Cloud / Hybrid Cloud Security

Events

Views Navigation

Event Views Navigation

Today
  • New Rules of Cloud Security: Adapting to AI-powered Attacks

    The convergence of cloud infrastructure and AI workloads has created new attack surfaces—and adversaries are taking notice. As organizations scale cloud operations and embed AI into workflows, attackers are scaling too—automating reconnaissance, exploiting APIs, and targeting weak links in complex environments. Organizations must evolve their defenses to match. Topics include: • How automation is changing both attack and defense • Threats targeting cloud-native and AI-integrated systems • Strategies for scaling detection and response • Reducing risk through visibility, context, and control Join us to gain actionable insights to future-proof cloud and AI defenses.
    Topics:
    , , , , ,
  • Cloud Misconfigurations Aren’t Mistakes. They’re a Systemic Problem. Here’s How to Fix the System.

    When a storage bucket is left publicly accessible or an IAM role is overprovisioned, the instinct is to call it a mistake and fix the specific instance. The problem is that these “mistakes” keep happening because the systems that produce them are designed for speed, not security. Nearly anyone in the organization can spin up cloud resources with a few clicks, often with no security review. More than half of organizations cite lenient IAM practices as a top data security challenge, and 72% of cloud environments have publicly exposed PaaS databases lacking sufficient access controls. This is not a human error problem. It is a governance and architecture problem.

    Fixing individual misconfigurations is necessary, but it is not a strategy. Organizations need guardrails that prevent misconfigurations at the point of creation, continuous validation that catches drift before attackers do, and unified visibility across multi-cloud environments where assets appear and disappear in real-time.

    Solving this requires coordination across cloud security posture management, entitlement management, workload protection, and cloud-native application protection platforms to enforce guardrails, reduce overpermissioning, and maintain visibility across dynamic environments.

    Topics include:

    • Moving from reactive misconfiguration remediation to preventive guardrails
    • Addressing IAM sprawl, overpermissioning, and role creep across cloud environments
    • Continuous security validation in dynamic multi-cloud architectures

    Explore how to treat cloud misconfigurations as a systemic challenge and build the governance, automation, and visibility to fix the system that produces them.

    Topics:
    , , , , , ,

    Shadow Data, AI Pipelines, and the 802,000 Files You’re Oversharing Right Now

    The average organization has more than 800,000 data files at risk from oversharing, erroneous access permissions, and inappropriate classification. That number is climbing as AI pipelines generate and ingest data faster than any manual classification effort can keep up. Half of all enterprise workloads are now cloud-based, and the rise of AI is accelerating data creation without guardrails or oversight. The result is shadow data: sensitive information scattered across environments that security teams cannot see, classify, or protect.

    Traditional data security strategies assume that most data lives in known locations with defined access controls. That assumption broke years ago. Today, 90% of business-critical documents are shared outside the C-suite, AI models are training on datasets that may contain PII or intellectual property, and unstructured content is multiplying across SaaS, cloud storage, and collaboration platforms.

    Regaining control requires visibility and coordination across data discovery, classification, access governance, and data protection controls – from DSPM and DLP to SaaS security and AI data governance.

    Topics include:

    • Discovering and classifying sensitive data across cloud, SaaS, and AI environments
    • Addressing the shadow data problem created by AI-driven data proliferation
    • Reducing oversharing risk through automated access governance and posture management

    Join us to learn how organizations are regaining visibility and control over data they did not know they were exposing.

    Topics:
    , , , , , ,