Hi [[ session.user.profile.firstName ]]

Six Best Practices for Boosting Cloud Security Confidence

According to a recent report by IDC, worldwide spending on public cloud services and infrastructure is forecasted to reach $160 billion in 2018, an increase of 23.2% over 2017. Migrating your applications and IT assets to the cloud can help you reduce costs, become more agile, and deliver products as well as services to your customers faster. However, the hijacking of Tesla’s cloud-based DevOps platform for crypto-mining raids is just one example of many that illustrates why it is essential for establishing a security foundation in the cloud that is comparable to your on-premises environments to cover the ever-expanding attack surface.

Join this webinar to learn about:

• The current state of cloud security;
• Key threats security teams should expect in cloud environments;
• The six best practices for boosting your cloud security confidence in a world of Zero Trust; and
• How Zero Trust Privilege Services can ultimately help your company adopt a cloud first strategy.
Recorded Oct 24 2018 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Torsten George, product evangelist, Centrify
Presentation preview: Six Best Practices for Boosting Cloud Security Confidence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Minimizing Exposure to Ransomware Attacks with Zero Trust Privilege Recorded: Jul 25 2019 52 mins
    Dr. Torsten George, Cyber Security Evangelist
    Ransomware attacks are dominating the headlines so far in 2019.

    Watch to learn:

    - What is ransomware?
    - How do ransomware attacks work?
    - Ransomware trends and recent examples
    - Five steps to minimize your exposure to ransomware attacks

    And by popular demand, we’ll cover how Zero Trust Privilege can not only minimize the impact of ransomware attack but also address the #1 cause of today’s data breaches – privileged access abuse.
  • How to Establish Secure DevOps Practices with Zero Trust Privilege Recorded: Jun 20 2019 59 mins
    Andras Cser-Forrester, David McNeely-Centrify
    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development.

    However, as companies adopt these new technologies, tools, and methodologies, security can sometimes be an afterthought that inevitably comes back to bite you when you try to move your app into production costing you weeks or months of delays and rework. Enter DevSecOps where security is “built-in” to your pipeline. It’s like taking the “fast lane” through security into production.

    Securing access as well as implementing least privilege are two of those security controls that can be integrated into your pipeline.

    Guest speaker Forrester VP and Principal Analyst Andras Cser and David McNeely, Chief Strategy Officer at Centrify share how to create a fast-lane through security and into production for app developers.

    Watch to learn:

    - How standards, regulations, and risk have all evolved
    - How to build security into DevOps processes without sacrificing agility
    - What DevOps organizations should be doing to empower a Zero Trust approach to Privileged Identity Management
  • Anatomy of a Hack: The Anatomy of a Hack: Perception vs. Reality Recorded: Jun 7 2019 56 mins
    Dr. Torsten George, Cyber Security Evangelist
    The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.

    Watch Anatomy of a Hack: Perception vs. Reality webinar to learn about the 3 major phases of the “cyber-attack lifecycle” or “kill chain” and most importantly measures for preventing data exfiltration, including: Enforcing MFA; Using host-based auditing and monitoring; and Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity.
  • Debunked: 5 Myths About Zero Trust Security Recorded: Feb 12 2019 61 mins
    Torsten George, Senior Director of Product Marketing and Tony Goulding, Senior Director of Technical Marketing, Centrify
    In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organizations still don’t know where to start or are slow to adopt a Zero Trust approach.

    The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise.

    Unless organizations adopt Zero Trust Security. In 2019, take some time to assess your company’s risk factors and learn how to implement Zero Trust Security in your organization.

    Getting started is easy. Watch on-demand to hear from Tony Goulding, Director of Technical Marketing and Torsten George, Senior Director, Product Marketing as they:

    •Review 4 essential pillars of Zero Trust
    •Debunk 5 major myths about Zero Trust Security
    •Share best practices to ensure a successful implementation
  • Six Best Practices for Boosting Cloud Security Confidence Recorded: Oct 24 2018 33 mins
    Torsten George, product evangelist, Centrify
    According to a recent report by IDC, worldwide spending on public cloud services and infrastructure is forecasted to reach $160 billion in 2018, an increase of 23.2% over 2017. Migrating your applications and IT assets to the cloud can help you reduce costs, become more agile, and deliver products as well as services to your customers faster. However, the hijacking of Tesla’s cloud-based DevOps platform for crypto-mining raids is just one example of many that illustrates why it is essential for establishing a security foundation in the cloud that is comparable to your on-premises environments to cover the ever-expanding attack surface.

    Join this webinar to learn about:

    • The current state of cloud security;
    • Key threats security teams should expect in cloud environments;
    • The six best practices for boosting your cloud security confidence in a world of Zero Trust; and
    • How Zero Trust Privilege Services can ultimately help your company adopt a cloud first strategy.
  • A Secure Path to AWS Cloud: Simplifying Your Cloud Journey with Next-Gen Access Recorded: Jun 5 2018 50 mins
    Felderi Santiago VP Enterprise Solutions Centrify, Scott Ward Solutions Architect, AWS, Peter Mudd Managing Director, Caxton
    Amazon Web Services (AWS) is quickly becoming one of the most popular options for enterprises who want to extend their data center infrastructure to the cloud, providing best practices to help ensure security as they move to the cloud. Centrify is an Advanced Partner in AWS’ Partner Network Ecosystem, delivering a comprehensive solution that implements and extends AWS best practices by securing access, controlling privilege and auditing activity across hybrid environments.

