InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Cloud adoption has changed gears; your security needs to do the same

Presented by

Miguel Carrero, Siemplify, WireX | Himanshu Raval, CISCO

About this talk

We all know that consumer and businesses are dramatically increasing the consumption of cloud based Information Technologies; either infrastructure, applications, services or even cybersecurity. The move to a cloud-based IT is unstoppable, with another wave of changes coming as 5G becomes more of an actual reality. While we have a new slew of acronyms and technologies coming our way (XDR, NDR, SaSe, etc) many companies struggle to address cloud from a cybersecurity perspective. In this webinar we will address key elements to be taken into consideration: - Full understanding on what cloud consumed IT means end to end, specially in the world of hybrid cloud - Provide security for the cloud consumed infrastructure, applications and services - Keeping a security posture that included traditional and cloud consumed IT. Key priorities and where to start - Providing security from the cloud itself - What is the role of the big cloud providers (aka AWS, Microsoft and Google) as they doubled down their efforts in cybersecurity - Looking ahead. How will (true) 5G impact cloud cybersecurity as the underlying telecommunications industry undergoes a major shift Miguel Carrero, Cybersecurity Executive and Board Member, Siemplify, WireX Himanshu Raval, Director, Strategy and Growth of Cloud Security,CISCO.
Information Security

Information Security

259771 subscribers736 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics