Hi [[ session.user.profile.firstName ]]

Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data

As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

In this webinar, we'll explore:
• Critical gaps in cloud applications that must be filled
• Four sets of capabilities required for cybersecurity in the cloud
• How CASBs provide specialized security that goes beyond native cloud app functionality like that of Office 365
• Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

Join Bitglass and (ISC)² on Apr 17, 2019 (Wed) at 11:00 (GMT +8) to learn how a CASB can help you meet your security and compliance requirements.

Presenter: Richard Campagna, CMO & VP of Products, Bitglass
Presenter: Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
Recorded Apr 17 2019 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
Presentation preview: Beyond Shadow IT:  How Leading Organisations Protect Sensitive Cloud Data

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Bitglass & AWS: Advance Your IaaS Security with CASB Jun 17 2020 5:00 pm UTC 60 mins
    Ben Rice & Lee Fox
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, they have are redefining enterprise data security.
  • (APAC) Comparing CASB Technologies: What's the Difference? Jun 9 2020 1:00 am UTC 60 mins
    Jacob Serpa
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.

    Yet not all CASBs are created equal, and it can be a challenge to identify which solution to deploy. From capabilities to the security of underlying architectures, there is much to consider.
  • (EMEA) Comparing CASB Technologies: What's the Difference? Jun 4 2020 9:00 am UTC 60 mins
    Raif Mehmet & Steve Butts
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.

    Yet not all CASBs are created equal, and it can be a challenge to identify which solution to deploy. From capabilities to the security of underlying architectures, there is much to consider.
  • Comparing CASB Technologies: What's the Difference? Jun 3 2020 5:00 pm UTC 60 mins
    Jacob Serpa
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA) Jun 2 2020 9:00 am UTC 33 mins
    Samantha Nguyen
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these development projects to fruition at market. However, the use of such cloud tools means that new security solutions and strategies are needed in order to keep data safe.

    As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

    In this webinar, you will learn:
    - The ins and outs of securing Confluence, Jira, and Salesforce with Bitglass
    - What steps can be taken to allow only proper access to these applications
    - How to ensure that data at rest in the cloud is secure
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC) Jun 2 2020 1:30 am UTC 60 mins
    Samantha Nguyen
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these development projects to fruition at market. However, the use of such cloud tools means that new security solutions and strategies are needed in order to keep data safe.

    As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

    In this webinar, you will learn:
    - The ins and outs of securing Confluence, Jira, and Salesforce with Bitglass
    - What steps can be taken to allow only proper access to these applications
    - How to ensure that data at rest in the cloud is secure
  • How to secure remote workers and data at access (EMEA) Recorded: May 14 2020 33 mins
    Raif Mehmet & Steve Butts
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data outside of traditional boundaries.

    Join this webinar to learn how to:
    - Enable the short term surge in remote workers while preparing for a future “normal”
    - How to secure your data, applications, and web interactions from advanced threats
    - Secure BYOD devices while enabling productivity
    - Identify new access patterns and differentiate between malicious and benign behaviors
  • Remote Worker Alert! Who Moved My VPN and Why Should I Care? Recorded: May 14 2020 54 mins
    Wayne Phillips / Jonathan Andresen
    Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote workers without retooling all of IT?

    Modern IT allows users to work from anywhere, on any device, on any cloud app and across any network with full control and visibility into all data – no matter where it resides.

    Join this exclusive web event to learn how innovative IT organizations are:

    1) Supporting remote workers at scale while future-proofing their IT in the age of cloud;
    2) Securing all users working from any device, on any app across any network;
    3) Improving workforce productivity by embracing high-speed home and mobile internet; and
    4) Taking the cost out of IT by fast tracking digital and cloud transformation.
  • How to secure remote workers and data at access Recorded: May 13 2020 38 mins
    Kevin Sheu
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data outside of traditional boundaries.

    Join this webinar to learn how to:
    - Enable the short term surge in remote workers while preparing for a future “normal”
    - How to secure your data, applications, and web interactions from advanced threats
    - Secure BYOD devices while enabling productivity
    - Identify new access patterns and differentiate between malicious and benign behaviors
  • A Cloud Security Checkup: CASBs in Healthcare Recorded: May 6 2020 34 mins
    Juan Lugo, Product Marketing Manager, Bitglass
    Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breaches in healthcare and uncovered the state of security for such organizations in 2019. Naturally, a variety of security concerns were uncovered. Fortunately, cloud access security brokers (CASBs) are well equipped to ensure security and compliance for healthcare firms in the cloud.

    In this webinar, you will learn:

    - The state of security in healthcare, from cost per breached record to the leading causes of breaches.

    - How organizations can pursue HIPAA compliance in the cloud.

