations should do to align their security monitoring architecture to those threats. Key takeaways from this session include:
- What are the differences between traditional threats and cloud threats?
- How to align your security monitoring architecture to the new cloud monitoring requirements?
- How deploy or adapt a SIEM to optimize cloud security monitoring?
Sponsored by: Securonix