Data Protection in the Cloud – Whose Problem Is It Really?

Manage webcast
Richard Moulds, Vice President Product Management and Strategy, Thales e-Security
Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the day may never come. That’s a shame because it’s in just these areas where the strongest economic incentives for moving to the cloud lie. The question is, who is best placed to establish the appropriate security in order to make this particular mountain easier to climb? Should cloud users plan on a “Bring Your Own Security” approach where they assume that the cloud is essentially an untrusted environment where they must wrap their own security around their applications and data, or should cloud providers be responsible for providing appropriate protection as part of a trusted cloud platform where users can feel safe and do what they do best – build applications? This presentation will address the tradeoffs as well as provide practical guidance regarding data protection approaches in a cloud environment.
May 23 2012
46 mins
Data Protection in the Cloud – Whose Problem Is It Really?
Join us for this summit:
  • Channel
  • Channel profile
  • Cross-Site Scripting Crash Course Aug 18 2015 5:00 pm UTC 45 mins
    Kimberly Chung, Training Supervisor, WhiteHat Security
    With attackers gaining traction, we will take a deeper dive into how to defend against cross-site scripting (XSS) attacks. You will learn what the attack looks like and how to defend against them.

    In the webinar, it will cover:

    -HTML tricks for cross-site scripting
    -JavaScript tricks for cross-site scripting
    -Defensive tactics against cross-site scripting
  • Keeping Microsoft Secure Aug 18 2015 5:00 pm UTC 15 mins
    Bret Arsenault, VP and CISO, Microsoft
    Learn how Microsoft puts all the pieces together internally to keep its organization safe. Bret Arsenault, Microsoft Chief Information Security Officer, gives you a complete rundown, from products to policies, and explains how they are implemented to ensure security at Microsoft.
  • Building on the Secure Cloud Aug 13 2015 5:00 pm UTC 15 mins
    Patrick Wirtz, Innovation Manager, The Walsh Group
    Hear how Patrick Wirtz, Innovation Manager at The Walsh Group, has leveraged a secure Cloud environment to streamline IT processes, shift focus to key business priorities, and grow his business.
  • Black Hat Recap – Implications for the Enterprise Aug 12 2015 5:00 pm UTC 60 mins
    Cameron Camp, Security Researcher
    Join Security Researcher, Cameron Camp, as he reviews the latest in cyber security covered at this year's Black Hat Conference.
  • Security Transformation: The Current Evolution and How to Manage It Aug 12 2015 4:00 pm UTC 45 mins
    Justin Somaini, CTO, BOX
    The need for a Security Transformation in the enterprise has been clear to our industry for quite some time and the struggle to protect our data in today’s business environment has been a main focus. At the same time, in an increasingly mobile-centric workforce, organizations are dealing with the shift from analog to digital and require more compliance and policy to protect against breaches, lack of transparency and accountability. To keep up with these changing demands, IT decision makers and their organizations must be more agile, manageable and responsive to a different set of challenges that arise. Join this session to hear Justin Somaini, Chief Trust Officer at Box, detail what security transformation will look like in the coming year and how it will redefine the responsibilities of vendors, cloud providers, and security practitioners to resolve one of the most significant security problems of the past 40 years.
  • Why Security Starts with Identity in Today’s Mobile Enterprise Aug 12 2015 3:00 pm UTC 45 mins
    Richard Walters, GM and VP, IAM & Alex Smith, Director, IAM Products, both Intermedia
    With users expecting 24x7 access to web applications and data from all types of mobile devices and from any location, it’s not a surprise that data security is still a key focus for most enterprises. How do you reduce risk by bringing contextual information into the authentication process?

    Join us and learn how to:

    •Address the authentication and authorization management challenges in today’s mobile enterprise

    •Limit access to applications to approved or trusted devices

    •Automate changing of passwords to ensure they are complex and unique across all accounts

    Register now!
  • DNS Firewall: Securing Networks In a Rapidly Changing Landscape Aug 12 2015 2:00 pm UTC 45 mins
    Michael Kaczmarek Sr. Director, Product Management, Verisign
    Cyber threats are at an all-time high, presenting numerous challenges to organizations and end users. Additionally, with the increasing importance of mobile devices and Bring Your Own Device (BYOD) initiatives, endpoint management and security is becoming more critical. In light of these trends, proactively protecting against threats is a constant and ever-changing battle. Verisign DNS Firewall is a cloud-based network security and threat intelligence service built upon our global recursive DNS platform that offers robust protection from unwanted content and malware as well as customizable filtering down to the individual DNS level. Verisign DNS Firewall provides organizations with the opportunity to secure the rapidly growing landscape of devices on their networks with a single, simple modification – an update of the recursive DNS settings.
  • Going Mobile? The Shifting Native SSO Landscape Aug 12 2015 1:00 pm UTC 45 mins
    Paul Madsen, Principal Technical Architect, Ping Identity
    Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.
  • Top 10 Android Application Vulnerabilities Aug 12 2015 9:00 am UTC 45 mins
    Erez Metula, Founder & CEO of AppSec Labs
    Android apps handle our most sensitive data – private conversations, financial information, phone calls, SMS, geographic locations. You name it… the question is – can we really tell whether they’re secure? Who can assure us they are not spying on us? Can they be abused? Erez will answer those questions, focusing on Android mobile apps and their common vulnerabilities.

