Hi [[ session.user.profile.firstName ]]

Cloud Security Alliance

  • Date
  • Rating
  • Views
  • Defeating the Insider Threat:  Don't Have Your Head in the Clouds Defeating the Insider Threat: Don't Have Your Head in the Clouds Evelyn De Souza and Mary Beth Borgwing Recorded: Oct 19 2016 44 mins
    Everything we know about defeating the Insider Threat seems not be solving the problem. That's why the Cloud Security Alliance with special commentary from LemonFish Technologies undertook new research to understand the extent of this issue.

    Join the Cloud Security Alliance Strategy Advisor, Evelyn de Souza, Mary Beth Borgwing, President of LemonFish Technologies...
    -Uncover the extent of insider threats
    -Learn what happens to data after its being exfiltrated
    -Tools to mitigate insider threats going forward.
  • IT Security & Privacy Governance in the Cloud IT Security & Privacy Governance in the Cloud Moderated by Rebecca Herold, The Privacy Professor; Jacqueline Cooney, BAH, Daniel Catteddu, CSA, Chris Griffith from HPE Recorded: Oct 18 2016 61 mins
    After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space. As companies transition their applications and data to the cloud, it is critical for them to maintain, or preferably surpass, the level of security they had in their traditional IT environment. Leaders are also responsible for defining policies to address privacy concerns and raise awareness of data protection within their organization, and for ensuring that their cloud providers adhere to the defined privacy policies. Failure to ensure IT Security when using cloud services could ultimately result in higher costs and potential loss of business, thus eliminating any of the potential benefits of the cloud.

    While security and privacy are related, they are also distinct. IT security is primarily concerned with defending against attacks, not all of which are aimed at stealing data, while privacy is specifically related to personal data held by an organization, which may be endangered by negligence or software bugs, not necessarily by malevolent persons. On this webinar our panel of experts will address some of the key distinctions, and discuss some best practices for managing IT security and implementing privacy governance for the cloud.
  • Working the Numbers: Learn How to Make the Case for a CASB Working the Numbers: Learn How to Make the Case for a CASB Palerra Recorded: Oct 13 2016 43 mins
    58% of security professionals expect their budgets to stay the same next year. If you’re like them, you’re trying to secure a growing number of cloud services and infrastructure without a bigger budget.

    What do you do? Make a bulletproof business case for a Cloud Access Security Broker (CASB).

    In this webinar you'll learn:
    -How to demonstrate the financial exposure of not having a CASB
    -How to align cloud security spending with business objectives
    -How to demonstrate savings in cyber security expertise through
  • 20 Months to a New Global Data Privacy Law – What You Need To Do 20 Months to a New Global Data Privacy Law – What You Need To Do Nigel Hawthorn of Skyhigh Recorded: Oct 11 2016 59 mins
    The GDPR Covers Anyone with Data on European Residents

    In May 2018, a new data privacy law comes into effect and any organisation with data on the 500+ million citizens of the European Union (EU) has to comply. Fines can be up to 4% of revenue, mandatory data loss notification to regulators and users comes into force, and class action lawsuits will land on the desk of anyone unfortunate enough to lose data. As with any data loss incident, these costs may be dwarfed by the loss of brand image and customers choosing not to do business with you again.

    Unmanaged cloud could be your weakest link, so what do you need to do?

    Join us for this webinar where the author of “GDPR – An Action Guide for IT” will speak and you will learn:

    · The top ten points of the new regulation
    · Which departments in your organisation need to be part of the GDPR-Readiness Team
    · What you need to do today, what you can leave until tomorrow
    · Policies for collecting, processing, transferring and deleting data
    · 25 questions to ask yourselves to ensure you are ready
  • Scared of implementing a data protection solution? Scared of implementing a data protection solution? Rich Mogul of Securosis and Terence Spies of HPE Security--Data Security Recorded: Oct 6 2016 62 mins
    Data protection has a tendency to be intimidating for organizations, users and implementers. Organizations see the value of having a data protection program but the challenges of applying a data protection solution often upsets the balance and work flow within the organization, users and create challenges for those implementing. Wouldn’t it be great if there were solutions that took the guesswork out of data protection and key management?

    Data moves in a non-linear way. Data protection and key management needs to interact with the data and the users in a seamless way that doesn’t disrupt their processes or destroy the characteristics of the data.

    Fortunately, in today’s data driven environment, there are strategies and technologies to protect data that do not have to be the high-risk propositions feared by organizations, users and implementers - IT professionals. By thinking of data protection and key management as data t protection enablers instead of obstacles, you can easily protect data across the infrastructure and beyond.

