The cloud and mobility have fundamentally changed the IT landscape. Both apps and users have left the network, however traditional security has struggled to keep pace. Developing a strong cloud security strategy is important to help restore visibility and reduce risk, but what is the best approach? While there are many opinions and perspectives, the best security strategy starts in the beginning with the proper architecture. Join this webcast to hear:
- 5 key architectural requirements your cloud security strategy can’t live without.
- What core building blocks you need to enable and secure your users and apps
- Learn how leading enterprises are transforming their security to cloud
Steve House is a seasoned Product Management leader with over 20 years of experience in the networking and security industries. During that time, he has worked for multiple market-leading organizations including Zscaler, Blue Coat Systems, Packeteer and CacheFlow where he has a consistent track record of helping them innovate and grow their market share.
At Zscaler, Steve leads the Product Management team responsible for driving product strategy and execution. Steve’s goal is to help the company through its next phase of growth becoming the standard Internet security platform delivered as a service to any user on any device in any location. Steve holds a Bachelor of Science in Electrical Engineering from Duke University.
For more questions about Zscaler, go to www.zscaler.com
Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk.
Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of SaaS Cloud Apps are driving the need for new compliance and security controls. The result? Security and IT teams are being forced to rethink network designs to better answer questions like:
- How do we effectively govern access to data, apps and systems?
- How can we combat advanced threats targeting our business through the web, cloud and e-mail?
- How should we secure information that is moving between our network, endpoints and the cloud?
Join Gerry as he discusses the key Cloud Generation security challenges facing Symantec’s enterprise customers and learn how Symantec’s Cloud-delivered security solutions can be used to protect users, devices and corporate data, wherever it resides.
Hear from Gartner’s cloud security research director Steve Riley.
New API-driven cloud and web services, along with mobile devices, have unlocked new and unsurpassed levels of productivity.
The reality, however, is that while the way people work has evolved, legacy security tools were designed for a different time — and new tools such as cloud access security brokers (CASBs) are quickly gaining the attention of security architects and CISOs worldwide.
Netskope is proud to sponsor this webcast where attendees will hear from Gartner’s cloud security research director Steve Riley.
Attendees will learn:
- how organizations are rethinking visibility, governance, data security, and threat protection
- how to build a new security stack as resilient and nimble as the new workforce they protect.
Cloud Security Research Director
Chief Executive Officer
Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable. With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.Read more >
VMware AirWatch and Netskope present:
Cloud Security for Dummies, Enterprise Mobility Edition
As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.
Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:
Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;
Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;
Proactively protect sensitive user and corporate information through policy; and
Halt threats in the cloud before they propagate to users’ devices.
Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)
It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.
This talk will explore this next frontier of CASB solutions.
Optiv will be sharing their insights on the market state of cloud security and how enterprises should bolster their security programs for the evolution of cloud. We will cover what we see in the field from the cloud security maturity state of most organizations to the IaaS/PaaS security trends that will impact your cloud deployment plans. At the end of this webinar, you will learn how you can accelerate cloud deployments securely so you gain a competitive edge in today’s market.Read more >
No matter what part of your infrastructure is in the cloud, security is crucial. Unfortunately, many unique and innovative cloud services have ignored or been indifferent to their customer’s security requirements. How can you select a cloud vendor that provides you with the services you need without compromising security? In this interactive webinar, Dave Meltzer, nCircle’s VP of Engineering and cloud security pioneer, will discuss:
•Why security is a challenge for cloud vendors
•Tools to assess the six basic security building blocks every cloud vendor should have in place
•Practical recommendations for working securely with cloud vendors
You’ll leave the webinar with an online questionnaire that will help you build a blueprint of prospective vendors’ security practices, and practical recommendations on how to accurately assess cloud vendor security risk.
There is plenty to consider when building your cloud strategy and for many organisations this journey has only just started. If you’re thinking of moving your IT workloads to a cloud environment, you should also consider security in the cloud. Public cloud providers have always operated under a shared-responsibility model, where the provider controls the foundational infrastructure and the customer controls everything above that. But during the past year, in particular, it has shifted to add services that root out security threats higher up the stack. Is this enough to cover the full breadth of things? Find out and join our webinar facilitated by Dan Pitman, Senior Solution Architect, who will dispense tangible insights and best security practices that will put any cloud security dilemma into perspective.
•Understanding your cloud provider’s security model and where you need to assume security responsibility
•Cloud providers introduce new security services and tools that provide more information, but why this isn’t enough?
•Best practice ideas for ensuring security in any cloud environment
This is part one of a three-part webinar series focussed on your security journey to the cloud. Stay tuned for part two coming soon.
An informal look at the important security trends identified by CSA experts and the activities initiated by Cloud Security Alliance to address key industry issues.Read more >
Organizations continue to move to the public cloud in large numbers, but they often do not understand the implications of the shared responsibility model. The question is: “who is responsible for security of the cloud versus security in the cloud”? This webcast will address this question, look at SLAs for mission-critical workflows to the cloud, as well as how to assure compliance and accelerate the on-boarding of critical applications.Read more >
How to protect your sensitive data across multiple clouds from internal and external threats, while complying with industry regulations?
