The use of multi-cloud affects security in a number of ways and organisations need to know what measures to take to avert threats, says Sophos.
Perhaps it’s surviving the year without hitting the headlines for a data breach. Or being able to understand your company’s cloud infrastructure footprint so you can accurately secure it? Maybe you want to ensure compliance audits go off without a hitch? Or improve collaboration on security and compliance fixes with siloed compliance and development teams?
Whatever your goal, this Webinar can help. It explores the seven most important steps in securing the public cloud, providing practical guidance that every organisation can follow. It includes the results of threat research from SophosLabs about the frequency with which cyber criminals target cloud-based instances.
Join this session to find out the seven security best practices to follow when using Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP).
Your speaker, Rich Beckett, senior product marketing manager at Sophos, will arm you with a practical set of best practice approaches to securing the public cloud – based on conversations with CISOs in a range of businesses around the world.
Learn about various vulnerabilities you can be exposed to, such as automated attacks, automated cryptojacking and compliance and visibility challenges.
Rich Beckett is responsible for product marketing of Sophos public cloud and SaaS e-mail security tech. After getting his break working with tech start-ups and telecoms VARs, he spent the best part of his 20s and 30s in product management and product marketing for premium IaaS hosting brands, before joining Sophos in 2016.
Companies from across all industries
Sophos evolves to meet every new challenge, protecting more than 400 000 organisations of all sizes, in more than 150 countries, from today’s most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cyber criminal tactics and techniques.
Please visit: www.sophos.com.