ISC2 Webinar

  • 18 Jan 2022
  • 1:00 PM - 2:00 PM
  • Registration Required

SECURITY BRIEFING

Migration to Monitoring & Response: How to Build & Secure a Cloud Infrastructure

January 18, 2022 | 1:00 PM ET
Duration: 1 Hour 
Earn 1 CPE for this webinar

Register Now

Cloud adoption is accelerating at an exponential rate. Whether it’s for business collaboration or to store critical data assets, organizations are increasingly relying on the cloud. In the next 3 years, it is anticipated that 70% of workloads will be hosted in a cloud environment. The ease of deploying these workloads within cloud-based infrastructure enables rapid adoption of cloud services and greater business agility, but what about the risks? We have seen a sharp rise in the number of data breaches stemming from misconfigurations in the cloud. These misconfigurations occur as a result of improper settings being used when architecting and deploying services within the cloud platform. Ultimately, this means that cybercriminals have an expanded attack surface to access any data stored within the cloud environment, increasing the risk of a cyber-attack. Join eSentire and (ISC)² on January 18, 2022, at 1:00 p.m. Eastern for a discussion on the top threats associated with utilizing cloud-based infrastructure and explore how they are different from threats to your on-premises infrastructure. 

  • Key takeaways will include:
    • Cloud migration strategy: should you go all in?
    • Shared responsibility model: what are you on the hook to secure?
    • Top threat trends: how is cloud different?
    • Monitoring and response: what solutions should you consider?

Hear expert insights from:

Tim Segato
Director, Product Management - eSentire

Ryan Westman
Manager, Threat Intelligence - eSentire

Sponsored by:

Facebook icon    Twitter icon    LinkedIn icon    Youtube icon

(ISC)² 311 Park Place Blvd #400, Clearwater, FL 33759 United States • www.isc2.org
© 1996–2022. (ISC)², Inc. All rights reserved.



Copyright 2023, International Information Systems Security Certification Consortium, Inc. (“(ISC)²), in website format and trade dress only. All Rights Reserved. (ISC)², CISSP, SSCP, CAP, ISSAP, ISSEP, ISSMP, CSSLP, and CBK are registered certification, service, and trademarks of (ISC)². Disclaimer: (ISC)²” does not own, operate, or moderate this website. All content of this site, exclusive of licensed trademarks or copyright, is the property of the designated (ISC)² Chapter organization, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².  

(ISC)2RVA is a 501(c)3 nonprofit organization.  EIN: 83-4655968

P.O. Box 2566, Glen Allen, VA 23058-2566

Powered by Wild Apricot Membership Software