Your company's cloud is not only limited to servers, but can extend to many business systems including Office 365, Box, and Salesforce. Learn what you are responsible for outside your vendors' coverage. Protect your most valuable and often regulated information, with data as the new currency of business, you must understand where the security vulnerabilities are.
Hear the expert panel discuss:
What you need to be aware of, especially with data passing between all your business systems
Best practices recommended by the Cloud Security Alliance (CSA)
How to better support compliance, and a demo of how to better control and encrypt your jewels
See why protecting your entire cloud data lifecycle requires covering data-at-rest, in-transit, and in-use. Watch now.
(ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² on August 20, 2015 at 1:00PM Eastern to learn more about the CCSP, the qualifications for it and the future of cloud security.Read more >
This session will examine how modern data science and machine learning technologies can be applied to cloud security to address scalability and protection from the increasingly complex threat landscape. Such techniques can be leveraged to continuously monitor cloud activity and identify threats related to compromised accounts or malicious activity. These techniques can also be used to dynamically identify new cloud apps and services, and improve accuracy of automated content inspection - ensuring that sensitive data is properly handled in the cloud. By leveraging these modern tools, enterprise organizations can improve their overall security posture while reducing the amount of time and effort required from their security professionals.Read more >
Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivaled only by that of the early days of the Internet era. With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.Read more >
Web and cloud application security exposures and email-based attacks continue to plague enterprises of all sizes, industries, and geographies. To tackle the threat, organisations have typically relied on multiple single purpose solutions to address each channel of risk. They’ve ended up with a proliferation of products, which complicates security and compliance, rather than simplifying it.
By unifying email, web, and cloud security with multi-factor authentication, CensorNet offers the freedom, visibility and protection that businesses need to navigate the threat landscape while unlocking the benefits of the cloud by enabling safe adoption of a wide range of apps.
Version 3.0 of Security for Cloud Computing: Ten Steps to Ensure Success has just been released for publication. As organizations consider a move to cloud computing, it is important to weigh the potential security benefits and risks involved and set realistic expectations with cloud service providers. The aim of this guide to help enterprise information technology (IT) and business decision makers analyze the security implications of cloud computing on their business.
In this webinar, authors of the paper will discuss:
• Security, privacy and data residency challenges relevant to cloud computing
• Considerations that organizations should weigh when migrating data, applications, and infrastructure to a cloud computing environment
• Threats, technology risks, and safeguards for cloud computing environments
• A cloud security assessment to help customers assess the security capabilities of cloud service providers
See how much Barraccuda can do!
As part of the shared security model, your organization needs to be able to secure the applications or networks you're running or building on Microsoft Azure. That’s where Barracuda can help. Barracuda Web Application Firewall is the first integrated, proven, and highly scalable security solution on Microsoft Azure.
Join this webcast to learn how to:
Help provide constant protection from evolving threats with Barracuda
Enable granular identity and access management
Get scalable application security
Cloud security remains one of the top barriers to the adoption of cloud computing (Gartner top 3) and drives a need for new and broader security measures that go beyond traditional enterprise IT security tools and practices.
Join security experts from IBM, SoftLayer and Intel® for a comprehensive webinar about the cutting-edge products and services that deliver unparalleled control and data security in the cloud. In this webinar, you will receive:
Practical and technical advice can be applied immediately to help secure your organization's IT environment using SoftLayer's security-rich environment for deploying and running customer workloads.
A full overview of the chip-level Intel®TXT security available first in the cloud at SoftLayer. Lastly learn more about IBM Cloud Data Encryption Services™ about Data protection, resiliency, security and storage.
Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.
Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist for a lively interactive session that will discuss:
•How to secure your company’s cloud expansion
•Which assets should be hosted in the cloud vs. on-prem
•What pace you should be moving at to reach your end goal
•How to maximize flexibility and performance for IT operations with cloud security
It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, advanced malware protection, and web and endpoint security.
This webinar will explore this next frontier of CASB Solutions.
Do you know who’s using your cloud?
Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?
Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.
On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:
•The state of today’s cloud security landscape
•How to detect unauthorised access or risky user activity
•How to protect your cloud from cyber threats
Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
As traditional cybersecurity perimeters dissolve, the HUMAN POINT – the intersection of users, data & networks, and where your data is BEST protected – is what remains.
Most of your employees have adopted the cloud. And while your BYOD policy has increased productivity and lowered operating costs, cloud-based apps like Office 365, Dropbox and Salesforce need protection to prevent account-centric threats, meet compliance requirements and protect critical data. How can companies maintain their productive pace while maintaining regulatory and security controls?
Join Shan Zhou, Sr. Director of CASB Sales Engineering at Forcepoint,, as he shares with you an overview and tool that help answer:
• What are the gaps in cloud app security and how does CASB address them?
• How do you understand the normal rhythm of users’ behavior?
• How do you respond to risks in real-time?
• Are there assessments currently in place that can help me identify individuals within my organization that pose the most risk, security incidents and overall risk?