CISO Express | A Security Professional’s Home Page

PCI Council

  • Did you know insecure remote access is one of the leading causes of data breaches?
    During this webinar PCI SSC discusses the responsibilities of a QIR and how it relates to remote access, authentication credentials and the Implementation Statement. Speakers include Elizabeth Terry​ (Community Engagement Manager), Travis Powell (D…
    - 10 Oct 19, 12:00am -
  • SSL and Early TLS Migration: Preparing for 30 June 2018 Deadline
    30 June 2018 is the deadline for disabling Secure Sockets Layer/early Transport Layer Security (SSL/early TLS) and implementing a more secure encryption protocol in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.…
    - 30 Jun 18, 12:00am -
  • How Hoteliers Can Reduce The Risk of a Data Breach
    The hospitality sector, globally, is a key target for attack – especially point-of-sale (POS) intrusions. That’s why the Council joined with American Hotel and Lodging Association (AHLA) to share best practices on securing payment data in this sp…
    - 15 Jun 16, 12:00am -

Security Forum

Cloud Security Alliance

  • Combating the Evolving Threat Landscape with AI Monitoring
    IT Security, Cybersecurity, Privacy and Data Management issues are ranked as top challenges facing organizations today. The digital transformation has greatly impacted the way businesses track, measure and analyze risk across domains. While organizat…
    - 5 days ago 19 Jan 21, 6:00pm -
  • Five Lean Principles of Collaboration for Enhanced Product Security
    Engage early, engage often. Continuously delivering products with enhanced security capabilities in a cross-functional, multi-platform environment is no easy task; It takes a lot of commitment to collaborate and communicate on the part of every in…
    - 10 days ago 14 Jan 21, 5:00pm -
  • Working From Home: NSFW
    The biggest shift due to COVID-19 was the immediate move of the workforce to the “home office.” But the "home office" is really just your home environment and your organization’s computer. This leaves employees vulnerable without the comprehens…
    - 12 days ago 12 Jan 21, 6:00pm -
  • Cloud Security Must: Ensuring Least Privilege
    The principle of least privilege access – in which all human and machine identities should have only the permissions essential to perform their intended function – is a cloud security best practice promoted by cloud providers like Azure, GCP and…
    - 38 days ago 17 Dec 20, 5:00pm -
  • Navigating Through the Pandemic: A MAVCOM's Cloud Journey
    Navigating Through the Pandemic: A MAVCOM's Cloud Journey​Ts. Saiful Bakhtiar OSMAN (Head of ICT, Malaysian Aviation Commission)Sharing MAVCOM’s experience on how this economic regulator for aviation industry has set the trend by being an earl…
    - 40 days ago 16 Dec 20, 3:45am -
  • The Rush to Cloud Adoption - Watch Your Steps
    Panel Discussion The global pandemic and the associated lockdown in many countries have been an inflexion point in the adoption of cloud computing; we have observed increased usage and adoption. The increased usage as well as new cloud adoption du…
    - 40 days ago 16 Dec 20, 2:45am -
  • Cloud Adoption - Cybersecurity Opportunity, Threats and Practices
    The current COVID19 pandemic outbreak has arguably been a wakeup call for most organizations that faced increasing difficulties operating from the traditional on-premise model. Unknowingly, many organizations might not have been aware that they have…
    - 40 days ago 16 Dec 20, 2:00am -
  • Cloud Security Landscape: Challenges & it's Possible Solutions
    IntroductionSureen SUBRAMANIAN (Chairman, Protem Committee, CSA Malaysia Chapter)​Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) Opening Keynote - Cloud Security Landscape: Challenges & it's Possible SolutionsDato' Dr. Haji Amirudin bin…
    - 40 days ago 16 Dec 20, 1:00am -
  • Five Lean Principles of Collaboration for Enhanced Product Security
    Engage early, engage often. Continuously delivering products with enhanced security capabilities in a cross-functional, multi-platform environment is no easy task; It takes a lot of commitment to collaborate and communicate on the part of every in…
    - 45 days ago 10 Dec 20, 5:00pm -
  • Driving a Stake in the Heart of the 2020 Beast
    In this CloudBytes webinar, Cloud Security Alliance CEO Jim Reavis will go into a hypnotic trance and summons otherworldly forces to banish 2020 and all of its evil incarnations into an endless pit of fire, freeing humanity from its evil clutches. Ji…
    - 46 days ago 9 Dec 20, 7:00pm -
  • Cloud Security Threat Landscape in the New Normal
    Panel Discussion : Cloud Security Threat Landscape in the New Normal The pandemic has accelerated the digital transformation initiatives of many organizations in the Indonesia. Local companies jumped to the cloud with survival response as the prime…
    - 47 days ago 9 Dec 20, 5:15am -
  • Threat Intelligence and Cyber Incidents Exchange
    (in Bahasa Indonesia)
    - 47 days ago 9 Dec 20, 4:30am -
  • Which Threat Intel Should we be Aware of?
    Cyber Threat Intelligence is known as cyber threat knowledge or information which is expected to help implement more effective security controls to provide us with various advantages in building a safe cyber environment. Organizations are then become…
    - 47 days ago 9 Dec 20, 3:45am -
  • Key Principles and Strategies for Securing the Enterprise Cloud
    (The presentation is in Bahasa Indonesia) Customers are turning to the cloud to reduce capital expenses and increase agility as part of their digital innovation (DI) initiatives. Despite the benefits, cloud migration results in business-critical da…
    - 47 days ago 9 Dec 20, 3:00am -
  • Introduction, Welcome Remarks & Opening Keynote
    CSA Indonesia Virtual Summit 2020IntroductionFaisal YAHYA (Chairman, CSA Indonesia Chapter)​Welcome MessageDr. Hing-Yan LEE (EVP APAC, CSA)Cloud Computing & Cloud Security Landscape in Indonesia: Challenges & it's Possible Solutions Semeul…
    - 47 days ago 9 Dec 20, 2:00am -
  • The Security Automation Stack
    Infrastructure as Code and Security Automation for Container Native ApplicationsCompetition and the pursuit for business superiority is shortening product to market cycles, requiring enterprises to reevaluate current application architectures. It d…
    - 47 days ago 8 Dec 20, 6:00pm -
  • Weathering the Storm: Immune System Technology for Cloud & SaaS
    As workforces look to remain remote for the long term, the cloud has become ubiquitous. Yet human security professionals relying only on conventional security tools continue to struggle to secure the complexity of today’s hybrid and multi-cloud top…
    - 52 days ago 3 Dec 20, 6:00pm -
  • Quantum Computers and Cryptography
    It’s estimated that within the next 10-15 years, there will be a quantum computer powerful enough to break existing RSA and ECC cryptographic algorithms, rendering existing cryptography insecure.This webinar covers:- What a quantum computer is…
    - 53 days ago 2 Dec 20, 5:00pm -
  • Best Practices for Implementing a Secure DevOps Toolchain
    Shifting security left empowers DevOps teams to create secure software and infrastructure by giving them the tools and indicators to detect and mitigate potential security problems prior to release. Learn how your DevOps teams can take ownership of y…
    - 54 days ago 1 Dec 20, 6:00pm -
  • Journey to Cloud Adoption
    Panel Discussion Moderator: ​Ou PHANNARITH (Director of ICT Security, MPTC, Cambodia)Panelists :​Mok KHEMERA (Director of E-Government)Dr. Hing-Yan LEE (EVP, CSA APAC) ​Nipaul LONG (CTO, PlasGate Co., Ltd.)
    - 61 days ago 25 Nov 20, 4:45am -
  • Securing the Cloud via CCSK
    Securing the Cloud via CCSK
    - 61 days ago 25 Nov 20, 4:00am -
  • Cloud Security 101
    Cloud Security 101
    - 61 days ago 25 Nov 20, 3:15am -
  • ICT Development in Cambodia
    ICT Development in Cambodia
    - 61 days ago 25 Nov 20, 2:30am -
  • Towards a Secure Cloud Ecosystem in Cambodia
    Towards a Secure Cloud Ecosystem in Cambodia
    - 61 days ago 25 Nov 20, 1:45am -
  • Welcome Remarks & Opening Keynote
    Welcome Remarks ​Ou PHANNARITH (Director of ICT Security, Ministry of Post and Telecommunications (MPTC), Cambodia)​Opening KeynoteDr. Sang SINAWONG (Under Secretary of State, MPTC, Cambodia)
    - 61 days ago 25 Nov 20, 1:00am -
  • Top Cloud Attack Paths You Should Worry About
    Security pros detail the common ways bad actors attack your cloud environmentsAs organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is ma…
    - 61 days ago 24 Nov 20, 6:00pm -
  • Using KPIs To Build Confidence in Your Cloud Security & Compliance Posture
    How confident are you that your developers are avoiding the mistakes in public cloud usage that can lead to critical security risks?Most security breaches in the cloud are the result of simple configuration errors, and many organizations struggle t…
    - 66 days ago 19 Nov 20, 5:00pm -
  • SSO is essential for workforce productivity but is it secure enough?