    Watch this webinar featuring AWS and Centrify as they discuss how Caxton Associates LP is using the Centrify Identity Platform to increase security in their AWS environment.

    We will cover:
    •Federated SSO to the AWS Web console and AWS CLI
    •Mapping Active Directory Groups to IAM roles to enforce least privilege access
    •Automated provisioning for IAM users
    •Adaptive MFA for AWS, including the web console, CLI and workspaces
    •Secure access to Amazon EC2 instances
  • Zero Trust Security: Reduce Breaches, Complexity, and Cost Recorded: Apr 25 2018 36 mins
    Torsten George, Product Evangelist at Centrify
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. According to the Ponemon Institute, to recover from these incidents, organizations spent on average $3.6 million per breach. It’s also worth remembering the potential for reputational damage that can create a downswing in an organization’s fortunes. For example, Yahoo!’s data breach proved very costly, wiping out $350 million off Verizon’s acquisition payment.

    Thus, it has become critical for organizations to find ways to reduce the risk of falling victim to a breach, as well as reduce complexity and cost in securing applications, devices, and infrastructure ― both on-premise and in the cloud.

    Join this webinar to learn:

    • How to assess the full impact of data breaches, ranging from direct costs, reputation damage, and customer loss to declines in revenue.
    • How misperceptions linked to the root cause of hacking-related breaches skew IT security spending and how to align your security investments to achieve higher effectiveness.
    • How the Zero Trust Security model can help shield your organization and its reputation from devastating and long-term financial consequences of a breach.
  • Zero Trust Security: Your Talk Track for the Boardroom Recorded: Apr 24 2018 48 mins
    Andy Smith, VP of Product Marketing, Centrify
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. With the scares of WannaCry and Petya, your board is asking, “what the hell are we doing to protect ourselves?” You need answers. The problem, highlighted in a recent WSJ study, showed that 62% of CEOs incorrectly cite malware as the primary threat to cybersecurity, whereas CIOs, CISOs, CTOs realize that 68% of breaches would have been prevented by identity security, vs. only 8% for anti-malware. In fact, the 2017 Verizon Breach Investigations Report found that 81% of breaches were due to lost, stolen or default passwords.

    Your board wants to know what you’re doing about ransomware, but rather than randomly chasing the latest newsworthy incident. present a strategic Zero Trust Security plan that addresses the real issue and defines a practical and proven direction that not only protects against breaches, but also enables your business the freedom to transform and grow in spite of the growing threatscape.

    Join this webinar to learn:
    • What is the real threat that must be addressed to protect you from breaches.
    • What is Zero Trust Security and how does it address the modern threatscape?
    • Who else is talking about Zero Trust Security and what have they been able to achieve?
    • How to talk to your board about a consistent and strategic approach rather than reactive and defensive.
  • 5 Cyber Attack Trends from the Threatscape Recorded: Mar 21 2018 55 mins
    Corey Williams, Senior Director of Products and Marketing
    2017 was full of sensational breach headlines—a year full of high-profile news about companies impacted by all sorts of malware and ransomware.

    It’s not surprising, then, that CEOs are reacting to these reports. CEOs overwhelmingly cite malware as the most important cybersecurity risk threatening their organization’s success.

    But technical officers on the front lines (CIOs, CTOs and CISOs) see it differently: They point to identity breaches—including privileged user identity attacks and default, stolen or weak passwords—as the biggest threat.

    Join us for a live webinar that examines recent trends and research on cyber attacks. You will learn about:

    - Recent malware attacks including wannacry, petya, notpetya and badrabbit
    - Current research asking CEOs about cybersecurity strategy and spending
    - The most common cause of breaches that you may be overlooking — compromised credentials
    - A surefire way to secure access without boundaries through the power of Zero Trust Security
  • Simplify and Accelerate your GDPR Compliance Efforts Recorded: Feb 20 2018 30 mins
    Tim Hill, Director of Product Management and Strategy
    As we’re all aware, GDPR will be enforced starting May 25th, 2018 and organizations should understand which aspects of its preparations will be in place before the deadline.

    Much like other technological shifts of the last decade —GDPR will change the way our organization handles personal data. GDPR will require organizations to implement specific, defined controls over the handling of collected personal data, with the primary objective of streamlining data security regulations and bolstering data protection in the face of a fast-evolving technology landscape.

    Join this webinar with guest speaker Tim Hill, Director of Product Management and Strategy from Centrify, as he discusses best practices around frameworks and architectures needed to ensure better business process and data management.

    Tim will also cover how organizations with a strong IAM strategy in place are more likely to provide better notification and more openness if and when data has been compromised.

    Register for this webinar and learn:

    - Key elements to consider as the deadline for GDPR approaches
    - How a strong IAM strategy enables organizations to quickly identify whose data they are responsible for and where its stored.
    - How Centrify’s Zero Trust approach to IAM can help you prepare for GDPR’s underlying policy goals.
Centrify
Centrify

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Six Best Practices for Boosting Cloud Security Confidence
  • Live at: Oct 24 2018 4:00 pm
  • Presented by: Torsten George, product evangelist, Centrify
  • From:
Your email has been sent.
or close