+

THE DEMOFORUM

Present:

CYBER SYMPOSIUMS

MAR 26 - AUG 29

CLOUD SECURITY

AGENDA

DATE
TIME
TOPIC
MAY 21
TBD

Cloud-based tokenization: What is it and do we need it?

MAY 28
TBD

Data backup, recovery, and replication: Cloud best practices

JUN 04
TBD

Cloud security risks: Data breaches, unauthorized access, misconfigurations, inadequate IAM controls, compliance and regulatory challenges, and potential service outages or disruptions

JUN 11
TBD

Attack from Above: Adversary's Use of the Cloud

JUN 18
TBD

Data Leakage from the Cloud: How Do We Find and Stop it?

JUN 25
TBD

Securing Multi-tenant, multi-technology Cloud Infrastructure without tool overload

JUL 02
TBD

The Role of Data Store Discovery in Modern Enterprises

JUL 09
TBD

Cloud Native Security - why aren't we utilizing it as much as we should be?

JUL 16
TBD

Data migration complexity and misconfiguration: Cloud migrations can be complex, and misconfigurations during this process can lead to security vulnerabilities

JUL 23
TBD

Legal and regulatory compliance: 42% of organizations consider this a major cloud security issue

JUL 30
TBD

Cloud third-party threats: Unfamiliarity with cloud security best practices, the cloud shared security model, and other factors can make cloud environments more vulnerable to attack than on-prem infrastructure

BLACKHAT WARMUP

AUG 06
TBD

Access security: Data security solutions are built into many cloud platforms, but it is a shared responsibility between the cloud services provider and the customer

BLACKHAT ROUND UP

AUG 13
TBD

Cloud-based tokenization: What is it and do we need it?

BLACKHAT ROUND UP

AUG 20
TBD

Data backup, recovery, and replication: Cloud best practices

BLACKHAT ROUND UP

AUG 27
TBD

Data migration complexity and misconfiguration: Cloud migrations can be complex, and misconfigurations during this process can lead to security vulnerabilities

SEP 03
TBD

Legal and regulatory compliance: 42% of organizations consider this a major cloud security issue /p>

SEP 10
TBD

Cloud third-party threats: Unfamiliarity with cloud security best practices, the cloud shared security model, and other factors can make cloud environments more vulnerable to attack than on-prem infrastructure

SEP 17
TBD

Access security: Data security solutions are built into many cloud platforms, but it is a shared responsibility between the cloud services provider and the customer

SEP 26
TBD

Cloud-based tokenization: What is it and do we need it?

OCT 02
TBD

Data backup, recovery, and replication: Cloud best practices

OCT 09
TBD

Cloud security risks: Data breaches, unauthorized access, misconfigurations, inadequate IAM controls, compliance and regulatory challenges, and potential service outages or disruptions

OCT 16
TBD

Attack from Above: Adversary's Use of the Cloud

OCT 22
TBD

Data Leakage from the Cloud: How Do We Find and Stop it?

OCT 24
TBD

Securing Multi-tenant, multi-technology Cloud Infrastructure without tool overload