    Digital transformation has introduced multiple applications, collaboration tools and file sharing services for the workforce. Agreed these apps are for the cloud, but enterprises do have legacy infrastructure as well. Single Sign On for Hybrid enviro…
    - 67 days ago 18 Nov 20, 5:00pm -
  • Today’s Threat Landscape
    Now more than ever, it’s important for organizations to gain visibility into email and brand reputation threats. While the concept of email hasn’t changed in 20+ years – the tactics, techniques and procedures that adversaries are utilizing dra…
    - 68 days ago 17 Nov 20, 6:00pm -
  • The Impact of Trickbot and How It Affects State Infrastructure
    In a recent report by SecurityScorecard titled “State of the States’ Cybersecurity”, it was uncovered that thirteen states are infected with the Russian “TrickBot” malware that was feared to have consequences for the U.S. election. With the…
    - 73 days ago 12 Nov 20, 7:00pm -
  • Best Practices in Selecting Cloud Services
    The pandemic accelerated the digital transformation initiatives of many organizations in the Philippines. Local companies jumped to the cloud with survival response as the prime consideration. Join our fellow CISOs and CIOs in this panel discussion…
    - 75 days ago 11 Nov 20, 3:30am -
  • Cloud Security Against the Top Threats in Cloud
    The pandemic has accelerated the digital transformation initiatives of many organizations in the Philippines. Local companies jumped to the cloud with survival response as the prime consideration. Join our fellow CISOs and CIOs in this panel discus…
    - 75 days ago 11 Nov 20, 2:45am -
  • Securing the Big Shift to the Cloud
    The debate on Cloud adoption is over. The pandemic has accelerated the migration of Philippine local enterprises to the cloud. The current table discussions during business meetings is how to move forward on the cloud. Major discussions circle aro…
    - 75 days ago 11 Nov 20, 2:00am -
  • Navigating Troubled Waters
    Introduction - Ryan TY (Chairman, CSA Philippines Chapter)Welcome Remarks - Dr. Hing-Yan LEE (EVP, CSA APAC) Opening Keynote - Timothy GRANCE (Senior Computer Scientist, NIST)In this presentation, Tim will share the changes in telework practices…
    - 75 days ago 11 Nov 20, 1:00am -
  • The SOC of the Future - E pluribus unum
    As security and IT teams support the disparate tools, resources and infrastructure required to enable organizations to securely innovate and expand services, they face the challenge of establishing centralized visibility, detection and control over a…
    - 75 days ago 10 Nov 20, 9:00pm -
  • Understanding the Third Party Risk Ecosystem
    Many stakeholders make up the third party Risk ecosystem: multiple organizations within the enterprise, software and service solution providers, industry associations, regulatory bodies, and the third parties themselves. There are many forces at play…
    - 76 days ago 9 Nov 20, 6:00pm -
  • Packets: Defending the Cloud with Network Detection & Response
    The playing field between attackers and defenders is not level, and it’s only becoming more unbalanced because of the complex, layered nature of attack surfaces in the cloud. Attackers can launch millions of arrows and only need one to find its tar…
    - 80 days ago 5 Nov 20, 5:00pm -
  • CCAK: The industry's first global cloud auditing credential
    Developed by CSA and ISACA to meet the unique demands of auditing cloud based environments, the Certificate of Cloud Auditing Knowledge (CCAK) is the first credential that industry professionals can obtain to demonstrate their expertise in understand…
    - 80 days ago 5 Nov 20, 11:15am -
  • Zero Trust: The Key to your IAM Success
    Enterprise-ready cloud services and hybrid solutions have made it easier for users to complete their work wherever they are, but this flexibility expands the attack surface admins are expected to secure. Many organizations today are using zero-trust…
    - 80 days ago 5 Nov 20, 10:30am -
  • The Impact of Fog Computing and Edge Computing on Cloud Security
    Due to the rapid growth of IoT and mobile devices, both fog computing and edge computing technologies were hastily developed, which resulted in security and privacy related challenges that could impact the integrity of information in the cloud. Fog c…
    - 80 days ago 5 Nov 20, 9:45am -
  • A How-To Guide: Navigating the Top 7 Trends in Third-Party Risk Management
    The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is there are world-class teams around the world that ar…
    - 80 days ago 5 Nov 20, 9:00am -
  • Cloud Control Matrix V4
    Since its debut in 2013, the Cloud Control Matrix (CCM) v3.0.1 has been greatly successful and received wide adoption around the globe. Nevertheless, as new technologies emerge and the cloud certification landscape continuously evolves, so must the C…
    - 80 days ago 5 Nov 20, 8:00am -
  • What You Need to Know About Credential Stuffing Attacks
    As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.In credential st…
    - 81 days ago 4 Nov 20, 11:45am -
  • A Referenced Architecture to Modernize Your Approach to Cloud
    Awaken your approach to cloud with a reference architecture that modernizes your enterprise. John covers the foundational components of the CSA Enterprise Architecture and shares how it is used to to secure multiple cloud implementations. Overlayed o…
    - 81 days ago 4 Nov 20, 11:00am -
  • Unveiling the Wonder of Automated Vulnerability Management in the Cloud
    As more workloads move to the cloud, it is critical to secure those workloads against known vulnerabilities. The benefits of the cloud allow for agility, speed and innovation, but the cloud also can pose a challenge for vulnerability management. Th…
    - 81 days ago 4 Nov 20, 10:15am -
  • STAR Future Roadmap
    The CSA has recently celebrated the 1000 entries into the STAR Registry. This was confirmation of the value and relevance of the STAR program in the cloud community. The STAR Program has evolved into a framework that provides a flexible, increment…
    - 81 days ago 4 Nov 20, 9:30am -
  • Shared Responsibility: Someone Else’s Problem
    When talking about cloud it’s easy to fallback to that old joke that cloud is just someone else’s computer. Unfortunately it’s also easy to see it as Someone Else’s Problem (SEP). Ford Prefect, from The Hitchhiker's Guide to the Galaxy, said…
    - 81 days ago 4 Nov 20, 8:45am -
  • Get Quantum Safe
    Introduction to CSA's Quantum Safe Security Working Group and its goals and objectives. Quantum computers continue to strengthen and soon will be able to break traditional forms of asymmetric encryption and weaker symmetric ciphers. Attend this sessi…
    - 81 days ago 4 Nov 20, 8:00am -
  • Using OPA for Continuous Compliance with Cloud Infrastructure Policy-as-Code
    Cloud security is a software engineering problem, not a security analysis one. The engineers that build and maintain cloud infrastructure need policy-as-code tools to ensure cloud security and compliance.Open Policy Agent is an open source standard…
    - 82 days ago 3 Nov 20, 11:15am -
  • Cloud Security post Covid-19, Where to Go Next
    Over recent years, security and compliance have been some of the top considerations when moving to the cloud. However, as Covid-19 has served as a transformation accelerator in many aspects of our digital life, cloud consumption is skyrocketing, and…
    - 82 days ago 3 Nov 20, 10:30am -

Bitglass (Lots of Interesting Webinars

  • newSecurely Connect Users to Cloud Apps with SASE
    During this live educational session with demo, hear more about: How SASE works and the problems solvedReal world public sector success storiesFedRAMP, licensing, deployment & maintenancePartnering for successProven procurement pathways
    - 18 days ago 11 Feb 21, 6:00pm -
  • newWhy Web Security is Leading a SASE Revolution
    Join this exclusive webinar session with Bitglass cloud experts to learn:· The drawbacks of traditional appliance and cloud-proxy secure web gateways.· How on-device SWGs deliver enhanced performance and provide more than 50% cost savings over…
    - 10 days ago 3 Feb 21, 6:00pm -
  • newAn Introduction to Selling Secure Access Service Edge (SASE)
    Join this exclusive partner sales webinar with Bitglass. We’ll cover:- An introduction to the Bitglass SASE portfolio- The basics customer value propositions for SASE- Key product areas that make up the SASE solution a. SmartEdge Secure Web…
    - 2 days ago 27 Jan 21, 1:30am -
  • Top Tips for Securing Remote Workers with Zero-Trust Network Access
    There’s a lot of noise in the cybersecurity industry around zero-trust and remote working. With the constant evolution of cybercrime, remote workers are targeted daily with phishing scams, ransomware attacks and remote access trojans, among many, m…
    - 4 days ago 20 Jan 21, 6:00pm -
  • Getting Ahead of the Next Cyber Breach
    At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DB…
    - 18 days ago 6 Jan 21, 6:00pm -
  • Bitglass Cloud Security Report 2020: Key Findings & Recommendations
    As this year comes to a close, enterprises continue to navigate remote working, increased cloud migration, bring your own device, and digital transformation. Each of these requires an integrated and robust cybersecurity posture that is capable of per…
    - 45 days ago 10 Dec 20, 6:00pm -
