Hi [[ session.user.profile.firstName ]]

Cloud Security and Compliance

  • Date
  • Rating
  • Views
  • FunkyPigeon.com - Hybrid Cloud: Agility and security, without the risk FunkyPigeon.com - Hybrid Cloud: Agility and security, without the risk Brett King, Head of Service Delivery - FunkyPigeon.com and Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Sep 15 2016 53 mins
    FunkyPigeon.com are WHSmith’s online personalised greeting card and gift company, with 3 million active customers relying on their website and mobile application to provide them with product choices for any occasion, at all hours of the day, and to process their payments safely and securely. The huge growth of their online business meant their IT approach and security stance needed to evolve with them. By using AWS as part of their hybrid environment FunkyPigeon.com are able to operate at scale; auto-scale during busy periods, and by implementing Alert Logic’s Security-as-a-Service they are able to stay secure whilst continuing to develop and grow their business with agility and peace of mind.

    Join this webinar with Brett King, Head of Service Delivery at FunkyPigeon.com and Oliver Pinson-Roxburgh, EMEA Director, Alert Logic, as they go through the security and compliance challenges Funkypigeon.com faced on their cloud journey and why they made the decision to outsource their security to Alert Logic.

    You will hear about the security responsibilities customers have in the cloud, and gain an insight into how Alert Logic partner with FunkyPigeon.com to provide managed security services to protect against web application attacks, network threats, system logs and vulnerabilities through a combination of technology, security content, threat intelligence and a 24x7 security operations centre.

    There will also be time for a live Q&A so get ready with your questions!
  • Video - Cyber Resiliency: Bouncing Back from a Security Breach Video - Cyber Resiliency: Bouncing Back from a Security Breach Misha Govshteyn, Founder & Chief Security Officer, Alert Logic Recorded: Aug 25 2016 31 mins
    Cyber resilience encompasses cyber security and business resilience, and aims not only to defend against potential attacks but also to ensure an organisation's survival following a successful attack. Companies cannot avoid cyber attacks 100-percent of the time, breaches will eventually occur but in order to bounce back quickly from attacks, companies must become cyber resilient.

    Misha Govshteyn, Founder & Chief Security Officer at Alert Logic delivered a talk at our London Cloud Security Summit - "Cyber Resiliency: Bouncing back from a security breach". In this session he examines cyber risk and the keys steps in building a cyber resilience strategy.
  • Video: Live Cyber Hack Demo Video: Live Cyber Hack Demo James Brown, VP of Global Solution Architecture and Richard Cassidy, UK Cyber Security Evangelist Recorded: Aug 25 2016 22 mins
    Watch a Live Cyber Hack Demo from Alert Logic's Cloud Security Summit as we show you the impact of implementing web applications that lack the correct security controls. We also demonstrate how web applications are attacked, the latest tricks attackers are using, and what you should focus on to keep data and systems secure. An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security, tailored towards the AWS Cloud.
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • Investis: Architecting Security into their AWS-hosted Digital Platform Investis: Architecting Security into their AWS-hosted Digital Platform Martyn Arbon, CTO, Investis and Oliver Pinson-Roxburgh, EMEA Director, Alert Logic Recorded: Jun 21 2016 48 mins
    Investis provides a fully-managed digital service platform for global businesses to host their corporate communications and investor relations infrastructures – with clients including 80% of the UK FTSE-350, and NYSE, and as such, availability, scalability, performance and security are all critically important to protecting their platform and customers’ digital assets. Especially as websites are the most common attack point for hackers.

    Join this webinar with Martyn Arbon, CTO, Investis and Oliver Pinson-Roxburgh, EMEA Director, Alert Logic, to understand the Investis journey of migrating from a hosted environment to a public cloud infrastructure hosted on Amazon Web Services, and the additional security considerations they needed to resolve as their traditional on-premises security technologies couldn’t work in the cloud.

    You will hear about the security responsibilities customers have in the cloud, and gain an insight into how Alert Logic partner with Investis to provide managed security services to protect against web application attacks, network threats, system logs and vulnerabilities through a combination of technology, security content, threat intelligence and a 24x7 security operations centre.

    There will also be time for a live Q&A so get ready with your questions!
  • What is the cyber security kill chain? What is the cyber security kill chain? Richard Cassidy, UK Cyber Security Evangelist Recorded: Jun 10 2016 2 mins
    Cyber threats continue to evolve and rapidly expand - both in terms of sophistication, complexity and the scale of their consequences. Find out why having a good understanding of the Cyber Kill Chain can help you take a preventative approach to cloud security.
  • Who is Responsible for Securing your Workloads in the Cloud? Who is Responsible for Securing your Workloads in the Cloud? James Brown, VP of Global Solution Architecture Recorded: May 31 2016 5 mins
    Whilst it is clear the responsibility for security and compliance posture for on-premises infrastructure is owned by the customer, there is still uncertainty on who is responsible for the security of applications and the confidentiality of data stored in the public cloud. The reality is that it is a shared responsibility, but who owns what, and where is the handshake between the organisations?

    Did you know that Amazon web Services employs a "Shared Responsibility" security model? Do you really know your role and responsibilities within this shared security model? Watch this short video to find out who's responsible for what when securing your applications in the cloud.
  • The Keys to a Secure Hybrid Cloud Environment The Keys to a Secure Hybrid Cloud Environment Paul Fletcher, Cyber Security Evangelist, Alert Logic Recorded: May 5 2016 59 mins
    Despite increasing cloud adoption in IT departments, many organizations are still concerned with data security. Those concerns are amplified by the loss of physical control over data and the potential for mismanagement of those assets when migrating to the cloud. As a result, this is often the top barrier to cloud deployment. However, with cloud innovations growing exponentially, the new wave of security solutions is breaking down those barriers.

    In this webinar, Alert Logic cyber security evangelist, Paul Fletcher, will provide you with insight on how to get over hybrid cloud security hurdles and discuss:

    • Common misconceptions surrounding hybrid cloud security
    • Key strategies to secure a hybrid cloud environment
    • Solutions to security threats within multiple hybrid cloud environments
  • Behind the Scenes: The Cybercrime Threat Landscape Behind the Scenes: The Cybercrime Threat Landscape Richard Cassidy, UK Cyber Security Evangelist Recorded: Apr 27 2016 61 mins
    Organizations continue to experience data breaches and the hacking community continues to fine-tune their methods of attack. The maturation of hacking groups around the globe pose a cyber security threat that never stops. This is why building a cyber security strategy that has data-driven threat intelligence at its core is so critical.

    Join Alert Logic's Cyber Security Evangelist, Richard Cassidy as he takes you into the evolving world of cybercrime and gives you an insider's look into the tactics utilized by attackers, review real examples and case studies of recent breaches. He will discuss security-in-depth strategies and review how technology, people and processes need to be in place to support and secure business infrastructure and set the foundation of your security strategy.

    Topics Covered:
    • Review of the ever-changing threat landscape, and how it affects your business
    • Insight into how the underground cyber-economy works
    • Key Considerations for your Cyber Security Strategy
    • Insight into Real-Life case studies

Embed in website or blog