Hi [[ session.user.profile.firstName ]]
Sort by:
    • Malware Attack "Fan-out" Effect in the Cloud Malware Attack "Fan-out" Effect in the Cloud Krishna Narayanaswamy, Founder and Chief Scientist, Netskope Recorded: Jun 21 2016 5:00 pm UTC 60 mins
    • The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

      - The multiplier effect that that the cloud can have on the probability of a data breach
      - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
      - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
      - A forensic walk-through in the reconstruction of a complex audit following a data breach
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud

      Read more >
    • Risky Business: Key Cloud Security Metrics your Board Needs to See Risky Business: Key Cloud Security Metrics your Board Needs to See Srini Gurrapu, Skyhigh Networks Recorded: May 10 2016 5:00 pm UTC 55 mins
    • A recent study by Ponemon showed that the likelihood of an enterprise data breach of involving more than 10,000 records is approximately 22%. This risk, with an average associated cost of $3.79 million, has catapulted cloud security into an executive and board level.

      What key metrics should you track and share with your board? How should you structure your cloud security strategy to best protect your organization?

      Join Skyhigh Networks and CSA for a discussion of best practices that leading enterprises have embraced for managing and communicating cloud risk with the board.

      In this session, you’ll learn how to: 

      • Develop a comprehensive cloud security and governance framework 
      • Map your organization’s maturity based on current practices
      • Identify key business outcomes across the 4 pillars of cloud security 
      • Implement best practices for presenting cloud security metrics to the board

      Registrants will also receive a “Cloud Security and Governance Report for Executives and the Board” template to jump start the discussion. We look forward to seeing you at the webinar!

      Read more >
    • Safely Enabling the Cloud in a World of Malware and Data Breaches Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 5:00 pm UTC 61 mins
    • Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

      - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
      - How to securely enable the use of cloud services for enterprise employees;
      - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.

      Read more >
    • Live Webinar - Leveraging The Cloud For DR - Is it Worth It? Live Webinar - Leveraging The Cloud For DR - Is it Worth It? George Crump, Founder and Lead Analyst, Storage Switzerland Recorded: Nov 11 2015 5:00 pm UTC 50 mins
    • As Disaster Recovery pressures mount businesses of all sizes are looking to the cloud to solve their recovery challenges, but can the cloud be counted on when the business needs it most? Join George Crump, Lead Analyst with Storage Switzerland in this interactive webinar as he covers the different types of cloud backup solutions available, the types of disaster recovery solutions and provides an economic model to help businesses determine if the cloud is worth it. As always, we will leave plenty of time at the end of the webinar for Questions and Answers.

      All attendees will receive an exclusive copy of George’s latest white paper “Cloud DR Economics - Can You Cost Justify it?”. This paper is not available anywhere else; you must register to get your copy.

      Read more >
    • Four Storage Strategies To Help You Think Differently About Hybrid Cloud Four Storage Strategies To Help You Think Differently About Hybrid Cloud Rob Whiteley, VP of Marketing, Hedvig Recorded: Nov 10 2015 6:00 pm UTC 46 mins
    • Your world will be hybrid for the foreseeable future. You will combine a mix of on-premises private cloud and public cloud infrastructure to meet ever-changing business demands. But how do you build a storage architecture designed to support this hybrid world?

      This session will provide insight on how software-defined storage facilitates hybrid cloud architectures. We’ll present four scenarios and case studies where companies are thinking differently about “cloud storage.”

      Specifically, you’ll learn how you can use software-defined storage to:
      1. Build an OpenStack “landing pad” to onboard applications born in public clouds like AWS.
      2. Create hybrid AWS-based applications with on-premises infrastructure that migrates older, colder data to the public cloud.
      3. Treat public clouds as “DR sites” where applications are automatically protected across data centers and clouds.
      4. Store data on private, hosted infrastructure that bursts to the public cloud for compute.

      Read more >