Hi [[ session.user.profile.firstName ]]

Cloud Security and Compliance

  • Date
  • Rating
  • Views
  • How Retail Insights, LLC Met Compliance Mandates and Enhanced Security on AWS
    How Retail Insights, LLC Met Compliance Mandates and Enhanced Security on AWS Alert Logic - Ryan Holland, Dir. of Cloud Arch.; AWS - Patrick McDowell, Partner SA; Retail Insights – Orion Newman, VP of IT Recorded: Jul 19 2017 44 mins
    Learn about AWS customer Retail Insights’ several security and compliance needs when protecting their AWS environment and how Alert Logic helped develop a comprehensive security strategy by understanding their security posture, gaining visibility into their environment and proactively protecting against threats and attacks. Attendees will gain a deep understanding of securing the full application stack and the value of having a security solution tightly integrated with AWS.
  • Your Business Apps Are Under Attack: Are You Really Protected?
    Your Business Apps Are Under Attack: Are You Really Protected? James Brown, Global VP Technical Solutions at Alert Logic Recorded: Jun 15 2017 48 mins
    According to Verizon’s 2017 Data Breach Investigation Report, web application attacks are the leading cause of breaches, more than tripling from 9% to 30% since 2014. And as alarming as that sounds, it makes sense as only 24% of organisations said that their application security is mature with all aspects of security measures covered according to Cybersecurity Trends: 2017 Spotlight Report.

    What does this mean for you? If web application attacks are the number one source of data breaches, it means that properly securing your applications must be your top priority. It also means that it is time to rethink your current security best practices, what tools you choose to employ in the cloud, and how you will incorporate expertise and intel into your security strategy.

    Register for this impactful webinar presented by James Brown, Global VP Technical Solutions at Alert Logic who will discuss that when launching an application in the cloud, it’s important to understand the risks you face when you do so without a comprehensive cloud security strategy in place:
    - The value and risk of your business applications
    - The complexities of protecting applications in the cloud
    - The Shared Security Model: What you are responsible for
    - The importance of incorporating security into DevOps workflows
    - Meeting compliance and what you should know
    - Best practices to protect against the latest threats

    This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
  • Protecting your Azure Cloud Workloads with Alert Logic Cloud Defender
    Protecting your Azure Cloud Workloads with Alert Logic Cloud Defender Vince Bryant, Cloud Platform Partner Executive, and Troy White, Sr. Manager – Deployment Architecture Recorded: Jun 7 2017 50 mins
    According to Verizon’s latest breach report, web application attacks are the number one source of data breaches, up 300% from 2014. Defending the application layer from attacks is complex, especially in the cloud. Although cloud platforms come with security built into the platform, securing the application layer is the responsibility of the organization using the cloud, not the responsibility of the cloud service provider.

    Please join Azure cloud security experts from Alert Logic for this webinar to learn how organizations use Alert Logic Cloud Defender® to protect the full-stack in workloads running on Microsoft Azure. Unlike other offerings, our service is architected for the cloud and fully managed 24x365 by cloud security experts.

    In this webinar, we will cover:

    o Challenges of detecting and blocking web attacks in the cloud
    o How Cloud Defender service protects workloads in Azure
    o Walk through a typical deployment for an Azure IaaS environment
    o Discuss advanced deployment options, including:
    1. Optimized deployment for environments with multiple VNETs
    2. Web Application protection for Azure App Services environments
    3. Securing workloads deployed with Docker containers
  • Fireside Chat: Cloud Trends Around Security and Innovation
    Fireside Chat: Cloud Trends Around Security and Innovation Misha Govshteyn, SVP of Product Management & Founder and Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic Recorded: Jun 1 2017 24 mins
    Join Misha Govshteyn, SVP of Product Management and Founder and Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic for this fireside chat as they discuss:

