Webinar: Key threats to sensitive data in the cloud: and how to avoid them

Provided by

Enquire about this course

About the course

Join the webinar: Monday 6th September, UK: 16:00 - 17:00 GMT

Global times:
USA: 08.00 - 09.00 PDT
USA: 11:00 - 12:00 EDT

Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester. 

In the session, Scott will explore cloud storage specific security considerations. This short, but informative, webinar will examine real-world examples of how common misconfigurations can lead to vulnerabilities which unethical hackers can exploit to gain access to sensitive information stored in the cloud. These kinds of vulnerabilities are all the more prevalent due to the inability of traditional vulnerability scanners to detect them. You will learn about; 

* Examples and case studies of the storage abuse
* Supply chain attacks
* Cloud native ransomware 

We will cover live demonstrations of malicious actors modus operandi including enumeration and exploitation. We will be giving an automated storage audit tool which will allow you to determine your own level of risk in your storage deployment. There will be time for you to quiz our cloud security expert too - Not just on storage but anything cloud related across all three vendors! 

All this makes the webinar ideal for those with existing cloud environments or those planning to move to a cloud environment.

Register to join, we look forward to talking to you.


Start date Location / delivery
06 Sep 2022 Live Online Webinar Book now

Related article

£1.04m raised at pre-seed to re-skill adults into cyber security professionals using income share agreements Investors include Ufi VocTech Trust, G...