SIGS Webinar
Cloud… From fog to clarity, from unmanaged to controlled adoption

Save the DateClick on the .ics file to save the date

CPE Credits Earn 1.25 CPE (Continuing Professional Education) for attending this SIGS Webinar. Please request a confirmation during the registration.
Location ONLINE
Date of Event 3rd July 2020, 3:00 pm
Special We hope to have interactive discussions and therefore each question/comment during the webinar is very appreciated!
Language English
Participation Costs for free

 
Agenda

 

3:00 – 4:00 pm Johny Gasser, Information Security and Compliance Officer and Business Cyber Protection Advisor at Orange Business Services
An internationally recognized leader in cyber security and data protection, who regularly speaks at influential events and conferences around the world and contributes articles to newspapers, magazines and blogs.

His deep understanding of a large panel of different sectors and industries is a serious asset when it is time to translate technical or cyber risks into business risks; as the reverse, translating business needs into technical requirements.

He is advising and coaching CIO, CISO and security teams into defining their security strategy, governance or security controls. In the last years, most of his time was spent on extending traditional security measures to the Cloud and setting up security organization to cope with new services, including 3rd parties. His vision is very pragmatic focusing on effective results permitting to transform critical risks into business acceptable risks.

Cloud… From fog to clarity, from unmanaged to controlled adoption
With or without the approval of IT/Information Security department, companies have or are migrating in the Cloud. Users have adopted Cloud applications since several years now.

So many tools exists to protect your infrastructure, application and data in the Cloud, Cloud Access Security Broker (CASB), Cloud Security Posture Management (CSPM), Cloud Workload Protection Platform (CWPP), Key Security Management, in top of the traditional Identity Access Management, Data Leakage Prevention, NextGen firewalls, etc. Every vendor is claiming that their solution is THE way to secure the Cloud…
What works? What is useful in which context? Which risks are covered by which family of tools?

This talk is a vendor agnostic review of the family of tools to permit you to select your priorities and take back control over your company activities running in the Cloud.

 

The Sponsor of this event is:

Registration

This is a ‘must attend’ webinar for all security professionals! We are working hard to provide great content in no sales/marketing pitches. So profit from the knowledge from industry experts.

Register here!

With the registration for this webinar you accept, that SIGS may use the data entered for its own purposes and may share to use it with its event partners and event sponsors of this platform. In addition, we will record the session and provide the video for downloads to the community.

X
X
X
X