More businesses are shifting critical assets and operations to the cloud, as service providers enhance their security capabilities --and cyber attackers have adapted accordingly. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.

Attend this webinar and you'll learn about:

  • The mistakes that can lead to devastating cloud bucket leaks
  • The threats and vulnerabilities causing cloud users the most trouble right now
  • Best practices to help embrace the cloud, while reducing risk
Photograph of John Burke

John Burke, Senior IT Security Engineer, Iberia Bank

John Burke is a Senior IT Security Engineer for Iberia Bank. A graduate of Auburn University, John has more than 20 years in IT experience. John has worked in banking and healthcare technology risk systems, as well has broad experience managing security for other disciplines. He is a Certified Computer Forensics Examiner, Certified Web Application Penetration Tested, and a Certified Ethical Hacker.

Photograph of Jonas Outlaw

Jonas Outlaw, Senior Product Manager

As Senior Product Manager, Jonas works with a variety of stakeholders in the product development lifecycle to help drive product direction and enhancements. Jonas brings more than a decade of experience to BeyondTrust in various aspects of applications development, systems engineering and product management. Prior to joining BeyondTrust, Jonas was a systems engineer at a large life insurance company. He received his MBA with a concentration in Management Information Systems from Mississippi College.

Prefers reduced motion setting detected. Animations will now be reduced as a result.