CISO Express | A Security Professional’s Home Page

PCI Council

  • Did you know insecure remote access is one of the leading causes of data breaches?
    During this webinar PCI SSC discusses the responsibilities of a QIR and how it relates to remote access, authentication credentials and the Implementation Statement. Speakers include Elizabeth Terry​ (Community Engagement Manager), Travis Powell (D…
    - 10 Oct 19, 12:00am -
  • SSL and Early TLS Migration: Preparing for 30 June 2018 Deadline
    30 June 2018 is the deadline for disabling Secure Sockets Layer/early Transport Layer Security (SSL/early TLS) and implementing a more secure encryption protocol in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.…
    - 30 Jun 18, 12:00am -
  • How Hoteliers Can Reduce The Risk of a Data Breach
    The hospitality sector, globally, is a key target for attack – especially point-of-sale (POS) intrusions. That’s why the Council joined with American Hotel and Lodging Association (AHLA) to share best practices on securing payment data in this sp…
    - 15 Jun 16, 12:00am -

Security Forum

Cloud Security Alliance

  • newHow Can We Grow the Pool of Cloud Security Professionals
    Panel Discussion Given that many countries have been suffering from a dire shortage of IT professionals for many years and the demand for IT professionals has continued unabated. The panel hopes to address the challenge of having enough cybersecuri…
    - 42 days ago 27 May 21, 9:00am -
  • newSecuring the Cloud via CCSK
    As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of expertise and provides an individual with the foundati…
    - 42 days ago 27 May 21, 8:15am -
  • newBest Practices in Implementing Secure Microservices Architecture
    Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development approaches such as Development Operations. Security needs to be embedded into these software deve…
    - 42 days ago 27 May 21, 7:30am -
  • newPiece of Mind with Cloud Native Security Guidance
    A new Guidance for Cloud Native Security was approved by the Singapore Information Technology Standards Committee in 2020. This speaker will provide an analysis on the strengths and weaknesses of the said technical reference. He will make a compariso…
    - 42 days ago 27 May 21, 6:45am -
  • newReflective Security & DevSecOps
    The CSA DevSecOps working group has published a number of papers including Reflexive Security, DevSecOps, and associated best practices. This talk briefly describes these topics, with an explanation of the principles and benefits of the novel managem…
    - 42 days ago 27 May 21, 6:00am -
  • newCloud Security Architecture
    -
    - 42 days ago 27 May 21, 5:00am -
  • newSDP & ‘Black-Cloud’ Protection
    Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working from anywhere they want. The rapid increase in global I…
    - 42 days ago 27 May 21, 4:15am -
  • newIntroduction, Welcome Remarks & Opening Keynote
    Introduction​Dr. Hing-Yan LEE (EVP APAC, CSA) Welcome Remarks (in English & Vietnamese) ​Son HO (Chairman, CSA Vietnam Chapter) ​​​Opening Address Jim REAVIS (CEO & Co-Founder, CSA)
    - 42 days ago 27 May 21, 2:00am -
  • newHealthcare’s Cloud Migration: 7 Emerging Data Security Risks
    Seeking flexibility, scalability, and cost-savings, an increasing number of healthcare organizations aremoving systems and data to the Cloud. Fueled by increased adoption of telemedicine and wearablemedical devices sparked by the pandemic and conti…
    - 21 days ago 6 May 21, 4:00pm -
  • newBest Practices for Accelerating Security Development in the Product Lifecycle
    If you are part of a security organization and noticing the constant resource competing with product feature development, you may have wondered how to further accelerate security work assigned to product teams. How can security best integrate with fe…
    - 14 days ago 29 Apr 21, 4:00pm -
  • newApplying Zero-Trust Security to Cloud Workload Protection
    As attacks on software supply chains and critical applications not only continue but accelerate, we need to extend a next-generation zero-trust model into cloud workloads during runtime. To understand why runtime remains a choice target for threat ac…
    - 12 days ago 27 Apr 21, 5:00pm -
  • newWhy the Cloud Needs Network Detection and Response
    If cloud environments are locked down by default and everything is already being logged, is cloud network traffic analysis really helpful? It turns out that even in the cloud, network telemetry data can ensure investigations are fast and hunts are co…
    - 5 days ago 20 Apr 21, 5:00pm -
  • newZero Trust: From Theory to Reality
    EMEA Summit 2021 - NTT Data presentation
    - 53 mins ago 15 Apr 21, 11:09am -
  • newHow to Secure Clouds Without Borders – Hear from a CSO
    In this fireside chat, we hear from Greg Day, chief security officer for EMEA, who takes us through newcomers into public cloud as well as real-world transitions to put security into existing deployments. Talking across contracts and data sovereignty…
    - 2 hours ago 15 Apr 21, 9:59am -
  • newBuilding an Open Cloud Platform
    Enterprise IT environments are getting exponentially more complex with the booming adoption of cloud computing. To attain seamless security and compliance, the key is to shift to open cloud platforms that interoperate with each other.This new model…
    - 2 hours ago 15 Apr 21, 9:40am -
  • State of Cloud 2021: A CSA Survey Report
    In the wake of the COVID-19 public health crisis, many enterprises' digital transformations are on an accelerated track to enable employees to work from home. CSA developed and distributed a survey to better understand the current cloud security conc…
    - 2 days ago 13 Apr 21, 5:00pm -
  • Cloud Control Matrix V4: Updated Security Guidance for the Cloud
    Since its debut in 2013, the Cloud Control Matrix (CCM) v3.0.1 has become the most comprehensive and globally adopted security framework for assessing security risk of cloud providers. With the emergence of new technologies and the evolution of the c…
