Earn up to 4.5 CPe by attending this virtual conference.
The rush has led to the cloud due to the epidemic that made many institutions technically smarter, but it also increased its attack surfaces. Cyber ​​security leaders are assigned to correct many known problems along the way – such as repairing the plane in the middle of the flight. But “the cyberspace as a technique in the air” is not a sustainable model.
IT security leaders need a seat in the cockpit so that they can better assess the risks of compliance, security, privacy and to move to the cloud. This allows CEOs for cybersecurity to create or update a cloud safety deportation plan that includes flexibility and the best expansion and automation to ensure that their organization is on the right path.
Bring the electronic summit for the safe cloud deportation organized by SC Media, a one -day virtual event on September 14, where industrial leaders will share their visions and experiences on the strategies of Safety of Cloud Deportation. Topics to be taken will include:
Ensure that your cloud deportation efforts are on the right track, supported by an effective and adaptive cloud security strategy. Register now.
Distinguished keywords
Agenda
10:45 AM Easter time
The opening of the conference
11:00 AM Easter time
Keyword | Safety as a symbol: The only way to protect your work in the cloud
James Kaplan, partner, McKinsey & Companish
Almost all weaknesses and violations in the cloud stem from the wrong composition, because it is almost impossible for developers or infrastructure managers to prepare safe cloud environments manually manually. Safety as software instructions – where policies direct the secure programming composition – is the only way to protect your cloud works.
You will learn in this course:
11:40 AM Easter time
Why does your cloud need to cancel identification?
Akshay Kumar, Senior Product analyst, PKWARE
The storage of cloud data for institutions provides affordable and easy -to -manage options for preserving and maintaining expanded data stores with the growth of their business, which does not only increase productivity, but also increases the flexibility, service continuity and business flexibility. Data are deported from different local and non -organized local warehouses to cloud storage platforms daily. Deportations of these companies can help take advantage of the leading IAAS and disaster relief and remote work stations. But such a large -scale movement can lead to the risk of sensitive data.
During this session, the cloud expert Akshay Kumar discusses how institutions can safely deport data to the cloud. The attendees will learn more about:
12:20 pm Easter time
Securing any application on the cloud
Brian Schwartz, Director of Product Marketing for Application Security, Fortinet
You need the cloud to provide a set of business capabilities that your organization needs quickly. The security solution for the multiple cloud does not increase friction, but rather removes it and helps you to push your business forward. Join us to learn how Adaptive Cloud Security can accelerate your journey to the cloud and provide the capabilities your business needs to achieve success, on any cloud that meets your needs in the best way.
1:00 pm Easter time
Improving safety in the cloud
Jose Parajas, coach, AttackIQ
Since the response to accidents has become a new natural matter, ensuring that our systems and processes support this effort and that chasing threats work as expected is necessary. We will discuss the reason and how to create a safety improvement program within your organization. Specifically, how such a program develops beyond the simulation of penetration and attack (BAS) and provides the team with continuous comments episode to understand their position and determine the gaps when they appear. The appointments of the security package will be shared that you can start to benefit from to protect your cloud environment.
1:40 pm Easter time
The cloud is the new limits: How to avoid security disturbances and fly high
Nimi George, Vice President/Head of Information Technology Department at Pacific Dental Services
Dr. Sumara Das, Founder of CTO, Blue Hexagon
The rapidly packed cloud deportation created the epidemic, challenges for security leaders to maintain vision, compliance and capabilities to defend threats through the constantly expanding information technology real estate. The transition to the multiple cloud has exacerbated the complexity, as each cloud has its own terms, services, naming and accurate architectural differences.
In this course, we will do the following:
2:20 pm Easter time
The clouds are broken: continuity in the twenty -first century
J. Wolfgang Gorlich, Chief Consultative Information Security official, Duo Security
The promise of cloud computing was a benefit; Always running, always, with only one click. But we have seen many interruptions. It is clear that the time has come to dust from the continuity booklet and reconsider recovery in the twenty -first century.
Join Duo Security Ciso Wolfgang Goerlich for an overview of business impact analysis, business continuity, disaster recovery, review of these concepts in the day and era of auxiliary computing and cloud services. After all, the cloud is broken, so what to do when it breaks?
You will learn in this symposium via the web how:
3:00 pm Easter time
Improving the public, private and mixed cloud security situation
Tim Woods, Vice President – Technology Alliances, FireMon
Lisa Wallace, Sales Engineer, FireMon
When the cloud becomes more blurry and even the edge environments begins to resemble the traditional cloud, it becomes increasingly difficult to reduce the risks of the institution. With the spread of data in different geographical areas, the safety role also becomes the role of compliance.
How can you better protect your company's important data? How can you get a clear vision for traffic flow? How can you protect your data spread through hybrid clouds? How can you achieve compliance with distributed environments? During this event, you will get answers to these questions and more:
Discover how to improve your security position and achieve better results to comply with data even with the start of data on more sites.
3:30 pm Easter time
Reducing the risk of ransom programs before starting deportation to the cloud
David Dabril, Vice President for Product Marketing, ONAPSIS
Over the past few months, wherever you go, there is another story about the attacks of ransom programs on biological systems of business. The traditional lens through which we see the attacks of the ransom programs is no longer effective as before. Although the benefits of transferring SAP systems to the cloud are many, the deportation process is a huge task and often means giving up control and vision in terms of infrastructure security, operations and maintenance.
Bring this session to get to know the best way to protect your most important SAP systems from the threat that is looming on the horizon of ransom programs before the process of moving to the cloud begins. The attendees will get a better understanding of the following:
4:20 pm Easter time
Keyword | Monster efforts: the legendary cloud journey of entertainment
Dan Metham, Vice President of Global Security at Legendary Entertainment; The SC Media Award for 2021 Sco for this year
From a start -up film production company based on private stock boxes to the process of billions of dollars behind the movie Godzilla Vs. Kong this year and the film that will be released soon, LEGENDARY ENTERTAINMENT has rapidly expanded, along with a series of huge studio cooperation operations, the great demand for technological transformation over the past decade. Listen to Dan Mitimim, Vice President of LEGENDARY World Security and the company's operations, where the cloud plays the decisive role in enabling rapid and safe transformations in operations.