Hi [[ session.user.profile.firstName ]]

Cloud Security and Compliance

  • Date
  • Rating
  • Views
  • Case Study and Best Practices for Protecting Customer Data
    Case Study and Best Practices for Protecting Customer Data Daniel O'Neill, Director of Global Security, Rackspace Recorded: Jul 16 2018 24 mins
    People HR® helps companies manage their employees, which means handling high volumes of personal information – just the type of data criminals wants. They required support to protect critical customer data and reach an exceptional standard on compliance and security; a need emphasized with the introduction of the General Data Protection Regulation (GDPR).

    Given the sensitive nature of the data, People HR required effective security controls to be put in place to ensure adherence to regulatory requirements. Implementing new technologies can be costly and filling the cyber security skills gap has become increasingly difficult in today’s evolving threat landscape. The set and forget, controls-based strategy of the past will no longer adequately protect organisations against more sophisticated cyberattacks.

    In this session, Rackspace will discuss how the provision of proactive monitoring, intrusion detection and incident response in addition to data encryption enabled People HR to protect customer data and create clear policies around the data governance and protection regulation with an approach that is both platform agnostic and cloud-centric.
  • Visibility: The Key to Better Threat Detection
    Visibility: The Key to Better Threat Detection Matt Selheimer, Chief Marketing and Strategy Officer, Alert Logic Recorded: Jul 16 2018 30 mins
    Networks, services, applications and data are under virtually constant siege from both automated and targeted attacks. Once compromises and data breaches are discovered, companies often learn that attackers have been camped out for months – conducting reconnaissance and spreading across the network to find the most valuable resources or data. Therefore, it is important for organisations to have effective threat detection and incident response systems in place to identify and address threats.

    Many organisations are also starting to realise that simply replying on blocking tools is not the right approach, it is the lack of visibility in most cases, that leads organisations missing the obvious signs of a cyber attack.

    Effective threat detection is continuously monitoring your cyber assets for advanced threats, alerting you to validated exploits, and rapidly investigating and responding to confirmed incidents.
  • Top Business Security Risks and How You Can Fight Back
    Top Business Security Risks and How You Can Fight Back Graham Cluley, Independent Computer Security Expert Recorded: Jul 16 2018 30 mins
    According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyberattack.

    Hear from Graham Cluley as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets and what they are looking for.

    You will learn about:
    - The ever-changing threat landscape, and how it affects your business
    - Key Considerations for your Cyber Security Strategy
    - Insight into real-life case studies
  • The Quickest Way to Get Hacked in the Cloud
    The Quickest Way to Get Hacked in the Cloud Dan Pitman, Senior Solutions Architect - Alert Logic Recorded: Jun 13 2018 48 mins
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility - and it’s a big one, so how do you design a full scale?

    Public cloud providers have recently added services that root out security threats higher up the stack, but is your business prepared to systematically act on the alerts these services provide? How can you cover the full breadth of things?

    Join James Brown, Global VP of Technology Solutions, as he shares insights from Alert Logic’s 2017 Cloud Security Report, based upon findings from verified security incidents from thousands of companies around world.

    Highlights include:
    • How security incidents differ on hybrid networks versus public-cloud installations
    • What the top 6 web attack types are that account for 75% of verified incidents
    • Machine learning’s impact on detecting incidents and understanding attack progression
    • Important steps to preventing targeted attacks and protecting your data
    • The importance of security in light of the upcoming GDPR regulation

    This impactful webinar will help you to understand how today’s vulnerabilities are being exploited and key strategies you can adopt to increase security, manage risk and be compliant.
  • Is a SIEM Solution Right for Your Business?
    Is a SIEM Solution Right for Your Business? Guy Duchatelet, Alert Logic, Tony Bradley, Alert Logic Recorded: May 22 2018 60 mins
    SIEM solutions can be a powerful tool to help improve an organization’s security, effectively detect cyber security threats, and provide valuable insights. However, while SIEM technology is a proven, traditional approach, they are most useful for organizations with a well-staffed security team. So what about small- to mid-sized organizations? Is a SIEM solution right for you?

    Hear from Alert Logic’s threat experts on why a SIEM alone may not be the best solution for your business. In this webinar, we explore:

    • The actual costs of integrating SIEM security
    • Analytics and additional tuning required to get meaningful results from a traditional SIEM
    • Alternatives to SIEM purpose-built to deliver security results for the SMB space

    For many organizations, a Managed Detection and Response (MDR) service is a simpler, modern alternative to SIEM, delivered as a service to help organizations save time, money and frustration. Gain accurate, actionable threat insight and remediation advice, aligned with today’s threat environment, delivered predictably as a service.
  • How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
    How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic Patrick McDowell, AWS, Mike Santimaw, Rent-A-Center, Ryan Holland, Alert Logic Recorded: Apr 24 2018 56 mins
    Organizations looking to move their workloads to the cloud are finding that the security tools they’ve traditionally used do not place enough emphasis on protecting web applications, create performance choke points, and overburden IT staff with manual processes. Alert Logic’s security-as-a-service offerings allow you to overcome these challenges with continuous discovery, configuration assessment, managed detection and response, and vulnerability management, so you can stay secure and compliant on AWS.