    This session will be all about the security of such applications, how they can be hacked, the common mistakes developers do, and how to avoid such mistakes.
  • Twelve Recommendations for Your Security Program in 2015 Aug 11 2015 7:00 pm UTC 45 mins
    Rick Holland - Principal Analyst, Forrester Research and David Dufour - Sr. Director of Security Architecture, Webroot
    In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.
  • The Trustworthy Cloud Aug 11 2015 5:00 pm UTC 15 mins
    Michael Quinn, General Manager, Cybersecurity & Data Protection, Microsoft
    Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.
  • Quantum Random Number on a Smart Phone Aug 11 2015 3:00 pm UTC 45 mins
    Yuri Andersson, Tech Startup Entrepreneur, CryptaLabs
    Today's problem is that all MOBILE DEVICES use Pseudo Random Number Generators, which is true of any brand or type. This exposes devices to potential mobile attacks. However, tomorrow's problems are that societal shifts will manage more of our personal data on mobile devices and this will become acute with the Internet of Things set to increase the number of devices that are connected.
  • Best Practices for Securing the Mobile Employee Aug 11 2015 3:00 pm UTC 45 mins
    Himanshu Verma, Director, Authentication-as-a-Service, Gemalto
    Join us on August 11th to gain expert advice on enterprise application and mobile security. Here you will learn market dynamics, possible risks and effective solutions you can use while working within your budget.
  • Challenges to Stay Secure in the Era of Digital Business Aug 11 2015 2:00 pm UTC 45 mins
    Marcelo Pereira, Product Marketing Manager, Secunia
    The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.

    The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.

    In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
  • An Offensive Strategy for Today's Cyber Warzone: Winning With Cyber Campaigns Aug 3 2015 8:00 pm UTC 60 mins
    Chris Inglis, former Deputy Director of the NSA and Al Corchuelo, President, Recruit Leaders LLC
    In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • How the United States Postal Service secured their email channel against fraud Recorded: Jul 30 2015 26 mins
    Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service
    Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Hunting Hackers in the Carding Underground Recorded: Jul 30 2015 26 mins
    Grayson Lenik, Director of Digital Forensics and Incident Response at Nuix
    The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

    This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

    You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.
  • Contextual Analytics: A Deep Dive into the Contextualization of Threat Data Recorded: Jul 30 2015 27 mins
    David Dufour, Senior Director of Security Architecture, Webroot
    This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
  • Internet Security Best Practices From The Global 1000 Recorded: Jul 30 2015 51 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Insider Threats: Out of Sight, Out of Mind? Recorded: Jul 30 2015 46 mins
    Matt Zanderigo
    Insider Threats represent a major security blind-spot where an increasing number of today’s security incidents occur. Highly publicized insider data theft, such as the recent Morgan Stanley breach or AT&T call center incident, highlight the increasing need for better security practices and solutions to reduce the risks posed by insider threats.

    Detecting insider threats has become increasingly difficult with the large volume of data generated through normal user activities and lack of visibility into actual user behavior. Most organizations rely on system logs from applications and devices that typically contain hundreds or thousands of discrete events in obscure technical language, making it nearly impossible to determine what a user actually did.

    Join our upcoming webinar “Insider Threats: Out of Sight, Out of Mind?” to learn about the most popular tactics to combat insider threats and how to identify indicators of insiders becoming threats. This webinar will share best practices and how to adopt an early warning system to reduce your risk and strengthen your security posture.

    When: Thursday, July 30th @ 11am EDT

    • Insight into the state of insider threats
    • Most popular tactics to combat insider threats
    • Reduce the risks posed by insider threats
Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Protection in the Cloud – Whose Problem Is It Really?
  • Live at: May 23 2012 5:00 pm
  • Presented by: Richard Moulds, Vice President Product Management and Strategy, Thales e-Security
  • From:
Your email has been sent.
or close
You must be logged in to email this