Hear from Gartner’s cloud security research director Steve Riley.
New API-driven cloud and web services, along with mobile devices, have unlocked new and unsurpassed levels of productivity.
The reality, however, is that while the way people work has evolved, legacy security tools were designed for a different time — and new tools such as cloud access security brokers (CASBs) are quickly gaining the attention of security architects and CISOs worldwide.
Netskope is proud to sponsor this webcast where attendees will hear from Gartner’s cloud security research director Steve Riley.
Attendees will learn:
- how organizations are rethinking visibility, governance, data security, and threat protection
- how to build a new security stack as resilient and nimble as the new workforce they protect.
Cloud Security Research Director
Chief Executive Officer
VMware AirWatch and Netskope present:
Cloud Security for Dummies, Enterprise Mobility Edition
As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.
Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:
Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;
Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;
Proactively protect sensitive user and corporate information through policy; and
Halt threats in the cloud before they propagate to users’ devices.
No matter what part of your infrastructure is in the cloud, security is crucial. Unfortunately, many unique and innovative cloud services have ignored or been indifferent to their customer’s security requirements. How can you select a cloud vendor that provides you with the services you need without compromising security? In this interactive webinar, Dave Meltzer, nCircle’s VP of Engineering and cloud security pioneer, will discuss:
•Why security is a challenge for cloud vendors
•Tools to assess the six basic security building blocks every cloud vendor should have in place
•Practical recommendations for working securely with cloud vendors
You’ll leave the webinar with an online questionnaire that will help you build a blueprint of prospective vendors’ security practices, and practical recommendations on how to accurately assess cloud vendor security risk.
An informal look at the important security trends identified by CSA experts and the activities initiated by Cloud Security Alliance to address key industry issues.Read more >
Web and cloud application security exposures and email-based attacks continue to plague enterprises of all sizes, industries, and geographies. To tackle the threat, organisations have typically relied on multiple single purpose solutions to address each channel of risk. They’ve ended up with a proliferation of products, which complicates security and compliance, rather than simplifying it.
By unifying email, web, and cloud security with multi-factor authentication, CensorNet offers the freedom, visibility and protection that businesses need to navigate the threat landscape while unlocking the benefits of the cloud by enabling safe adoption of a wide range of apps.
(ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² on August 20, 2015 at 1:00PM Eastern to learn more about the CCSP, the qualifications for it and the future of cloud security.Read more >
See how much Barraccuda can do!
As part of the shared security model, your organization needs to be able to secure the applications or networks you're running or building on Microsoft Azure. That’s where Barracuda can help. Barracuda Web Application Firewall is the first integrated, proven, and highly scalable security solution on Microsoft Azure.
Join this webcast to learn how to:
Help provide constant protection from evolving threats with Barracuda
Enable granular identity and access management
Get scalable application security
Cloud security remains one of the top barriers to the adoption of cloud computing (Gartner top 3) and drives a need for new and broader security measures that go beyond traditional enterprise IT security tools and practices.
Join security experts from IBM, SoftLayer and Intel® for a comprehensive webinar about the cutting-edge products and services that deliver unparalleled control and data security in the cloud. In this webinar, you will receive:
Practical and technical advice can be applied immediately to help secure your organization's IT environment using SoftLayer's security-rich environment for deploying and running customer workloads.
A full overview of the chip-level Intel®TXT security available first in the cloud at SoftLayer. Lastly learn more about IBM Cloud Data Encryption Services™ about Data protection, resiliency, security and storage.
This session will examine how modern data science and machine learning technologies can be applied to cloud security to address scalability and protection from the increasingly complex threat landscape. Such techniques can be leveraged to continuously monitor cloud activity and identify threats related to compromised accounts or malicious activity. These techniques can also be used to dynamically identify new cloud apps and services, and improve accuracy of automated content inspection - ensuring that sensitive data is properly handled in the cloud. By leveraging these modern tools, enterprise organizations can improve their overall security posture while reducing the amount of time and effort required from their security professionals.Read more >
Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.
Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist for a lively interactive session that will discuss:
•How to secure your company’s cloud expansion
•Which assets should be hosted in the cloud vs. on-prem
•What pace you should be moving at to reach your end goal
•How to maximize flexibility and performance for IT operations with cloud security
ITSPmagazine chats with Jim Reavis, Co-Founder and CEO, Cloud Security Alliance. Here are some of the highlights from the conversation:
- The Cloud Security Alliance is a not-for-profit organization where research is the foundation of what they do and is free for everyone to access.
- CSA's CCSK certification was recently named by Certification Magazine as being the most valuable IT certification.
- Jim has coined the phrase "Self-Driving Info Security" meaning making pieces of the information security process autonomous while enabling people to do more with less.
- Diversity is critical to understanding different constituencies; it helps the CSA learn from so many different people based on their past experiences.
- CSA encourages their chapters to do personal outreach and get in front of kids to help raise awareness and make an impact.
Subject matter experts from the CSCC will present an overview of the security standards, frameworks, and certifications that exist for cloud computing. We’ll also discuss privacy considerations in light of new regulations (e.g., EU’s General Data Protection Regulation (GDPR)). This presentation will help cloud customers understand and distinguish between the different types of security standards that exist and assess the security standards support of their cloud service providers.Read more >
Security is an important part of the cloud, and being aware of trends in cloud security is always valuable. Join HOSTING and partner Alert Logic for a review of Alert Logic's 2014 Cloud Security Report and a discussion about security in the cloud.Read more >
Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.
Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?
In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:
• Govern access to data, apps, and systems that may reside in the cloud
• Secure information no matter where it sits or goes
• Protect against advanced threats in this new environment
• Minimise risk and ensure compliance as workloads move to the cloud
Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.
We all use cloud applications and are adjusting to having sensitive business data outside of our direct visibility and control. But cloud providers are not immune to security issues, and having to trust outsiders with sensitive data often conflicts with legal compliance mandates.
Join security and enterprise integration experts from Accenture and CipherCloud for an interactive discussion of how businesses are balancing cloud adoption with security and regulatory compliance.
- New regulatory drivers such as the New York cybersecurity law, and the upcoming GDPR
- Real-world threats that target cloud applications and data
- Critical differences between cloud provider “native” security and external encryption
- Case studies in regulated industries including financial services and healthcare
The 2015 Alert Logic Cloud Security Report (CSR) has been released! This year’s CSR provides new insights that can prove valuable to organizations who are in the process of building out their security framework. Join Johan Hybinette, HOSTING CISO, and Stephen Coty, Chief Security Evangelist at Alert Logic, for a discussion on the latest industry research findings, trends and best practices on protecting your organization’s IT infrastructure. We’ll discuss these three trends and their impact on the industry:
•Cloud adoption remains strong as cloud attacks grow.
•Industries and customers drive threat profile.
•Examining the kill chain construct drives understanding
As organizations look to offload more and more applications to the public cloud, security posture needs to remain a chief concern for the IT teams protecting these workloads. The “Shared Responsibility Model” employed by hosting services like AWS® and Azure® dictates that while the host is responsible for the security OF the cloud, customers are responsible for the security of their data IN the cloud. Palo Alto Networks® helps customers achieve this security through a platform designed to safely enable widely distributed enterprise workloads.
In this webinar, we will discuss:
- The security issues to consider when developing a cloud strategy.
- How to use the Palo Alto Networks platform to achieve security policy parity across your on-premise, private and public cloud environments.
- Governing SaaS application usage and protecting your data within sanctioned applications.
This webinar introduces the CSCC’s deliverable, Cloud Security Standards: What to Expect and What to Negotiate, which was updated in August to highlight the latest developments in cloud security standards. The speakers will provide an overview of the standards, frameworks, and certifications that exist for securing cloud computing environments. This information should help cloud customers evaluate the security support of cloud service providers.Read more >