Hi [[ session.user.profile.firstName ]]

Make it Work: PCI in the Cloud

Caught in the crossroads of ensuring PCI DSS compliance and leveraging cloud services to transform your transactional business? Learn from Branden Williams, co-author of ‘PCI Compliance: Understand and Implement PCI Data Security Standards’ on how to make it work! Just as seasoned security professionals struggle to keep up with the changes in technology, QSAs and ISAs are often presented with nuances in cloud environments that don’t fit into their conventional experience. Learn how to provide rich security assurance and accountability reporting for cloud environments integrating PCI DSS into cloud business as usual.
Recorded Jun 26 2014 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Branden Williams & Kim Singletary, Product Marketing
Presentation preview: Make it Work: PCI in the Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Avoiding the Headlines: 5 Critical Security Practices to Implement Now Recorded: Mar 5 2015 47 mins
    Adrian Sanabria, Sr. Security Analyst, 451 Research; Amrit Williams, CTO, CloudPassage
    2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • Applying the Top 20 Critical Security Controls to the Cloud Recorded: Dec 10 2014 47 mins
    Bart Westerink, CloudPassage, Director of Security and Compliance
    The 20 Critical Security Controls for Effective Cyber Defense (the Controls) is a list of best practices guidelines for IT security, developed and maintained by hundreds of security experts from across the public and private sectors. The list gives practical, actionable recommendations for cyber security, but do you best apply these guides to the new reality of cloud-based or virtualized infrastructures?

    Attend this webcast to learn:
    - Which Controls are particularly vital to cloud security
    - Real-life examples of how the Controls can be implemented
    - Tips for measuring your organization’s security practice against the Controls
  • Make it Work: PCI in the Cloud Recorded: Jun 26 2014 49 mins
    Branden Williams & Kim Singletary, Product Marketing
    Caught in the crossroads of ensuring PCI DSS compliance and leveraging cloud services to transform your transactional business? Learn from Branden Williams, co-author of ‘PCI Compliance: Understand and Implement PCI Data Security Standards’ on how to make it work! Just as seasoned security professionals struggle to keep up with the changes in technology, QSAs and ISAs are often presented with nuances in cloud environments that don’t fit into their conventional experience. Learn how to provide rich security assurance and accountability reporting for cloud environments integrating PCI DSS into cloud business as usual.
  • 5 Vital Signs for Healthy Cloud Security Recorded: May 13 2014 48 mins
    Richard Stiennon, Chief Research Analyst, IT-Harvest
    As business continues to leverage cloud infrastructure services learn what key vital signs security professionals should use to determine the overall security wellness of cloud workloads. Hear about the trends that may change the mindset of what is good security hygiene when forced to support multi-cloud environments.
  • Security Visibility in the Cloud - Logging and Monitoring in AWS Recorded: May 1 2014 63 mins
    Joey Peloquin, Dir. of Professional Services, GuidePoint Security; Nick Piagentini, Sr. Solutions Architect, CloudPassage
    Come join the conversation on the pros and cons of commercial and open source options available in AWS, best practices for managing logs and monitoring incidents in the Cloud, and guidance on what to log from two security leaders in the field.

    Learn about:

    · Making security visibility easier based on best practices
    · Yes, host-based firewall policies can improve security
    · See how a reference implementation can be done without tears
CloudPassage
CloudPassage

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Make it Work: PCI in the Cloud
  • Live at: Jun 26 2014 5:30 pm
  • Presented by: Branden Williams & Kim Singletary, Product Marketing
  • From:
Your email has been sent.
or close