Hi [[ session.user.profile.firstName ]]

Top Considerations When Auditing Cloud Computing Systems

Cloud computing represents a drastic departure from legacy IT in virtually every respect. The new technology architecture, the nature of how cloud is provisioned, and the shared responsibility model means that IT audit must be significantly altered to provide assurance to stakeholders that their cloud adoption is secure.

If you are CISO, security and compliance manager, internal auditor or external auditor, and you want to skillfully address the specific concerns that arise from the use of cloud services, this is a webinar you wouldn’t want to miss.

Jacques Nack, CEO of JNN Group, and John Gukian, CISSP and Senior Security Engineer at a leading tech company, are two cybersecurity experts who contributed to the development of the CCAK, a new cloud auditing credential from the Cloud Security Alliance. During this virtual conversation, Nack and Guckian will share their perspectives on audit cloud IT environments and how earning the new credential -- CCAK -- can help cloud auditing professionals be more effective in their work.

Topics covered include:
- The key differences between auditing a cloud environment vs. a legacy IT environment
- The unique risks and requirements of compliance in the cloud
- Roles and responsibilities you need to have within your company to address cloud security
- Data security and data privacy compliance issues you need to be prepared for when expanding outside the U.S.
- How earning the CCAK can help cloud security professionals become more effective
Recorded Nov 19 2020 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jacques Nack, CEO | JNN Group & John Gukian, CISSP and Senior Security Engineer | IBM
Presentation preview: Top Considerations When Auditing Cloud Computing Systems

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Getting Ready to Meet CMMC Requirements Dec 10 2020 6:00 pm UTC 60 mins
    Matthew Monroe, Operations Manager & CISSP | Omnistruct & Joshua Bobbitt, CEO | FortifiedLogic
    The Cybersecurity Maturity Model Certification (CMMC), based on NIST 800-171 and other global standards, is the new unified cybersecurity standard the DOD will use moving forward to verify that all of its contractors have the appropriate level of cybersecurity practice and processes in place to protect controlled unclassified information (CUI) and federal contract information (FCI) on their networks.

    Companies that contract with the DoD will start to see CMMC requirements as part of RFIs as early as the end of 2020. Covered entities will need to pass a third-party assessment and receive certification prior to contract award. Further, the CMMC is expected to create ripple effects across industries and be adopted by other governmental agencies and private sector organizations.

    Join this conversation featuring Josh Bobbit, Founder, and CEO of Fortified Logic, and Matt Monroe, Operations Manager at Omnistruct, on how the CMMC may impact your industry and organization, your internal cybersecurity processes, and third-party due diligence processes. Understand key steps your organization can take in the immediate term to become CMMC ready and demonstrate your compliance posture.
  • Top Considerations When Auditing Cloud Computing Systems Recorded: Nov 19 2020 62 mins
    Jacques Nack, CEO | JNN Group & John Gukian, CISSP and Senior Security Engineer | IBM
    Cloud computing represents a drastic departure from legacy IT in virtually every respect. The new technology architecture, the nature of how cloud is provisioned, and the shared responsibility model means that IT audit must be significantly altered to provide assurance to stakeholders that their cloud adoption is secure.

    If you are CISO, security and compliance manager, internal auditor or external auditor, and you want to skillfully address the specific concerns that arise from the use of cloud services, this is a webinar you wouldn’t want to miss.

    Jacques Nack, CEO of JNN Group, and John Gukian, CISSP and Senior Security Engineer at a leading tech company, are two cybersecurity experts who contributed to the development of the CCAK, a new cloud auditing credential from the Cloud Security Alliance. During this virtual conversation, Nack and Guckian will share their perspectives on audit cloud IT environments and how earning the new credential -- CCAK -- can help cloud auditing professionals be more effective in their work.

    Topics covered include:
    - The key differences between auditing a cloud environment vs. a legacy IT environment
    - The unique risks and requirements of compliance in the cloud
    - Roles and responsibilities you need to have within your company to address cloud security
    - Data security and data privacy compliance issues you need to be prepared for when expanding outside the U.S.
    - How earning the CCAK can help cloud security professionals become more effective
  • How to Use a Risk Management Framework to Elevate Your Cybersecurity Program Recorded: Oct 28 2020 63 mins
    M. James Gomez, CISO | CyberSec Consulting & Jingcong Zhao, Director of Content Marketing | Hyperproof
    According to Forrester, enterprises are predicted to spend $12.6 billion on cloud security tools by 2023, up from $5.6B in 2018. Yet, companies continue to experience sizable data breaches, with over 2000 confirmed cases of data breaches in 2019. As data breaches have become common, B2B buyers have become highly attuned to vendor risk. As such, security certs like SOC 2 and ISO 27001 reports have become common procurement gates.

    Without a risk management framework or strategic tools in place, organizations will struggle to maintain their desired risk profile and struggle to identify weaknesses in their control environment even as they devote more resources to cybersecurity and compliance. By aligning your security and compliance program to a risk management framework, your organization can ensure that risks to assets are properly identified, assessed, monitored and remediated. You can also improve the utilization of cybersecurity tools and lower the cost of compliance.
Hyperproof
Hyperproof

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top Considerations When Auditing Cloud Computing Systems
  • Live at: Nov 19 2020 7:00 pm
  • Presented by: Jacques Nack, CEO | JNN Group & John Gukian, CISSP and Senior Security Engineer | IBM
  • From:
Your email has been sent.
or close