    Join this session and learn how HPE Security – Data Security offers unintimidating data protection and key management solutions that take the guesswork out of data protection. Protecting data through a layered security approach: from data-at-rest to data-in-motion and data-in use.
  • CSA Research: Mitigating Top Cloud Threats CSA Research: Mitigating Top Cloud Threats Salim Hafid and Rich Campagna of Bitglass, and John Yeoh of CSA Recorded: Aug 30 2016 57 mins
    With cloud adoption on the rise, IT leaders are looking to peer organizations to understand security best practices in the cloud. Bitglass and CSA surveyed infosec professionals to uncover the top threats to cloud security and the tools most often used to secure cloud apps.

    In this webinar, John Yeoh, Senior Research Analyst at CSA, joins Bitglass to discuss the results of the "Mitigating Risk for Cloud Applications" report and to explore the major issues facing organizations in their move to the cloud, from Shadow IT and inadequate visibility to concerns around government access.
  • Standardization and visibility of security controls in Hybrid Standardization and visibility of security controls in Hybrid Avinash Prasad and Munish Gupta of Infosys Ltd Recorded: Aug 24 2016 50 mins
    The needs for IT agility for business, is driving adoption of flexible computing environments including IaaS, Private Cloud among others. The challenge associated with this transformation towards the Hybrid cloud environment is the assurance around the security for the workloads and data. Specific issues arise due to the “Shared security model ” of the varying Cloud environments in terms of implementation of security, compliance and optimization in these environments.

    The need of the hour is to ensure effective security governance through standardization of security controls/Policies across Hybrid cloud deployments are driven by embedded security mechanisms with lesser bolted-on overhead on the IT security teams. One successful example is the leveraging of “security for the cloud from the cloud” to provide elastic and adaptive security services for the hybrid cloud

    In this webinar, Avinash Prasad, AVP, Information & Cyber Risk Management and Munish Gupta, Principal – Information & Cyber Risk Management , Infosys (NYSE: INFY) will share their experiences with respect to standardization of security controls in Hybrid cloud environments.
  • Protect, Detect, Respond and Recover: Mitigating the Risks of Cyber Security Protect, Detect, Respond and Recover: Mitigating the Risks of Cyber Security Mat Hamlin of Spanning by EMC and Will McNae of Microsoft Recorded: Aug 16 2016 49 mins
    Information theft is the most expensive consequence of cybercrime, according to a recent Ponemon study. Business interruption following a cyberattack exacts a high price in productivity and business process failures—even greater than the cost of information and revenue losses.1 The more data you share in the cloud, the more you expose it to attack. While there’s no one way to achieve absolute security for your data, there’s a lot you can do to safeguard against attacks and to stop them from crippling your business if they do occur. Join us for this webinar as we explore ways to more effectively protect your cloud-based data, detect threats, respond to attacks, and recover from them.
  • True Detective: Detecting Insider Threats and Compromised Accounts in Office 365 True Detective: Detecting Insider Threats and Compromised Accounts in Office 365 Brandon Cook and Santosh Raghuram of Skyhigh Networks Recorded: Aug 9 2016 50 mins
    How does your organization combat insider threats and compromised accounts?

    Join CSA and Skyhigh Networks to learn about cloud threat findings from the research of CSA and Skyhigh Cloud Security Labs. We’ll share practical guidance on how to address the rapidly evolving cloud threat landscape, starting with user behavior analysis.

    Specifically, we will discuss how Information Security teams can:

    • Detect malicious or negligent insider stealing or unintentionally exposing data from O365 and other SaaS applications.
    • Catch third parties logging into corporate cloud service using stolen or misplaced login credentials to steal valuable corporate data
    • Identify malicious administrators accessing data out of policy, intentionally degrading security settings, or creating dummy accounts for unauthorized third party access
  • Protect Against New Threats to Safely Enable SaaS Protect Against New Threats to Safely Enable SaaS Palo Alto Networks Recorded: Aug 4 2016 50 mins
    The usage of SaaS applications continues to grow rapidly whether they are enabled by IT or your end users. SaaS-based application usage has grown 46 percent over the past three years as shown in the latest Application Usage and Threat Report from Palo Alto Networks. The attackers are now adapting to leverage these applications as a point of insertion and a medium for malware to proliferate.

    Join us for this live webinar where you will hear from Unit 42, the Palo Alto Networks threat research team, on how malware is using SaaS applications. You will also learn how to:

    • Protect against the new insertion and distribution points for malware
    • Gain visibility and granular, context-based control of SaaS applications
    • Secure corporate data from malicious and inadvertent data exposure

Embed in website or blog