As organizations move their sensitive data into the cloud, they will inevitably face security incidents that stem from not being adequately prepared. But the good news is that future breaches can be mitigated by investing in processes and tools to build out a robust Cloud Security Posture Management (CSPM) strategy.
CSPM is not just a cloud security assessment that helps you identify security violations for a point in time. It is an evolving concept that proactively facilitates the identification of systems in the cloud that are mismanaged and misconfigured. This webinar will provide you with an overview of CSPM, which includes compliance monitoring, DevOps integration, incident response, risk assessment, and risk visualization. More specifically, following this webinar, you will be able to:
- Distinguish strong Cloud Security Posture Management
- Apply strategies for implementing proper Cloud Security Posture Management
- Produce metrics that can be used in Cloud Security Posture Management
Access On-Demand Recording
Megha is a Senior Manager in the Orlando office with a concentration in Information Security and Privacy and Cloud Security. She has a strong background in working across multiple industries, including healthcare, banking, Big Tech, ecommerce, theme parks and entertainment, hospitality, and insurance on topics related to Information Security and Cloud Security. Additionally, Megha is an industry leader, speaks at security conferences (e.g., DEFCON), and contributes to cloud security industry leading practices (e.g., white papers), most notably as an elected member of the Cloud Security Industry Summit (working group of Cloud Security Alliance). She also works alongside the Protiviti Cloud Security national lead to build and enhance Protiviti’s national cloud security practice.
Francis is a Managing Director in Protiviti’s Security and Privacy practice and leads the organization’s North America Cloud Security practice. Francis has 16 years of experience in security operations, data governance, and information security program management. His expertise includes cloud security, strategic planning, leading cross-functional teams, information security program development, digital privacy, and incident management.