Skip to content
Explore All

Understanding Cloud Deployment Vulnerabilities


Course
Enroll

Expert panel including leaders Prasanna Raghavendra, Ramesh Kumar, Ratan Jyoti and Sapna Singh discuss cloud security controls, compliance, and incident response planning.

While a shared responsibility model seems effective in theory, its implementation poses challenges.

Without clearly stated guidelines, it can be difficult to understand and define the responsibilities of customers and CSPs. The fallout is compromised security and privacy of data and applications.

Potential vulnerabilities in the cloud surface at the cloud service provider, data location, supply chain and the endpoints. As we see a greater momentum toward the cloud, security leaders are faced with questions: Who is responsible for what is in the cloud? How to navigate shared responsibility model? What role does data sovereignty and data localization play? What is the role of a CISO in navigating the risks?

In this session, the panel of experts will cover:

  • How to establish the right security and privacy controls in the cloud
  • Challenges in establishing accountability and understanding the role of CSPs and customers in defining the strategy for compliance and regulatory considerations
  • Meeting compliance requirements in the cloud and building an incident response plan

Here is the course outline:

Understanding the Vulnerabilities in the Cloud Deployment: Effective Ways to Secure and Remediate