Cloud 101CircleEventsBlog
Call for Presentations: Share your expertise at SECtember.ai 2024! Submit your proposals by June 28th.

Download Publication

Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven

Top Threats to Cloud Computing Pandemic Eleven

Release Date: 06/06/2022

Working Group: Top Threats

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing. In this sixth installment, we surveyed 703 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results and its expertise to create the 2022 Top Cloud Threats report - the ‘Pandemic Eleven’.



Download this Resource

Bookmark
Share
View translations
Related resources
CCM v4.0 Implementation Guidelines
CCM v4.0 Implementation Guidelines
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Identity and Access Management Working Group Charter 2024
Identity and Access Management Working Group Ch...
Mastering Zero Trust Security in IT Operations
Mastering Zero Trust Security in IT Operations
Published: 06/14/2024
Discover CCSK v5: The New Standard in Cloud Security Expertise
Discover CCSK v5: The New Standard in Cloud Security Expertise
Published: 06/12/2024
The Human Element in AI-Enhanced SOCs
The Human Element in AI-Enhanced SOCs
Published: 06/10/2024
Application Security Solutions: CNAPP vs CSPM vs ASPM
Application Security Solutions: CNAPP vs CSPM vs ASPM
Published: 06/07/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Alexander Getsin
Alexander Getsin

Alexander Getsin

Alexander Stone Getsin is a financial technologies security leader with particular expertise and interest in cloud security, secure application design, and security governance. Alex is the lead author of industry security best practices, particularly with the Cloud Security Alliance, Top Threats research group, and the (ISC)2 Israeli Chapter, which he helps champion as a co-chairman. Alex leverages a decade of experience in finance, militar...

Read more

Stephen Pieraldi Headshot Missing
Stephen Pieraldi

Stephen Pieraldi

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Read more

Laurie Jameson Headshot Missing
Laurie Jameson

Laurie Jameson

Shachaf Levy Headshot Missing
Shachaf Levy

Shachaf Levy

Shira Shamban Headshot Missing
Shira Shamban

Shira Shamban

Neha Thethi Headshot Missing
Neha Thethi

Neha Thethi

Neha works with BH Consulting as an Information Security Analyst in Dublin, Ireland. Her role includes carrying out security assessments for cloud environments, digital forensic investigations, vulnerability assessments and conducting audits against the ISO 27001 security standard. She has contributed to published security research and white papers on cloud security. She has presented at industry events including SecureCloud 2016, B-Sides L...

Read more

Zoran Lalic Headshot Missing
Zoran Lalic

Zoran Lalic

Andrew McCormick Headshot Missing
Andrew McCormick

Andrew McCormick

Hugh Foskett Headshot Missing
Hugh Foskett

Hugh Foskett

Marcus Ryan Headshot Missing
Marcus Ryan

Marcus Ryan

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training