Google Apps for Business: Security & Compliance Gaps the Enterprise Must Fill

Presented by

Rich Campagna, VP Products, Bitglass

About this talk

Google Apps for Business has made huge inroads into the enterprise over the past couple of years, with an estimated 16% of organizations using the platform as of early 2014. Amidst this move towards outsourcing their productivity applications to Google, many enterprises believe that they have outsourced data protection to Google as well. The idea that you can simply shift responsibility for your company’s data security to Google, however, couldn’t be further from the truth. You can achieve Google Apps data security... but only by recognizing that cloud app security is a shared responsibility - Google will cover some of your security & compliance needs, but you’re on the hook to cover the others. In this webinar, Rich Campagna, VP Products at Bitglass, will help you understand where Google’s security responsibility ends, and where yours begins, highlighting key gaps to keep in mind as you make the move to Google Apps for Business, and how to solve them.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. This BrightTALK channel is an extension of the group and the ISCN website (, featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more