Open Peer Review: The Treacherous 12 – Cloud Computing Top Threats in 2016

The Cloud Security Alliance would like to invite you to review and comment on the Top Threats Working Group’s survey report, The Treacherous 12 – Cloud Computing Top Threats in 2016. The survey report shares findings and analysis from the Top Threats Working Group’s survey from late 2015. The revised report aimed to provide organizations with up-to-date, expert-informed understanding of cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies.

This is your opportunity to provide feedback and identify any critical areas that we might be missing in our working group’s focus. The open review and comments period starts today and ends on February 15, 2016. Submitting feedback is easy with our three-step process.

Contribute now

We appreciate your assistance, contribution, and time. Thank you in advance for your time and contribution. If you are interested in getting involved with the Top Threats working group, please contact research@cloudsecurityalliance.org.

Share this content on your favorite social network today!