Learn to implement the Center for Internet Security (CIS) critical controls for cloud workloads. Increasingly, cybercriminals are targeting cloud-hosted workloads, looking for high-value assets and free compute. In this session, Jonathan Trull will provide explicit guidance on how to leverage the controls in cloud environments to prevent data theft and unauthorized cloud resource consumption.
1: Understand the most common types of attacks against cloud users in 2017.
2: Learn actionable guidance for implementing key controls within your cloud estate.
3: Learn how to apply key controls within public clouds.