InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Reach it, Don't Breach It!

Presented by

Leena Bongale, Manager- Data Analytics & Governance | TD Bank

About this talk

It is no secret your data in the cloud is vulnerable. What's worse is that, according to Gartner, more than 99% of cloud breaches will have a root cause of preventable misconfiguration or mistakes by end users through 2025. But the silver lining -- more like silver word -- to your cloud is that these breaches can be preventable so you can reach to your data in cloud when you need it. Tune in to this presentation from TD Bank's Leena Bongale if you looking for ways to secure your cloud data by: • Securing access with zero trust principles • Protecting data in an era of hybrid work • Transforming your data protection for the cloud • Reducing human error with security posture management Speaker Bio: Leena Bongale is a recognized industry expert with over 18 years of experience in Information Technology and specializes in Information Security and Risk Management. She is currently Manager of Data Protection at TD Bank. Leena is an accomplished speaker, trainer, also volunteers information security consulting on pro bono basis, and has achieved industry certifications including CRISC and SAP BI. Leena regularly speaks on topics including cybersecurity, cloud adoption, business continuity, and compliance.
Information Security

Information Security

259138 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics