Cloud 101CircleEventsBlog

Download Publication

Top Threats to Cloud Computing: Egregious Eleven
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven

Release Date: 08/06/2019

Working Groups: Data Security Top Threats

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies.

The Top Threats reports have traditionally aimed to raise awareness of threats, risks and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing.  In this fourth installment, we again surveyed 241 industry experts on security issues in the cloud industry. This year our respondents rated 11 salient threats, risks and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results along with its expertise to create the final 2019 report.

Related Certificates & Training | Related Articles | Working Group 
Download this Resource

Bookmark
Share
View translations
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The State of Security Remediation 2024
The State of Security Remediation 2024
For Game-Changing Cloud Workload Protection, Focus on Quality Over Quantity
For Game-Changing Cloud Workload Protection, Focus on Quality Over ...
Published: 03/27/2024
Everything You Need to Know About the EU AI Act
Everything You Need to Know About the EU AI Act
Published: 03/27/2024
Powerful Cloud Permissions You Should Know: Part 1
Powerful Cloud Permissions You Should Know: Part 1
Published: 03/26/2024
Salesforce Data Security Challenges in Wake of the Recent Breach
Salesforce Data Security Challenges in Wake of the Recent Breach
Published: 03/26/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

This person does not have a biography listed with CSA.

Neha Thethi Headshot Missing
Neha Thethi

Neha Thethi

Neha works with BH Consulting as an Information Security Analyst in Dublin, Ireland. Her role includes carrying out security assessments for cloud environments, digital forensic investigations, vulnerability assessments and conducting audits against the ISO 27001 security standard. She has contributed to published security research and white papers on cloud security. She has presented at industry events including SecureCloud 2016, B-Sides L...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

This person does not have a biography listed with CSA.

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook, Principal at Guide Holdings, LLC, has 20 years of experience in Information Security with such organizations as Raytheon, Northrop Grumman, Booz Allen Hamilton, Optiv Security and Symantec. Mr. Brook's work traverses the government, financial, healthcare, gaming, oil and gas and pharmaceutical industries. Mr. Brook obtained a number of industry certifications, including CISSP and CCSK, has patents and trade secrets in...

Read more

Zoran Lalic Headshot Missing
Zoran Lalic

Zoran Lalic

This person does not have a biography listed with CSA.

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Read more

Alexander Getsin
Alexander Getsin

Alexander Getsin

Alexander Stone Getsin is a financial technologies security leader with particular expertise and interest in cloud security, secure application design, and security governance. Alex is the lead author of industry security best practices, particularly with the Cloud Security Alliance, Top Threats research group, and the (ISC)2 Israeli Chapter, which he helps champion as a co-chairman. Alex leverages a decade of experience in finance, militar...

Read more

Laurie Jameson Headshot Missing
Laurie Jameson

Laurie Jameson

This person does not have a biography listed with CSA.

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Ashish Kurmi Headshot Missing
Ashish Kurmi

Ashish Kurmi

This person does not have a biography listed with CSA.

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

This person does not have a biography listed with CSA.

Greg Jensen Headshot Missing
Greg Jensen

Greg Jensen

This person does not have a biography listed with CSA.

Shachaf Levy Headshot Missing
Shachaf Levy

Shachaf Levy

This person does not have a biography listed with CSA.

Shira Shamban Headshot Missing
Shira Shamban

Shira Shamban

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training