{"id":11442,"date":"2021-10-07T14:06:36","date_gmt":"2021-10-07T19:06:36","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?post_type=tribe_events&#038;p=11442"},"modified":"2021-10-07T14:06:36","modified_gmt":"2021-10-07T19:06:36","slug":"cloud-security-or-lack-of-it-threat-vector-1","status":"publish","type":"tribe_events","link":"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/","title":{"rendered":"Cloud Security or Lack of It: Threat Vector #1"},"content":{"rendered":"<div class=\"wpb_text_column us_custom_c1cd50df has_text_color\">\n<div class=\"wpb_wrapper\">\n<h5><strong>What explains frequent cloud data breaches? Who is \u2018actually\u2019 responsible for Cloud Security? What can you do to fortify your cloud?<\/strong><\/h5>\n<\/div>\n<\/div>\n<div class=\"wpb_text_column us_custom_ad50af49\">\n<div class=\"wpb_wrapper\">\n<p>This webinar explains cloud security, division of responsibility between Cloud Providers and Cloud Users, and outlines different approaches, tools, and service models available. WATI\u2019s cybersecurity experts will provide insights on how cloud exploits typically happen and cover critical protection points in your cloud attack surface.<\/p>\n<\/div>\n<\/div>\n<div class=\"wpb_text_column us_custom_0d445bc7\">\n<div class=\"wpb_wrapper\">\n<h5><strong>Agenda &amp; Key Takeaways<\/strong><\/h5>\n<ul>\n<li>How simple and innocent misconfigurations on cloud services cause catastrophic data breaches?<\/li>\n<li>For some cloud services, default configurations can actually create serious security vulnerabilities.<\/li>\n<li>Native cloud security controls may be good, but are they always good enough?<\/li>\n<li>Why it\u2019s almost impossible for most organisations to keep up with cloud security demands?<\/li>\n<li>Tools and approaches available for cloud security<\/li>\n<li>Where to begin in cloud security?<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What explains frequent cloud data breaches? Who is \u2018actually\u2019 responsible for Cloud Security? What can you do to fortify your cloud? This webinar explains cloud security, division of responsibility between [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[566],"class_list":["post-11442","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-general-cybersecurity","cat_general-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security or Lack of It: Threat Vector #1 - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security or Lack of It: Threat Vector #1 - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"What explains frequent cloud data breaches? Who is \u2018actually\u2019 responsible for Cloud Security? What can you do to fortify your cloud? This webinar explains cloud security, division of responsibility between [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/\",\"name\":\"Cloud Security or Lack of It: Threat Vector #1 - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2021-10-07T19:06:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/ndisac.org\/dibscc\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Security or Lack of It: Threat Vector #1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security or Lack of It: Threat Vector #1 - DIB SCC CyberAssist","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Cloud Security or Lack of It: Threat Vector #1 - DIB SCC CyberAssist","og_description":"What explains frequent cloud data breaches? Who is \u2018actually\u2019 responsible for Cloud Security? What can you do to fortify your cloud? This webinar explains cloud security, division of responsibility between [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/","og_site_name":"DIB SCC CyberAssist","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/","url":"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/","name":"Cloud Security or Lack of It: Threat Vector #1 - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2021-10-07T19:06:36+00:00","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/events\/cloud-security-or-lack-of-it-threat-vector-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/ndisac.org\/dibscc\/events\/"},{"@type":"ListItem","position":3,"name":"Cloud Security or Lack of It: Threat Vector #1"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/11442"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=11442"}],"version-history":[{"count":1,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/11442\/revisions"}],"predecessor-version":[{"id":11443,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/11442\/revisions\/11443"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=11442"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=11442"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events_cat?post=11442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}