Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Cloud Security Must Practices to  Protect Your Crown Jewels: “Data”
    Cloud Security Must Practices to Protect Your Crown Jewels: “Data”
    BRYAN COPELAND, Security Market Specialist @ Veristor. SUNDARAM LAKSHMANAN, CTO @ CipherCloud. Recorded: Dec 12 2017 58 mins
    How to protect your sensitive data across multiple clouds from internal and external threats, while complying with industry regulations?

    Your company's cloud is not only limited to servers, but can extend to many business systems including Office 365, Box, and Salesforce. Learn what you are responsible for outside your vendors' coverage. Protect your most valuable and often regulated information, with data as the new currency of business, you must understand where the security vulnerabilities are.

    Hear the expert panel discuss:

    What you need to be aware of, especially with data passing between all your business systems
    Best practices recommended by the Cloud Security Alliance (CSA)
    How to better support compliance, and a demo of how to better control and encrypt your jewels
    See why protecting your entire cloud data lifecycle requires covering data-at-rest, in-transit, and in-use. Watch now.
  • 3 Lessons from the Equifax Breach. What you can do to protect your business
    3 Lessons from the Equifax Breach. What you can do to protect your business
    Vamshi Sriperumbudur, Resha Chheda, Chris Zoladz, Fazal Sadikali Recorded: Sep 26 2017 64 mins
    Data breaches have become more frequent and riskier in the last couple of years, with the latest massive breach revealed by Equifax taking the crown. Equifax's security lapse is probably the largest theft involving personally identifiable information of U.S. consumers which includes social security numbers, birthdates, addresses, driver’s license - in short all the perfect ingredients for identity theft. Join this expert panel with interactive Q&A to discover:

    -What went wrong with Equifax data security practices and lessons -learned
    -How this breach can impact you and your business
    -What you can do today to minimize your data exposure and protect against cyber attacks
    -How to protect your data and secure your organization
    -Expert recommendations on improving breach protection, detection and response

    -Chris Zoladz, Founder Navigate LLC
    -Fazal Sadikali, Global Security Lead, Cloud First Practice Accenture
    -Vamshi Sriperumbudur, Vice President CipherCloud
    -Resha Chheda, Independent Cloud Security Consultant
  • Equifax Hack and Improving Data Protection
    Equifax Hack and Improving Data Protection
    Satya Gupta (Virsec Systems), Shawn Burke (SungardAS), Vamshi Sriperumbudur (CipherCloud), William Leichter (Virsec) Recorded: Sep 21 2017 61 mins
    In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.

    What are the lessons of this breach to individuals, as well as organizations?

    Join this interactive panel discussion with security experts to learn:
    - The short and long-term effects of this data breach
    - What you can do to protect yourself and your organization
    - How to protect against future scams
    - Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
    - How to improve cyber security going into 2018

    - Satya Gupta, CTO, Virsec Systems
    - Shawn Burke, Global Chief Security Officer, Sungard Availability Services
    - Vamshi Sriperumbudur, VP Marketing, CipherCloud

    - William Leichter, VP Marketing, Virsec Systems
  • Should You Encrypt Data Before it Goes to the Cloud?
    Should You Encrypt Data Before it Goes to the Cloud?
    Fazal Sadikali Global Security Lead, Cloud First Practice Accenture, Willy Leichter VP, Cloud Security CipherCloud Recorded: May 23 2017 60 mins
    We all use cloud applications and are adjusting to having sensitive business data outside of our direct visibility and control. But cloud providers are not immune to security issues, and having to trust outsiders with sensitive data often conflicts with legal compliance mandates.

    Join security and enterprise integration experts from Accenture and CipherCloud for an interactive discussion of how businesses are balancing cloud adoption with security and regulatory compliance.

    Topics include:

    - New regulatory drivers such as the New York cybersecurity law, and the upcoming GDPR
    - Real-world threats that target cloud applications and data
    - Critical differences between cloud provider “native” security and external encryption
    - Case studies in regulated industries including financial services and healthcare

Embed in website or blog