    - How Bitglass’ CASB can help your organization protect data wherever it goes.
  • Cloud and SASE - Continued Disruption (APAC) Recorded: May 5 2020 32 mins
    Nat Kausik and Mike Schuricht
    SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remote work, and cloud-based tools are the norm, organizations must think differently about security. Anytime, anywhere data access must be secured through context-aware solutions that enforce policies based on users’ identities, devices, requested services, and more. Fortunately, SASE offerings are intelligent, multi-faceted security platforms that can apply granular security measures across an organization’s entire IT ecosystem. Naturally, this means that these platforms must be built for and in the cloud.
  • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture Recorded: Apr 8 2020 39 mins
    Nat Kausik & Mike Schuricht
    In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish and prone to repeated outages.

    In this webinar you will learn:
    - The importance of securing cloud data with tools like CASBs
    - Where standard cloud security architectures fall short
    - How the Polyscale Architecture is perfectly attuned to modern organizations’ security needs
  • Cloud Security Essentials – Bitglass and Zscaler Recorded: Mar 25 2020 51 mins
    Ben Rice (Bitglass) and Rahim Ibrahim (Zscaler)
    Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security technology stack.

    Now security teams have to protect devices, identities, applications, and data wherever they go.

    Join this webinar to learn:
    - SASE (Secure Access Service Edge)--what is it and why are SWG (Secure Web Gateway) and CASB(Cloud Access Security Broker) the place to start.
    - How your organization can secure the complex mix of personal and corporate devices in use today.
    - How to verify users' identities and secure access to enterprise IT resources.
    - How to secure a variety of cloud applications that employees use to perform their work duties.
    - How to protect data wherever it goes.
  • Securing the Exploding Cloud Footprint Recorded: Feb 12 2020 40 mins
    Juan Lugo, Product Marketing Manager, Bitglass
    With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs catch the traffic of users, identifying what needs attention in such comprehensive logs can be paralyzing for IT personnel. Shadow IT discovery enables organizations to narrow down the search to apps that should be more closely monitored ,controlled and in many cases – blocked. So what are some of the criteria to consider when choosing a cloud access security broker? Tune in to learn more.
  • SASE: Security for the Cloud & from the Cloud Recorded: Dec 11 2019 50 mins
    Mike Schuricht, VP of Product at Bitglass
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:

    What exactly is a SASE?
    How are CASB and SWG evolving?
    Real-world use cases for organizations securing SASE
  • The Scoop on SASE: Converging Your Cloud Security Footprint Recorded: Dec 4 2019 51 mins
    Mike Schuricht, VP of Product at Bitglass
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:

    What exactly is a SASE?
    How are CASB and SWG evolving?
    Real-world use cases for organizations securing SASE
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage Recorded: Oct 16 2019 42 mins
    Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at Bitglass
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?

    Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.

    What you will learn?

    •Data protection challenges to be mindful of
    •Managing digital transformation and unstructured data proliferation
    •How Bitglass and Spirion's solutions work together to protect your data
  • Ensuring a Safe IT Ecosystem through Integrated Cloud Security Recorded: Sep 12 2019 37 mins
    Ben Rice, VP of Business Development at Bitglass
    With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a hard job – data is no longer confined behind the corporate perimeter and the on-premises security technology stack.

    Join our webinar on September 12th at 10 AM PST to learn:

    - Which technologies matter and how they work with each other to protect your data and infrastructure
    - How to evaluate vendors and compose a cloud security ecosystem that will meet your needs
    - Why cloud access security brokers (CASBs) are an essential consideration for cloud data protection
  • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security Recorded: Aug 29 2019 60 mins
    Jacob Serpa, Sr. Product Marketing Manager, Bitglass; Brandon Dunlap (Moderator)
    Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that organizations take responsibility for an increased amount of security in the cloud. Fortunately, there are tools designed to help with doing this properly. Join Bitglass and (ISC)² on August 29, 2019 at 1:00PM Eastern for a presentation on the various components of leading IaaS platform, what your organization is responsible for when it comes IaaS security and how Cloud Access Security Brokers (CASB) can help.
  • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security Recorded: Aug 1 2019 59 mins
    Jacob Serpa, Sr. Product Manager, Bitglass; Brandon Dunlap (Moderator)
    The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August 1, 2019 at 1:00PM Eastern for an engaging webinar where we’ll look at the significance of SaaS apps and how to prioritize their security, how to protect data within managed applications and detect and secure the use of unmanaged applications.
Bitglass: Next-Gen CASB
Bitglass, the Next-Gen CASB company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data
  • Live at: Apr 17 2019 3:00 am
  • Presented by: Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
  • From:
Your email has been sent.
or close