    - 9 days ago 6 Apr 21, 8:00pm -
  • Security Meets Privacy on the Cloud - A Better Understanding
    Panel Discussion Security and privacy are twins when it comes to providing tools to secure the users' data. However, they are un-identical twins; they are different. Security relates to the protection of data from threats, such as hackers, while pr…
    - 15 days ago 31 Mar 21, 8:30am -
  • How privacy & security professionals can cooperate to achieve compliance
    How privacy & security professionals can cooperate to achieve better compliance with laws & standards, reduce risks & costs to their organization The pandemic has caused drastic changes in the way in which most entities operate. In this new ecosyst…
    - 15 days ago 31 Mar 21, 7:45am -
  • An In-depth Look at the Obligations Arising from Data Breaches
    The presentation will look at obligations and desired responses arising from data breaches.
    - 15 days ago 31 Mar 21, 7:00am -
  • The Promise and Pitfalls of Committing to Cloud
    Securing Authorization and Architecture Off-PremiseWith accelerated cloud adoption particularly during the COVID-19 pandemic, cloud has become a life-line to numerous organizations for sustaining their operations working from home, but yet it also…
    - 15 days ago 31 Mar 21, 6:15am -
  • Blockchain is here to Stay and Being Attacked - How we fix it?
    Blockchains are here to stay, and they’re being attacked. Why? Because that’s where the money is, literally (have you seen the price of Ethereum lately?). Combine this with Turing complete smart-contracts (often with security flaws) and it become…
    - 15 days ago 31 Mar 21, 5:30am -
  • Cloud Security in the Age of Hybrid Clouds
    Panel Discussion Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so pervasive and popular. This panel of experts will end…
    - 15 days ago 31 Mar 21, 4:15am -
  • Embracing ICS with Cloud Computing Necessitate Clarity of Vision
    Understanding the trends, security concerns and state of Industrial Control Systems (ICS) cloud helps pave the way. ICS with access to the cloud via web-enabled services are where IT and OT (Operational Technology) converge resulting in an integrated…
    - 15 days ago 31 Mar 21, 3:30am -
  • Mitigation Measures for Risks,Threats & Vulnerabilities in Hybrid Cloud
    Hybrid clouds are often the starting point for organizations in their cloud journey. However, any cloud model consists of risks, threats, and vulnerabilities. Earlier this year, the Hybrid Cloud Security Working Group examined hybrid cloud model risk…
    - 15 days ago 31 Mar 21, 2:45am -
  • Hybrid Cloud and Its Associated Risks
    As businesses are developing rapidly, many cloud consumers find that a single public/private cloud or traditional on-premises data center is no longer able to meet service requirements. Organizations are increasingly choosing hybrid cloud environment…
    - 15 days ago 31 Mar 21, 2:00am -
  • Cloud First World: IT Responsibilities & Expectations
    Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) ​Opening Address - 2021 The Cloudzilla Era of CybersecurityJim REAVIS (CEO & Co-Founder, CSA)Keynote - Cloud First World: IT Responsibilities & Expectations Ashish K ADHIKARI (Lead – Cust…
    - 15 days ago 31 Mar 21, 1:00am -
  • How to Achieve Effective Cloud Security
    Cloud security is on everyone’s mind, from CEOs and CISOs to admins and endusers. As a result, cloud security spend has increased exponentially in recent years, yet companies still struggle to effectively and efficiently secure their cloud environm…
    - 16 days ago 30 Mar 21, 5:00pm -
  • Leveraging Compliance Automation for Our Cloud-First World
    Attendees of this presentation will gain insight into:- What is driving change and how will it play out?- What are the implications for security, compliance, and audits?- What is the right level of automation to increase efficiency but not incu…
    - 21 days ago 25 Mar 21, 4:00pm -
  • Utilizing Inherent Risk for More Efficient Vendor Management​
    The risks and importance of your third parties vary drastically. To build an efficient third-party risk management (TPRM) program, its critical to prioritize which vendors and suppliers present the most risk, as well as which ones are essential to yo…
    - 30 days ago 16 Mar 21, 5:00pm -
  • Taking a Disciplined and Rigorous Approach to Managing IT Risks
    Organizations today are operating in a “risk-volatile” business landscape. Technology adoption is accelerating and so is reliance on third parties. COVID-19 disrupted operating models of organizations like no other; the shift to mass remote work…
    - 35 days ago 11 Mar 21, 5:00pm -
  • SolarWinds is the Tip of an Iceberg: Securing Office 365 Connected Clouds
    The biggest takeaway from the SolarWinds attacks shouldn’t be that it may have employed over1000 hackers, or that its full implications won’t be known for many months - it is that thistargeted compromise of Microsoft Office 365 is relevant to s…
    - 37 days ago 9 Mar 21, 6:00pm -
  • The Great Cloud Dispersion
    The breakneck adoption of cloud and edge computing – be it public, private, or hybrid – continues at a rapid pace, and the COVID-19 pandemic has only accelerated this existing trend. However, securing the dispersion of your infrastructure and da…
    - 42 days ago 4 Mar 21, 5:00pm -
  • AI is Coming to Every Data Center
    AI can enable organizations to improve, innovate, and accelerate their business. AI/ML and data science solutions are being implemented across all industries, including Government. From supply chain to customer experience, there is enormous potential…
    - 44 days ago 2 Mar 21, 6:00pm -
  • How Shutterstock Implemented DevSecOps from the Ground Up
