Cloud 101CircleEventsBlog
Register for CSA's AI Summit at RSAC on May 6!

Download Publication

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016
‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Release Date: 02/29/2016

Working Group: Top Threats

“The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies. The report reflects the current consensus among security experts in the CSA community about the most significant security issues in the cloud.


You can view the latest version of this report here
Download this Resource

Bookmark
Share
Related resources
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleve...
Cloud Threat Modeling
Cloud Threat Modeling
2023 Threat Intelligence Year in Review: Key Insights and Developments
2023 Threat Intelligence Year in Review: Key Insights and Developments
Published: 03/14/2024
A Comprehensive Guide to Business Cyber Security
A Comprehensive Guide to Business Cyber Security
Published: 03/14/2024
HijackLoader Expands Techniques to Improve Defense Evasion
HijackLoader Expands Techniques to Improve Defense Evasion
Published: 03/08/2024
QR Codes, Audio Notes, and Voicemail - Clever Tricks Up a Phisher’s Sleeve
QR Codes, Audio Notes, and Voicemail - Clever Tricks Up a Phisher’s...
Published: 03/07/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

This person does not have a biography listed with CSA.

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook, Principal at Guide Holdings, LLC, has 20 years of experience in Information Security with such organizations as Raytheon, Northrop Grumman, Booz Allen Hamilton, Optiv Security and Symantec. Mr. Brook's work traverses the government, financial, healthcare, gaming, oil and gas and pharmaceutical industries. Mr. Brook obtained a number of industry certifications, including CISSP and CCSK, has patents and trade secrets in...

Read more

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Read more

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

This person does not have a biography listed with CSA.

Laurie Jameson Headshot Missing
Laurie Jameson

Laurie Jameson

This person does not have a biography listed with CSA.

Scott Field Headshot Missing
Scott Field

Scott Field

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training