Hi [[ session.user.profile.firstName ]]
Sort by:
    • Risky Business: Key Cloud Security Metrics your Board Needs to See Risky Business: Key Cloud Security Metrics your Board Needs to See Srini Gurrapu, Skyhigh Networks Upcoming: May 10 2016 5:00 pm UTC 60 mins
    • A recent study by Ponemon showed that the likelihood of an enterprise data breach of involving more than 10,000 records is approximately 22%. This risk, with an average associated cost of $3.79 million, has catapulted cloud security into an executive and board level.

      What key metrics should you track and share with your board? How should you structure your cloud security strategy to best protect your organization?

      Join Skyhigh Networks and CSA for a discussion of best practices that leading enterprises have embraced for managing and communicating cloud risk with the board.

      In this session, you’ll learn how to: 

      • Develop a comprehensive cloud security and governance framework 
      • Map your organization’s maturity based on current practices
      • Identify key business outcomes across the 4 pillars of cloud security 
      • Implement best practices for presenting cloud security metrics to the board

      Registrants will also receive a “Cloud Security and Governance Report for Executives and the Board” template to jump start the discussion. We look forward to seeing you at the webinar!

      Read more >
    • Safely Enabling the Cloud in a World of Malware and Data Breaches Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 5:00 pm UTC 61 mins
    • Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

      - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
      - How to securely enable the use of cloud services for enterprise employees;
      - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.

      Read more >
    • Live Webinar - Leveraging The Cloud For DR - Is it Worth It? Live Webinar - Leveraging The Cloud For DR - Is it Worth It? George Crump, Founder and Lead Analyst, Storage Switzerland Recorded: Nov 11 2015 5:00 pm UTC 50 mins
    • As Disaster Recovery pressures mount businesses of all sizes are looking to the cloud to solve their recovery challenges, but can the cloud be counted on when the business needs it most? Join George Crump, Lead Analyst with Storage Switzerland in this interactive webinar as he covers the different types of cloud backup solutions available, the types of disaster recovery solutions and provides an economic model to help businesses determine if the cloud is worth it. As always, we will leave plenty of time at the end of the webinar for Questions and Answers.

      All attendees will receive an exclusive copy of George’s latest white paper “Cloud DR Economics - Can You Cost Justify it?”. This paper is not available anywhere else; you must register to get your copy.

      Read more >
    • Four Storage Strategies To Help You Think Differently About Hybrid Cloud Four Storage Strategies To Help You Think Differently About Hybrid Cloud Rob Whiteley, VP of Marketing, Hedvig Recorded: Nov 10 2015 6:00 pm UTC 46 mins
    • Your world will be hybrid for the foreseeable future. You will combine a mix of on-premises private cloud and public cloud infrastructure to meet ever-changing business demands. But how do you build a storage architecture designed to support this hybrid world?

      This session will provide insight on how software-defined storage facilitates hybrid cloud architectures. We’ll present four scenarios and case studies where companies are thinking differently about “cloud storage.”

      Specifically, you’ll learn how you can use software-defined storage to:
      1. Build an OpenStack “landing pad” to onboard applications born in public clouds like AWS.
      2. Create hybrid AWS-based applications with on-premises infrastructure that migrates older, colder data to the public cloud.
      3. Treat public clouds as “DR sites” where applications are automatically protected across data centers and clouds.
      4. Store data on private, hosted infrastructure that bursts to the public cloud for compute.

      Read more >
    • Cloud DLP: Revealing Shadow IT and Shadow Data Cloud DLP: Revealing Shadow IT and Shadow Data Jim Reavis, CEO, Cloud Security Alliance Recorded: Sep 29 2015 4:00 pm UTC 52 mins
    • In this cloud DLP webcast, “Cloud Security Alliance and Elastica: Revealing Shadow Data”, Jim Reavis, CEO of CSA, and Elastica delve deeply into the Elastica Q2 2015 Shadow Data Report and share insights into how organizations can unlock the full business potential of cloud apps and the sensitive corporate data stored in them, while staying secure and compliant.

      In addition, Ben Munroe from Cisco shares his insights into how Cisco is addressing the cloud data loss prevention problem.

      Looking beyond Shadow IT, this webcast examines:

      • What types of sensitive data are typically found in cloud sharing apps (PHI, PCE, and PII)
      • Which vertical industries have the riskiest exposures (Hint: its healthcare) and what steps can be taken to mitigate the these risks.
      • Why managing Shadow Data is the next critical step in protecting cloud apps beyond just controlling Shadow IT.
      • How to build an effective cloud app security architecture that provides visibility, control, and remediation.

      Read more >