ChaptersCircleEventsBlog
Share how your organization manages AI securely. Take the CSA and Google enterprise AI Survey today!

Download Publication

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016
‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Release Date: 02/29/2016

Working Group: Top Threats

“The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies. The report reflects the current consensus among security experts in the CSA community about the most significant security issues in the cloud.


You can view the latest version of this report here
Download this Resource

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
How Mature is Your NHI Security Program?
How Mature is Your NHI Security Program?
Published: 07/07/2025
What We Can Learn from the 2024 CrowdStrike Outage
What We Can Learn from the 2024 CrowdStrike Outage
Published: 07/03/2025
What MITRE ATT&CK v17 Means for ESXi Security: Key Risks & How to Respond
What MITRE ATT&CK v17 Means for ESXi Security: Key Risks & How to R...
Published: 07/03/2025
A Copilot Studio Story: Discovery Phase in AI Agents
A Copilot Studio Story: Discovery Phase in AI Agents
Published: 06/26/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Working...

Read more

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

Laurie Jameson Headshot Missing
Laurie Jameson

Laurie Jameson

Scott Field Headshot Missing
Scott Field

Scott Field

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training