    In this webinar, Alert Logic will talk about how you can protect your AWS workloads with their suite of security offerings in a matter of days instead of months, without having to hire additional staff. You’ll also learn how Rent-A-Center uses Alert Logic to comply with SOX and PCI, increase efficiency of security operations, and maintain a strong security posture on AWS.

    Watch this engaging webinar and learn:

    • What decision makers need to consider when addressing their security and compliance responsibilities on AWS
    • How security-as-a-service solutions can accelerate organizations’ migrations to AWS
    • How to address compliance mandates on AWS without compromising your security posture or budget
  • GDPR Emergency Kit: Improve Your Cybersecurity Posture
    GDPR Emergency Kit: Improve Your Cybersecurity Posture Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Apr 19 2018 49 mins
    The General Data Protection Regulation (GDPR), will come into force on 25th May 2018 and requires organisations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organisation will need to start planning now to achieve compliance and mitigate the risk of fines for failing to comply.

    Achieving and maintaining compliance with the GDPR will require detailed planning and collaboration with your employees and virtually all the businesses in your chain. It will also depend on the adoption of a pragmatic, solutions-based approach to data breach detection. Feels a bit overwhelming at this late stage, right? In this webinar we will share some proactive steps you can take to help you reduce cyber risks and stress, whilst working to address any and all gaps in your security posture.

    Join Oliver Pinson-Roxburgh, EMEA Technical Director of Sales Engineering and Solutions Architecture at Alert Logic, to hear security best practices to help reduce cyber risk, as well as to identify ways to bolster what you have done so far to address the upcoming GDPR. Highlights include:
    - GDPR and what security controls can help to reduce the risks of a data breach
    - How to assess your level of readiness and build your plan around potential concerns or gaps
    - GDPR emergency kit: Best practices for approaching cybersecurity with the view to support the GDPR

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • Journey to Realisation: The Security Challenge in a Hybrid Environment
    Journey to Realisation: The Security Challenge in a Hybrid Environment Oliver Pinson-Roxburgh, EMEA Director of Sales Engineering and Solutions Architecture Recorded: Mar 22 2018 61 mins
    According to Forbes, hybrid cloud adoption grew 3x in the last year, increasing from 19% to 57% of organisations surveyed. This rapid growth of hybrid cloud also brings a challenge – how do you retrospectively ensure the security of on-premises infrastructure whilst focusing on cloud security? What attack intelligence do you need? Facilitated by Oliver Pinson- Roxburgh, EMEA Director of Sales Engineering and Solutions Architecture, this webinar will answer some of the practical questions companies face when exploring the next step on their journey to cloud and guide on how to optimise your security scale.

    Highlights include:
    • Today’s hybrid cloud reality
    • Understand the ever-evolving threat landscape
    • Security challenges in hybrid cloud infrastructures
    • Security by design as default

    This is part two of a three-part webinar series focused on your security journey to the cloud. Stay tuned for Part 3 coming soon.
  • Managed Threat Detection and Response for Securing AWS Applications
    Managed Threat Detection and Response for Securing AWS Applications Ryan Holland, Senior Director, Technology Services Group, Alert Logic Recorded: Mar 21 2018 45 mins
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic, as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now for this engaging webinar and gain key security takeaways, including:

    • Guidelines to security risk modeling: understanding your AWS environment and the exposures your web apps face
    • Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    • The use of multiple data sources to attain a “defense in depth” security strategy
    • Threat detection capabilities and creating an effective incident response plan
  • Next-Generation Cloud Security for AWS Workloads
    Next-Generation Cloud Security for AWS Workloads Patrick McDowell, Amazon Web Services, and Ryan Holland, Alert Logic Recorded: Mar 13 2018 40 mins
    Knowing the where, why, and how to respond quickly to cyber threats is the foundation of protecting your AWS workloads. But due to rapid deployment and constant changes in the cloud, it’s easier said than done. Fortunately, we’re turning cloud security findings into prioritized, actionable insight.

    Join Ryan Holland, Senior Director, Technology Services Group at Alert Logic, and Patrick McDowell, Global Technical Lead, Security Partners at AWS, for an overview of two new integrated security solutions: Amazon GuardDuty™ and Alert Logic Cloud Insight™ Essentials. This live replay webcast covers:

    • Quickly attaining complete visibility of your cloud environment
    • Identifying unexpected and malicious activity through Amazon GuardDuty
    • Transforming security findings into action with Cloud Insight Essentials
    • Preventing future compromises with prioritized AWS cloud configuration best practices

Embed in website or blog