Explosion of Cloud and the New Era of Cloud-Enabled Threats
As more organizations are migrating to the cloud or utilizing cloud applications, 20% increase in 2020 alone, it’s important to understand the inherent threats presented by leveraging the cloud and its capabilities.
In this discussion, we will discuss top threats (i.e. cloud phishing, cloud malware delivery) cybercriminals are exploiting and best practices to protect your data and users.
Chuck Chessor, Senior Security Engineer at Netskope, has over 15 years of network and information security experience supporting complex large enterprises - John Deere and US Courts
Safeguarding Internet of Things (IoT)
The Internet of Things (IoT) is a system of interrelated devices that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
This includes everything from cellphones, coffee makers, washing machines, headphones, lamps, wearable devices and almost anything else you can think of. This also applies to components of machines, for example a jet engine of an airplane or the drill of an oil rig. Allowing these devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.
IoT security is the technology area concerned with safeguarding the connected devices and networks that comprise the Internet of Things.
IoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.
Shawn Altman, a Staff Solution Security Engineer at VMware, has over 15 years of information security including architecture, network security, critical infrastructure, endpoint security, identity, and risk management.