Zero-Trust Cloud Workload Protection Cloud Security Summit

Logo
Presented by

Virsec

About this talk

As attacks on software supply chains, and critical applications continue, we need to extend the zero-trust model into cloud workloads during runtime, ensuring that only the right code and processes can execute, regardless of the threat environment. Join security experts from Virsec as they discuss the challenges of protecting an expanding attack surface area with cloud, hybrid, and container environments, and the need for application-awareness, and effective runtime protection. Get best practices for security implementations for workloads that ensure vulnerability protection with granular application control, system integrity assurance, and advanced memory protection at runtime. Willy Leichter, VP of Marketing and Product Strategy Willy Leichter leads Virsec marketing and product strategy. With extensive experience in a range of IT domains including network security, global data privacy laws, data loss prevention, access control, email security and cloud applications, he is a frequent speaker at industry events and author on IT security and compliance issues. A graduate of Stanford University, he has held marketing leadership positions in the US and Europe, at CipherCloud, Axway, Websense, Tumbleweed Communications, and Secure Computing (now McAfee). Shauntinez Jakab, Senior Director of Product Marketing Shauntinéz has spent over 20 years working with executives to create unique high-growth product and business strategies in cybersecurity, network management, parallel systems, enterprise software and cloud-based services. She has held senior positions at F5 Networks, Intuit, Aryaka Networks and Citrix Systems. Shauntinez holds a BS in Electrical Engineering from Grambling State University, with graduate studies in microelectronics.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (72)
Subscribers (4378)
Virsec is the industry leader of application-aware server workload protection. Learn how to improve and optimize your security posture, ensure real-time protection from today's most dangerous cyber threats and attacks, including memory corruption, fileless and zero-day attacks. Hear valuable insights from cybersecurity leaders, experts and influencers, vulnerability analysis and more.