CSPM Best Practices for Multi-Cloud: Beyond Native Tools

As multi-cloud adoption accelerates, security teams are navigating the delta between each cloud provider’s native capabilities and comprehensive protection from bad actors.

Understanding cloud terminology, principles, and security issues is critical. Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

In this session we will:

     
  • Debunk new industry acronyms and explain how they fit into your overall cloud security strategy
  • Explain why native cloud provider tools aren’t always sufficient
  • Provide CSPM best practices: Detecting misconfigurations, excessive permissions and suspicious activity
  • Showcase how open-source Falco can be used to detect cloud threats in real-time

Speakers:

  • Alba Ferri, Security Product Marketing, Sysdig

Q&A:

  • Bruno da Silva, Solution Engineer, Sysdig

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.