Understand your risk appetite 2. Identify your crown jewels 3. Proportional defense
6
Define Framework and Roadmap
7
Create a cyber
8
Run regular phishing simulations
9
Web application firewall
10
Cloud Access Security Brokers CASB
11
Regular penetration tests
12
Secure code training
13
Solid incident response plan
Description:
Explore the evolving landscape of cyber security in the cloud era through this insightful conference talk from YOW! 2018. Delve into the challenges of protecting digital assets in a world where traditional perimeter defenses are no longer sufficient. Learn about the shift from on-premises security to cloud-based protection, and discover strategies for safeguarding data that exists beyond the firewall. Gain valuable insights on holistic approaches to data protection, including risk assessment, identifying critical assets, and implementing proportional defense measures. Explore key components of a robust cyber security framework, such as regular phishing simulations, web application firewalls, and Cloud Access Security Brokers (CASB). Understand the importance of penetration testing, secure code training, and developing a solid incident response plan. This talk equips IT professionals and business leaders with the knowledge to navigate the complex cyber security landscape in the age of cloud computing and remote work.
Read more
Instrument Flight Rules - Navigating Cyber Security in a Cloud Landscape