Webinars

Webinars

  • Security Posture Management for Multi-Cloud and Hybrid Infrastructures

    Tune into this session to hear cloud expert Dwayne Natwick provide guidance for configuring and managing hybrid and multi-cloud resources within cloud native tools for complete security posture management of your infrastructure. After configuring resources for security posture management, you will learn how to configure vulnerability scans on these resources for next level security posture management. Key takeaways attendees will learn include: --The evolving types of infrastructure with multiple cloud providers and on-premises architectures. --Options that tools provide for multi-cloud and hybrid infrastructure security posture management. --How to manage security posture through cloud-native tools for the full infrastructure. About the speaker: Dwayne is a Global Principal Cloud Security Technical Lead/CTO for Atos across Microsoft, AWS, and GCP. He is the thought leader determining trends, developing, advocating, and building business plans for the overall cybersecurity services for this global systems integrator. Dwayne also leads the cloud education portfolio for Microsoft and AWS. In addition to creating curriculum, training, and blog writing, he is a Microsoft MVP and a Microsoft Certified Trainer Regional Lead. Dwayne has spoken at conferences and user groups globally on cloud security, identity security, and data/AI trends. Dwayne has authored books and is a Security Professional Community Manager for Packt Publishing. Read More

  • Multicloud Cybersecurity Trend:Supercharged Strategies for Supercharged Threats

    The cloud is the optimal environment for most workloads, with many organizations using multiple cloud providers to reduce risk, maximize agility, and control costs. With these benefits, comes security risks. Join this keynote session to explore the latest threats to multicloud environments and effective strategies to improve your security posture. During this session, you will learn: - How to secure endpoints, dev/test environments, tools/monitoring, and more - Strategies for de-coupling security from compute - Best practices to minimize sprawl and improve security posture Read More

  • Build a Multi-cloud Strategy that Supports Governance and Compliance

    Spreading operations across more than one cloud enables organizations to choose from a variety of cloud services to cut costs, improve operations and improve scalability. However, operating complex environments across multiple platforms requires a comprehensive strategy to handle connectivity, applications, data and security. In this panel, experts will discuss how organizations can evaluate risks in their own and their cloud service provider environments, as well as technologies and tools that can assist in achieving a comprehensive strategy. Join us to learn about: --Understanding cloud scope across the organization --Cloud governance frameworks --Pros and cons of centralizing security access and monitoring controls --Multi-cloud management and network security analytics platforms --Cloud security posture management (CSPM) tools that can identify misconfigurations and risks --Tools for cloud compliance monitoring Moderated by: Evgeniy Kharam, Cybersecurity Architect and Advisor, Podcaster Steve Cobb, Chief Information Security Officer, One Source Eyal Arazi, Senior Product Marketing Manager, Radware Read More

  • The Benefits and Threats of the Multi-Cloud

    Tune into this webinar to learn winning strategies to understand the complex, multi-cloud environment. The University of Washington's Deveeshree Nayak will also introduce approaches to address the common threats present in the multi-cloud as well as the roles the multi-cloud serves in different industries. Viewers will come away from this presentation with a better understanding of: - The overall view of a multi-cloud environment; - The benefits of the multi-cloud; - Approaches to address the threats associated with the multi-cloud across various industries. Read More

  • Security Challenges and Mitigation Techniques for the Multi-Cloud

    As cloud adoption across industry verticals increases, hybrid, public, and private cloud infrastructure deployment models grow in use. In order to improve architecture and service resiliency, and to avoid vendor lock-in, one of the common cloud architecture deployment models also includes multi-cloud platforms. Whereas multi-cloud deployment does have its benefits, relying on multiple vendors and clouds increases the attack surface and overall associated risks. Additionally, multiple platforms increases complexity making security even more challenging to design, deploy and monitor. In this webinar, we aim to highlight following key takeaways for the audience: • Managing multi-cloud security challenges; • Important security controls; • Strategy to manage compliance requirements; • Role of automation; • Logging, auditing and monitoring. Read More

  • Invisible Cloud Security: Accelerating your cloud transformation

    Accelerating your cloud transformation whilst reducing risk: Shared responsibility, with less operational overhead. Find out how to set, secure and forget your cloud environment from core workloads to cloud-native development pipelines. Security teams and development teams have always been running in opposite directions, as quickly as possible. Security professionals have always felt like the bearer of bad news, slowing down their colleagues, and being a source of frustration. Boards overlay multi-cloud complexity through acquisition and merger. A complete 3rd party cloud security solution bridges the gap and allows cohesion and when done well, is almost completely invisible. Read More

  • Supercharge Your Security for Multi-Cloud

    Organizations are adopting multi-cloud strategies to leverage capabilities of different cloud security providers (CSPs) and to provide flexibility to software development teams. But this brings up challenges for security teams who are responsible for managing security risk and meeting compliance regulations for workloads and applications running in different environments. In this session, ESG Senior Analyst Melinda Marks explores how to supercharge your security to gain the visibility and control you need to scale security programs for multi-cloud environments. Read More

  • A Proactive Plan for Addressing Cyber Risk

    Organizations face a constant barrage of cyber threats that could lead to business disruption, intellectual property theft, and reputation damage. But preventing such attacks has become increasingly challenging due to business factors like supporting the remote worker population, connecting IT to third-party partners, and developing new types of applications for digital transformation. How can CISOs balance the need for aggressive IT initiatives for business enablement while managing and mitigating cyber risk? ESG Senior Principal Analyst and Fellow, Jon Oltsik, will discuss best practices for cyber-threat and breach prevention that can protect and support the business. Read More

  • Coming Soon — CISO Observability in the Boardroom

    Cybersecurity has not only become a regular boardroom topic, but may soon be a requirement. If proposed SEC legislation takes hold, all publicly traded companies must have a process in place to disclose cybersecurity incidents and more importantly, must actively identify and manage cybersecurity risks with board of directors’ oversight. This legislation will likely have a trickle-down effect on many private companies as well. While some organizations have already undergone this journey, we expect that numerous companies are late to the party and haven’t begun to determine what this change means for them. This session will help you develop a game plan to right-size security for your organization by addressing the following key issues: • Who should fill this role? • Where to start? • The art of incident response and reporting. • What are some of the functionalities the SEC will be looking to include: o Controls to prevent unauthorized access o Monitoring o Measures to detect, mitigate, and remediate cybersecurity threats o Third-party risk management • Coordination with legal counsel and financial advisors. Read More

  • Defining the modern Cyber Security Architecture and Business Model

    According to a report from ESG, adopting a Zero Trust Segmentation can save more than $20 million in app downtime, averts 5 cyber disaster and accelerates 14 digital transformation projects. As organisations struggle to do more with less, and build their security architecture with the post COVID world in mind, there is increased focus on delivering a Zero Trust environment, and doing so cost effectively while consolidating vendors. In this discussion, we will explore how your organization can: 1) Implement a Zero Trust architecture 2) Improve Governance, Risk and Compliance while focusing on cost control. Read More