Webinar: Key threats to sensitive data in the cloud: and how to avoid them

Provided by

Enquire about this course

About the course

Join the webinar: Tuesday 18th January 2022, UK: 16:00 - 17:00 GMT

Global times:
USA: 08.00 - 09.00 PDT
USA: 11:00 - 12:00 EDT

Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester. 

In the session, Scott will explore cloud storage specific security considerations. This short, but informative, webinar will examine real-world examples of how common misconfigurations can lead to vulnerabilities which unethical hackers can exploit to gain access to sensitive information stored in the cloud. These kinds of vulnerabilities are all the more prevalent due to the inability of traditional vulnerability scanners to detect them. You will learn about; 

* Examples and case studies of the storage abuse
* Supply chain attacks
* Cloud native ransomware 

We will cover live demonstrations of malicious actors modus operandi including enumeration and exploitation. We will be giving an automated storage audit tool which will allow you to determine your own level of risk in your storage deployment. There will be time for you to quiz our cloud security expert too - Not just on storage but anything cloud related across all three vendors! 

All this makes the webinar ideal for those with existing cloud environments or those planning to move to a cloud environment.

Register to join, we look forward to talking to you.


Start date Location / delivery
18 Jan 2022 Live Online Webinar Book now

Related article

Qufaro have become cyber champions of the neurodiverse community, actively promoting opportunities and support. Through the Autism in the Workplace...