Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Security Automation: Principles, Opportunities, Risks, and Examples Mike Mellor, Senior Director of Information Security, Adobe One of the fundamental principles of any security program is a focus on reducing the “timeline to compromise” for security issues. Not only are attack... 3 years ago | 39 mins Maturing Your Cloud Security Mike Rothman, President, Securosis In this session, Mike will go through the Cloud Security Maturity Model, developed in partnership between Securosis and IANS, to provide perspective o... 3 years ago | 43 mins Software Defined Perimeter, Microsegmentation & Zero Trust Juanita Koilpillai, Founder and CEO, Waverly Labs Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices ... 3 years ago | 34 mins The Blind Spot in Object Storage Ed Casmer,CTO, Cloud Storage Security Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage m... 3 years ago | 43 mins SECtember Experience Wrap-Up: Guiding your Race to the Cloud Jim Reavis, CEO, Cloud Security Alliance In this session, Jim will take a look back at the critical topics covered throughout this month-long SECtember Experience and highlight key takeaways ... 3 years ago | 56 mins Building a World-Class Security Program James Christiansen, Vice President of Cloud Security Transformation, Netskope There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of ... 3 years ago | 50 mins Talking to the Board About the New Realities of IT Security Jeff Costlow, Deputy CISO, Extrahop With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities... 3 years ago | 46 mins How to Prepare for an Audit Against the CSA STAR Standard Walt Williams, CISO, Monotype & John DiMaria, CSA The CSA STAR allows for both an attestation under a SOC 2 audit or certification under ISO 27001. While most organizations self attest to the CSA Star... 3 years ago | 51 mins Vendor Risk Assessment: Secrets for Procuring Secure Cloud Services Jerry Cochran, Nick Sorenson, Gary Gooden, Walton Stephens, Steve Quane In this panel, our experts will share lessons learned and best practices for securing cloud services. From proactive risk assessments within the procu... 3 years ago | 61 mins Securing the Work-From-Cloud Lifecycle Jerry Archer, CISO, Sallie Mae In recent months, the COVID pandemic has forced employers to move to a work-from-home model much faster than expected. Many critical business employee... 3 years ago | 43 mins