Cloud Cybersecurity Beyond SaaS: How To Protect the Apps You Buy, Build and Sell

Presented by

Tsahy Shapsa VP of Business Development and Co-Founder, CloudLock; Russ Miller Product Marketing Director, CloudLock

About this talk

Cloud security is often equated with SaaS security. Seems a little narrow, doesn't it? There is much more to the picture. Whether you’ve got SaaS apps deployed, depend on IaaS solutions like AWS or Microsoft Azure, run on a PaaS platform such as Force.com, or have an IDaaS solution in place, finding common ground for your entire cloud ecosystem's security is tough. It’s where all these come together (and boy do they) that security becomes chaotic and fascinating. Watch this webinar to learn: – How to build an overarching security strategy for your SaaS, PaaS, IaaS, and IDaaS environments – Why not all Cloud Access Security Broker (CASB) solutions are created equal and how each should be evaluated – 5 concrete steps you can take today to avoid becoming the next breach headline

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13396)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more