Webinars

Webinars

  • The building blocks of a cloud security strategy

    Tune into this session, presented by Boleaum Inc. founder Vincent Amanyi, to learn the critical components involved in order to craft security strategies for the cloud environment. Attendees will come away from this webinar with these key takeaways: - Define what matters to them within a cloud security strategy. - The right technology and tools to build up their strategy. - Frame their environment based on growing business applications. - Partner with the right vendors to manage risk and lower cost. Read More

  • Defining the future of Security Service Edge

    Network security is primed for a transformation. Traditional approaches to threat and data protection are no longer effective in a cloud and mobile world. Users, data and apps have left the network, leaving traditional network security approaches in the dark. As data breaches and ransomware continue to rise, IT leaders are now being forced to evaluate new ways to help drive down risk. Read More

  • MDR: Delivering Superior Security Outcomes Through Cybersecurity as a Service

    70% of organizations have had a public cloud security event in the last 12 months— and we know that number continues to rise. That's because attackers are zeroing in on public cloud resource misconfigurations. As more and more data and resources are migrated to cloud platforms like AWS, Azure, and Google, it's harder for IT pros to keep pace, much to the delight of attackers worldwide. Organizations are increasingly investing in cybersecurity services, most notably Managed Detection and Response (MDR), to help improve their threat detection and incident response capabilities When you’re up against malicious actors, the more expertise you can bring to bear the better. Join this webcast to learn how to effectively integrate managed detection and response into your proactive security strategy. We will also cover: - A common attack scenario and how it plays out from a defender's standpoint - Trends of attacks that are taking place in the cloud - Solutions your organization can leverage to obtain better visibility and detection Read More

  • 5 Reasons to Choose an Agentless CNAPP in 2023

    A Cloud-Native Application Protection Platform (CNAPP) is a new approach that simplifies cloud security by combining several capabilities in one platform. By combining vulnerabilities, context, and relationships in a unified data model, a CNAPP provides a holistic view of risks, recognizing how seemingly unrelated low-severity risks can combine to create dangerous attack vectors. In this session, we’ll talk CNAPP and dive into: • How CNAPPs are changing the landscape of cloud security • The advantages of agentless cloud security • How a CNAPP reduces cloud security tool sprawl and strengthens risk prioritization • How the Orca Cloud Security Platform combines cloud workload and configuration intelligence in a unified data model to understand the full context of risks Read More

  • The Keys to Sovereignty in the Cloud

    The World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned by very few US-based companies. This concentration creates a situation of high dependence, and a challenge for business resilience. Digital sovereignty has become an important topic for many nation states, and new regulations are emerging to manage these risks. In this webinar we will cover: - Digital sovereignty challenges between the EU’s GDPR and the US Cloud Act and FISA since the Schrems II decision. - The emerging sovereignty regulations such as GAIX-X, DORA, France’s “Trusted Cloud”, Australia, and others. - The impact of sovereignty on cloud deployment risk and governance. - Strategies to maintain data, operational, and software sovereignty. - How sovereign controls leveraging encryption and key management can protect privacy and sovereignty in the cloud. Join us learn more about how to overcome digital sovereignty challenges in the cloud. Read More

  • Approaching Security with an Identity-First Mindset

    It's no longer news that we need to support and secure increasingly distributed organizations. As companies look for long-term solutions for their hybrid and fully remote workforces, one thing is clear - identity is at the center of businesses today. An identity-first approach to security reduces today's cybersecurity risks and provides the foundation for a Zero Trust security strategy. A modern identity solution can also help you tie the complexities of protecting people and assets together in a seamless way. Join this session to learn: - How to enable and secure your workforce - How identity can lay the foundation for any Zero Trust security initiative - How identity fits into a larger ecosystem and supports a more robust security posture Read More

  • Secure Your Cloud Footprint in 2023

    According to Foundry, formerly IDG Communications, 92% of organizations currently host some or all of their mission critical applications and IT footprint in the cloud. But cloud environments continue to face a myriad of security threats including misconfiguration, lack of visibility, identity and unauthorized access. In this panel discussion moderated by Clarify360's Jo Peterson, tune into hear leading experts focus on specific takeaways that you and your team can put in place to now to ensure your cloud footprint is secure for the upcoming year. - Cloud security roadmap; - Cloud security posture management; - Zero trust network access (ZTNA); - SDLC and DevSecOps within the cloud; - The need for centralized platforms; - Increased investment in intelligent security; - Increased investment in certification and cross training of your team. Panelists: Teena Piccone (Google) Iain Clarke (PayPal Invest) Charles Johnson (Coalfire) Stan Davidson (SonicWall) Read More

  • Enable your cloud security strategy by building a PAGODA

    An effective cloud security strategy can be an elusive and challenging goal to reach. Tune into this session to hear CDS Defence & Security's Martin Nash discuss PAGODA, a self-styled approach to implement a cloud security strategy. PAGODA is an acronym standing for: - Principles - Assets - Governance - Operations - Data - Access This self-styled, tailorable approach to building a cloud security strategy is simple and easy to remember and will ensure that key principles are considered. Attendees will come away from this session with a template on how to build their own cloud security strategy or an option to measure their existing one. Read More

  • Get Your Cloud Security Strategy Ready for 2023

    Organizations are adopting cloud strategies at a rapid pace to scale infrastructure demands, onboard new applications, and provide flexibility to software development teams, among many other use cases. But this brings up challenges for security teams who are responsible for managing security risk and meeting compliance regulations for workloads and applications running in environments outside of their direct control. In this session, ESG Senior Analyst Melinda Marks explores the cloud security priorities your organizations needs to focus on for 2023 and the defenses you should consider putting in place. Read More

  • Establishing Strong DataOps Foundations to Drive Business Value

    With many organizations embarking or already embarked on modernization initiatives, anchored in cloud and AI capabilities, operational challenges can hinder the long run value realization of such transformations. Increasingly, organizations need to consider optimal data operations (DataOps) as part of the modernization efforts, to deliver and expand upon expected business value, and improve AI and data-driven decision making. In fact, the Enterprise Strategy Group’s April 2022 "State of DataOps" report found that out of 403 technical and business data professionals, 90% of those surveyed reported plans to make moderate to extensive investments in DataOps in the upcoming year. Data and Business leaders, need to collaboratively map out desired outcomes and prepare for challenges before implementing a DataOps strategy. Join this conversation among leaders from leading organizations, Deloitte and Enterprise Strategy Group (ESG) as they discuss the foundations of a strong DataOps strategy. This conversation will focus on: • The long-term goal of DataOps and key pillars that will drive its sustainability • How Agile and DevOps approaches and teams that have the right roles and skillsets drive effective and value-adding operations • How new technology will support DataOps • How data governance needs to be embedded in DataOps • Program management, governance and alignment • And much more Read More