  • Bitglass + Armature Systems: Demystifying SASE
    In this webinar, we will discuss how Secure Access Service Edge (SASE) can help organizations fast track digital and cloud transformation, and answer practical questions on how organization can leverage SASE, including:- Do I need to implement every…
    - 66 days ago 19 Nov 20, 6:00pm -
  • Thriving in a Highly Remote, Cloud-First Environment with Bitglass
    Join this webinar to learn how to:- Swiftly deploy security for your remote workforce while preparing for a future “normal”- Secure BYO devices while enabling productivity- Ensure proper protections on the web without compromising the user exp…
    - 82 days ago 3 Nov 20, 6:00pm -
  • Securing SaaS with Bitglass: ServiceNow & Confluence
    ServiceNow and Confluence are commonly used software-as-a-service applications in organizations around the world. ServiceNow provides automation and efficiency for streamlining business workflows, while Confluence enables communication and collaborat…
    - 95 days ago 21 Oct 20, 9:00am -
  • Comparing Secure Web Gateways: Time for a Reboot at the Edge
    Join this exclusive webinar session with Bitglass cloud experts to learn:· The shortcomings of traditional appliance and cloud delivered secure web gateways;· How on-device secure web gateways provide more than 50% cost savings over traditional…
    - 96 days ago 20 Oct 20, 5:00pm -
  • Comparing CASB Technologies: What's the Difference?
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and n…
    - 13 Oct 20, 5:00pm -
  • How to Address the Top 5 CISO Priorities (EMEA)
    "Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origi…
    - 6 Oct 20, 9:00am -
  • Identity & DLP: Two Critical Pillars in Your Defense Strategy
    Identity access management and Data Loss Prevention are the two most important aspects of protecting any organization sharing data over cloud. As businesses across the globe continue to face increasing regulations and stricter compliance, data leakag…
    - 29 Sep 20, 5:00pm -
  • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
    In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
    - 24 Sep 20, 9:00am -
  • Bitglass + IBM QRadar: Reinventing SIEM for Intelligent Cloud Detection & Resp
    Join this exclusive webinar session with IBM and Bitglass to learn:• The combined integration benefits provided by Bitglass’s CASB technology and QRadar’s intelligent SIEM;• How intelligent security analytics and insight can b…
    - 16 Sep 20, 5:00pm -
  • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
    In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
    - 2 Sep 20, 5:00pm -
  • Protecting Legal Firm Data: Navigating a Cloud Security Strategy
    "IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for de…
    - 1 Sep 20, 9:00am -
  • How to Address the Top 5 CISO Priorities
    Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origin…
    - 19 Aug 20, 5:00pm -
  • (APAC) The Best of Both Worlds: CASB + IAAS (Azure)
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
    - 12 Aug 20, 1:30am -
  • (EMEA) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex
    Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based def…
    - 11 Aug 20, 9:00am -
  • The Best of Both Worlds: CASB + IAAS (Azure)
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
    - 5 Aug 20, 5:00pm -
  • Sécurité du Cloud en temps réel dans le contexte du travail à distance
    Le monde vient d'observer une augmentation importante du travail à distance à une époque où sa mise en place démarrait. À plus long terme, nous observons un environnement de travail plus complexe à sécuriser avec une augmentation des équipe…
    - 28 Jul 20, 8:00am -
  • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce
    Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools,…
    - 14 Jul 20, 5:00pm -
  • Why CASB is the New Firewall for the Cloud
    Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
    - 8 Jul 20, 2:00am -
  • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
    - 1 Jul 20, 9:00am -
  • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
    - 1 Jul 20, 1:00am -
  • Legal Firms Adopting Cloud and Mobile Working Strategies
    IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for des…
    - 23 Jun 20, 1:30am -
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
    - 2 Jun 20, 9:00am -
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC)
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
    - 2 Jun 20, 1:30am -
  • How to secure remote workers and data at access (EMEA)
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
    - 14 May 20, 9:00am -
  • Remote Worker Alert! Who Moved My VPN and Why Should I Care?
    Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote work…
    - 14 May 20, 12:00am -
  • How to secure remote workers and data at access
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
    - 13 May 20, 5:00pm -
  • A Cloud Security Checkup: CASBs in Healthcare
    Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breache…
    - 6 May 20, 5:00pm -
  • Cloud and SASE - Continued Disruption (APAC)
    SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remo…
    - 5 May 20, 12:00am -
  • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture
    In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish…
    - 8 Apr 20, 5:00pm -
  • Cloud Security Essentials – Bitglass and Zscaler
    Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security tech…
    - 25 Mar 20, 5:00pm -
  • Securing the Exploding Cloud Footprint
    With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs ca…
    - 12 Feb 20, 6:00pm -
  • SASE: Security for the Cloud & from the Cloud
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:What exactly is a SASE?How are CASB and SWG e…
    - 11 Dec 19, 11:00pm -
  • The Scoop on SASE: Converging Your Cloud Security Footprint
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:What exactly is a SASE?…
    - 4 Dec 19, 6:00pm -
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solution…
    - 16 Oct 19, 5:00pm -
  • Ensuring a Safe IT Ecosystem through Integrated Cloud Security
    With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, securi…
    - 12 Sep 19, 5:00pm -
  • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security
    Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that org…
    - 29 Aug 19, 5:00pm -
  • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
    The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August…
    - 1 Aug 19, 5:00pm -
  • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases
    Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data…
    - 27 Jun 19, 5:00pm -
  • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
    CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud sec…
    - 22 May 19, 5:00pm -
  • CISO Stories: Challenges and Tips for Securing your Evolving Cloud Footprint
    Today’s CISOs face a number of challenges when it comes to securing the move into the cloud. From a lack of cyber security talent and budgetary concerns to countless number of vendors and numerous cloud applications being acquired, CISO's are under…
    - 15 May 19, 5:00pm -
  • CASB Fundamentals: How Leading Organisations Protect Sensitive Cloud Data
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organisations that need end-to-end data security, from c…
    - 7 May 19, 12:00pm -
  • Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to…
    - 17 Apr 19, 3:00am -
  • How Leading Organizations Classify and Protect Cloud Data
    Data is one of an organization's most valuable assets. Unfortunately, in today's dynamic, cloud-first world, protecting sensitive information without the right tools is incredibly difficult. However, through solutions like data discovery, data classi…
    - 21 Feb 19, 6:00pm -
  • Banking on Cloud Security: CASBs in Finance
    Adoption of public cloud applications means new PII data protection challenges for financial services firms, requiring a new approach to cybersecurity. Fortunately, others have already embarked on this journey and much can be learned from their succe…
    - 14 Feb 19, 6:00pm -
  • Top 5 Office 365 Security Challenges
    Presented by: RFA & BitglassAs a leading SaaS productivity application, Office 365 has seen tremendous adoption in financial services around the globe for its advantages over premise-based apps, including easy access, rapid deployment, and lower co…
    - 30 Jan 19, 5:00pm -
  • A Match Made in the Clouds: IDaaS and CASB
    When organizations adopt cloud apps like Office 365, Salesforce, and AWS, developing a solid strategy for identity management and data protection becomes the main security and compliance concern. In this webinar, Rich Campagna and Sophia Zheng from B…
    - 14 Nov 18, 10:00pm -
  • CASBs in the EU: How Leading Organisations Protect Cloud Data
    While public cloud apps like Office 365, AWS, and Slack increase organisational productivity and agility, they aren't without security challenges. For most enterprises, these apps typically usher in cloud-first strategies that dramatically expand the…
    - 8 Nov 18, 2:00pm -

More Security Webinars