Download Publication

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016
Release Date: 02/29/2016
Working Group: Top Threats
Download this Resource
Related Resources
Acknowledgements

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Victor Chin

Jon-Michael Brook
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Vic Hargrave
Senior Cyber Analyst/Engineer
Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Dave Shackleford

Laurie Jameson

Scott Field
Interested in helping develop research with CSA?
Related Certificates & Training

Learn more