    - The security industry has pivoted from Intrusion Prevention, to Intrusion Detection: Where is it going next?
    - Lessons Learned: The Alert Logic journey of migrating its SaaS service from a hosting environment to AWS
  • Detecting Threats With Machine Learning
    Detecting Threats With Machine Learning Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jun 1 2017 29 mins
    As more cyber-attacks dominate our news, Security Operation Centers are under increasing pressure to make sense of millions of security alerts processed every day to find that needle in the haystack and stop the attacks before they inflict significant damage. Until recently, the use of Machine Learning and Artificial Intelligence has been discussed as a technology which may transform the security field in the future, but few examples of real world applications exist. Alert Logic will discuss how advancements in Machine Learning are helping human security operators:

    • Identify meaningful real-world incidents from vast amounts of security data
    • Identify security breaches previously unseen by modern Security Operation Centers
  • Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey
    Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey Wesley Childs at IDBS and Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic Recorded: Jun 1 2017 39 mins
    Join IDBS, a leading provider of advanced R&D data management software for this insightful webinar into the security and compliance challenges they faced on their cloud journey.

    Wesley Childs from IDBS will address the business driver’s behind developing their public-facing web applications in the cloud, provide insight on the challenges that needed to be addressed from a cultural, business and regulatory perspective and conclude with his top 5 lessons learns and pitfalls to avoid to maximise business value of moving applications to the cloud.
  • Protecting Web Applications in AWS
    Protecting Web Applications in AWS James Brown, VP, Technology Solutions Group at Alert Logic Recorded: Jun 1 2017 27 mins
    The growing use of public cloud services has created a gap in the defenses of most companies. Not because cloud platforms are insecure themselves, as was once feared, but because the clear majority of legacy on-premises security products do not work for cloud workloads - contrary to claims from legacy security vendors. AWS have the expertise and level of investment required to ensure their cloud infrastructure is hardened, giving traditional infrastructure attack methods fewer avenues for compromise. Now adversaries are setting their sights on the weakest link in the security chain: applications and workloads that run on cloud environments.

    Register for this impactful session as we walk through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • The Good, The Bad & The Ugly of Threat Detection
    The Good, The Bad & The Ugly of Threat Detection Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic Recorded: Jun 1 2017 20 mins
    The challenge all organisations face today is the accuracy of threat detection. In the “old days” we faced mostly worms and viruses and it was easier to create rules to detect and block these types of attacks from even entering your network. The threat landscape has evolved for far past those types of threats. A persistent attacker now approaches a target with a much more concerted effort to gain access to your environment and will use all forms of attack to succeed. Through advanced technologies, machine learning, and security expertise it is easier to cut through the noise of what is good (let it through), what is bad (block it), and what needs further investigation.

    Join Marc Willebeek-Lemair for an in-depth discussion on the essential ingredients needed to deliver a well-integrated security model that combines machine learning and human expertise, to harden your environment against modern cyber threats.
  • Better Detection: Keeping Pace With The Changing Threat Landscape
    Better Detection: Keeping Pace With The Changing Threat Landscape Misha Govshteyn, SVP of Product Management and Founder at Alert Logic Recorded: Jun 1 2017 22 mins
    The ever-changing cyber threat landscape requires better security practices to assess, detect and block threats to applications and other workloads. Many regulations, such as PCI, HIPAA and the upcoming European GDPR also require accurate and timely detection of threats and compromise. So how can you keep pace with a threat target that is constantly moving?

    In this session, Misha Govshteyn, SVP of Product Management and Founder at Alert Logic provides insight on the latest web application security threats, the role of threat intelligence, security technologies, machine learning and security experts.
  • Security Agility: Enabling Innovation
    Security Agility: Enabling Innovation Misha Govshteyn, SVP of Product Management and Founder at Alert Logic Recorded: Jun 1 2017 23 mins
    Security and innovation are not often mentioned in the same sentence, but with more and more business-critical applications being moved, or built in the cloud, it is essential that security becomes an agile enabler to cloud adoption. This is where the balance has shifted to integrating security controls into the DevOps lifecycle. Join this session as Misha Govshteyn, SVP of Product Management and Founder at Alert Logic will walk through how to integrate workloads security without slowing down innovation, including:

    -The role of DevOps in security agility
    -Different stages to cloud security maturity
    -The cultural needed for secure innovation

Embed in website or blog