SAN ANTONIO, Nov. 30, 2017 /PRNewswire/ — More than 90 percent of organizations are now using cloud services and SaaS applications like Office 365 or G Suite, along with cloud infrastructure like AWS, Google Cloud, and Azure. Most, however, do not consider all the potential risks to data and business operations that can result from human error or malicious actors when accounts are misconfigured or mismanaged. Delta Risk, a global provider of cyber security and risk management services, announced today that it will host a webinar on this topic with recommendations for what security professionals can do to improve their cloud security posture and protect critical information. The live webinar, “Flying Blind: 2017 Cloud Configurations Gone Wrong,” will take place December 7 at 1 PM ET.
The lack of visibility and control around cloud services is resulting in some of the most significant data breach incidents of 2017. A survey of security professionals in the Cloud Security: 2017 Spotlight Report, published by Crowd Research Partners in coordination with Delta Risk, shows the top three cloud security concerns of survey respondents were protecting against data loss (57 percent), threats to data privacy (49 percent), and breaches of confidentiality (47 percent).
In the webinar, John Hawley, Vice President of Product Strategy, along with Michael Piscopo, Director of Technical Consulting Services, will take an in-depth look at some of the biggest public cloud breaches in 2017 and examine what went wrong in each case. They will also discuss:
New risks related to the use of cloud services Common factors between 2017 security incidents Indications for malicious behavior or risks Methods and technology to prevent misconfiguration
“There’s hardly a week that passes without another news story on data losses and malicious user behavior resulting from misconfigured cloud instances,” notes Hawley. “Although moving to cloud services like AWS, Azure, or Google Cloud can offer significant cost savings and flexibility, the developers implementing these projects often lack the security knowledge required to keep data secure.”
While cloud services themselves are generally secure, the task of configuring and using them securely is often left to organization’s IT leaders, development teams, or even line of business managers. The lack of visibility and control around these services is resulting in some of the most significant data breach incidents of