Skip to content

Details

Special thanks to BeyondTrust who is this month's meeting sponsor and presenter.

Topics that we'll cover in our April meeting:
- Key definitions of modern cloud technologies, threats, and cybersecurity solutions.
- How entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment.
- How to implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments.
- How to develop models for documenting risk, compliance, and reporting based on your cloud implementation

Events in Denver, CO
Cloud Security
Computer Security
Cloud Computing
Information Security
IAAS Security

Members are also interested in