top of page
Securing SaaS Applications
A Comprehensive Approach to Cloud Risk Management

Price

$159

Duration

4 Hours

Type

Zoom or On-Demand

About the Course

As organizations increasingly rely on cloud-based Software-as-a-Service (SaaS) solutions, understanding and mitigating associated risks is critical. This virtual training provides an in-depth exploration of key security considerations when evaluating and managing SaaS applications.


The course begins with an overview of cloud and SaaS risks, highlighting the unique challenges posed by cloud-based environments. Participants will gain insights into the Shared Responsibility Model, clarifying the division of security responsibilities between cloud providers and customers. The session then delves into security frameworks for major cloud platforms, including Amazon Web Services (AWS) Trust Advisor Reports (TAR), Google Cloud Security, and Microsoft Azure Cloud Security, helping learners assess provider-specific security features.


Building on this foundation, the training covers best practices for conducting inherent risk assessments and leveraging cloud security questionnaires to evaluate vendor security controls. Practical exercises on physical validation techniques and SaaS software testing will equip participants with hands-on approaches to verifying security measures. The course concludes with guidance on effective off-boarding strategies, ensuring secure data removal and risk mitigation when transitioning away from a SaaS provider.


Ideal for risk management professionals, security teams, and procurement specialists, this training provides actionable knowledge to strengthen SaaS security practices and enhance third-party risk management strategies.


This training is available live over Zoom or as On-Demand.

Your Instructor

Gregory Rasner

Gregory is a CEO, author, educator, speaker, and leader in the field of cybersecurity, zero trust, and third-party risk. With over 25 years of experience in IT and cybersecurity, he has helped numerous clients and organizations improve their security posture and reduce their risk exposure. He is the founder and CEO of Third Party Threat Hunting LLC, a cybersecurity consulting firm that specializes in a wide range of areas, including cybersecurity, cloud computing, network architecture, and more.

bottom of page