On-Demand Webinar / Cloud

Secure Your Cloud-Native Applications

A Focus on Organizations in Asia-Pacific

On-Demand

5 Key Considerations for Secure Cloud Native Applications

Cloud-native applications demand specialized security strategies distinct from traditional on-premises approaches. Misconfigured public cloud workloads open the door to breaches and compliance violations.

In this session, we share proven strategies for fortifying your hybrid and multi-cloud environments and recommend key considerations to help you better secure your hybrid and multi-cloud environments against vulnerabilities and breaches.

Highlights of session

  • Attack surface management: See your organization’s full digital footprint to enable effective risk management
  • Configuration control: Understand and address the risks of insecure configurations across hybrid/multi-cloud
  • Policy-as-code: Enforce consistent security standards across all clouds
  • Data security posture management: Use automation for identifying and securing sensitive data in cloud workloads
  • Security program management: Enhance collaboration with cloud-native application protection platform (CNAPP) tools

Who should watch?
Cloud and infosec professionals responsible for managing and reducing risk across cloud-native and hybrid environments.


Speakers

Alvin Yeo
Alvin Yeo

CISSP & CCSP, Cloud Specialist, APJ

Wing Churn Leong
Wing Churn Leong

Senior Cloud Security Engineer, APJ, Tenable

Kendal Cole
Kendal Cole

Territory Manager, Cloud Security, Tenable

Nick Bourke
Nick Bourke

Senior Cloud Security Engineer, Tenable

الموارد

Analyst Research
可視化× 自動化×統合化によるクラウドセキュリティのアプローチ
Solution
احصل على أمن شامل عبر نهج "التحول لليسار" (Shift-Left) باستخدام منصة Tenable One Cloud Exposure.
أبحاث التعرض للمخاطر الإلكترونية
تقرير Cloud and AI Security Risk لعام 2026