    Modern security tools are easy to buy; it’s people’s mindsets and culture that are hard to change. Shutterstock’s AppSec team knew this when implementing a DevSecOps strategy throughout their organization. Its global digital media platform is b…
    - 49 days ago 25 Feb 21, 4:30pm -
  • The Emerging Threat of Digital Risk and Brand Exploitation
    Digital transformation and the reimagining of business processes, employees' working virtually, and online customer engagement all have two things in common, the Web and the dependence on trust. Cybercriminals have noticed this dependency and have in…
    - 51 days ago 23 Feb 21, 6:00pm -
  • Cloud Security: Are You Doing It Wrong?
    Your attack surface is expanding from the on-prem data center to the cloud to remote deployments and the device edge. But your tools only secure the perimeter or rely on logs and agents, you’re leaving visibility gaps that adversaries can use to at…
    - 56 days ago 18 Feb 21, 6:00pm -
  • CSA's Research Roadmap
    In the first half of 2021, CSA Research continues to provide insight and guidance into an organization's journey with the cloud through a three-pronged approach of Enhance, Innovate, or Transition. Projects from the CSA Research suite includes; DevSe…
    - 57 days ago 17 Feb 21, 7:30pm -
  • Fixing Broken Authentication: One of the most critical web application security
    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broke…
    - 57 days ago 17 Feb 21, 6:00pm -
  • CSA's Open Source Frameworks
    Learn about CSA’s open-source tools and frameworks you can use to improve cloud security within your organization. During this session you will be introduced to the following frameworks from CSA including: Enterprise Architecture: creates a common…
    - 62 days ago 12 Feb 21, 6:45pm -
  • Securing the Cloud-Centric Enterprise
    2020 was a seminal year in catalyzing cloud adoption to enable organizations to sustain operations in the face of the pandemic and accelerating digital transformation. Our experts will discuss the critical best practices to protect cloud assets, secu…
    - 62 days ago 12 Feb 21, 6:00pm -
  • Secure Cloud Migration
    Traditional IT security is simply not flexible or scalable enough to extend and integrate into the many Cloud Services available today, whether server-based or server-less, for data discovery and classification, ingestion, and visualization. To effec…
    - 64 days ago 10 Feb 21, 7:30pm -
  • Zero Trust Identity Protection to enable the adaptive workforce
    Cloud and the remote workforce have redefined the security perimeter. Zero trust is theframework that we need to leverage to secure the new paradigm, and identity must serve as thecontrol plane. As part of the digital transformation, businesses mus…
    - 64 days ago 10 Feb 21, 7:00pm -
  • The SOC of the Future - E pluribus unum
    As security and IT teams support the disparate tools, resources and infrastructure required to enable organizations to securely move to the cloud, innovate, compete and grow, they face the challenge of establishing centralized visibility, detection a…
    - 64 days ago 10 Feb 21, 6:30pm -
  • Fixing Broken Authentication: How to Address This Critical Security Risk
    Authentication is a mission-critical component of most applications, making it a prime target for attackers. Improperly implemented authentication, also known as broken authentication, is a widespread problem. According to the Open Web Application Se…
    - 65 days ago 9 Feb 21, 6:00pm -
  • Identifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore
    For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward. Third-party risk comes loaded with complexities and compromis…
    - 66 days ago 8 Feb 21, 7:30pm -
  • Looking Past the Pandemic: Future Proofing
    People will create more than 175 Zettabytes of data by 2025. While this abundance of data fuels machine learning, artificial intelligence, and automation, this abundance also presents risks to our security, our economies, and fundamental right to pri…
    - 66 days ago 8 Feb 21, 7:00pm -
  • Evolving the Common Controls Framework (CCF)
    Adobe developed its Common Controls Framework (CCF), now open sourced and in its fourth generation, to help unify and accelerate our compliance efforts – while offering the flexibility necessary to adapt to new regulations and standards as well as…
    - 66 days ago 8 Feb 21, 6:30pm -
  • Navigating a post-compromise reality
    Every organization gets compromised - it's how fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise…
    - 66 days ago 8 Feb 21, 6:00pm -
  • Rethink Your Firewall Strategy in Your Hybrid Cloud Environments
    Are they really the right security solution in the cloud?The world is shifting away from building (fire)walls in the cloud. A workload-centric approach to security is strongly being adopted in cloud environments and microperemiters led by software…
    - 77 days ago 28 Jan 21, 5:00pm -
  • The Fastest Growing Threat Vector: How Attackers Compromise O365 and the Cloud
    Account takeover in Office 365 has become the largest security threat vector in the cloud. Connections to the recent SolarWinds and FireEye breaches have ties to exploits in Microsoft Office 365.In this webinar, we’ll navigate through uncharted…
    - 79 days ago 26 Jan 21, 6:00pm -
  • Combating the Evolving Threat Landscape with AI Monitoring
    IT Security, Cybersecurity, Privacy and Data Management issues are ranked as top challenges facing organizations today. The digital transformation has greatly impacted the way businesses track, measure and analyze risk across domains. While organizat…
    - 86 days ago 19 Jan 21, 6:00pm -
  • Five Lean Principles of Collaboration for Enhanced Product Security
    Engage early, engage often. Continuously delivering products with enhanced security capabilities in a cross-functional, multi-platform environment is no easy task; It takes a lot of commitment to collaborate and communicate on the part of every in…
    - 91 days ago 14 Jan 21, 5:00pm -

Bitglass (Lots of Interesting Webinars

  • newOkta + Bitglass: Workforce Identity Security Meets SASE
    Secure access and identity go hand-in-hand. Workforce identity security is now a key pillar of a modern enterprise security architecture. But with IT shifting to a world of cloud services and remote working - how does workforce identity security fit…
    - 13 days ago 28 Apr 21, 5:00pm -
  • newBitglass 2021 Insider Report: The State of Remote Work Security
    One year through the global COVID pandemic and it's obvious to most that remote working is here to stay. That has big implications for your IT security environment.VPNs and legacy security tools were tolerated when only 10-15% of the worker were re…
    - 19 hours ago 14 Apr 21, 5:00pm -
  • How to Supercharge Your Security with SD-WAN + SASE Integration
    SD-WAN is a key requirement for enabling global enterprise operations. The fact that these solutions route traffic stemming from branch sites creates numerous implications for secure access service edge (SASE) offerings which are designed to sit in t…
    - 8 days ago 7 Apr 21, 1:30am -
  • Comparing CASB Technologies: What's the Difference?
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and n…
    - 15 days ago 31 Mar 21, 5:00pm -
  • (APAC) SASE Starter Guide: What *You* Need to Know
    Gartner predicts that over 40% of companies will adopt a SASE architecture in the next several years. And yet there is no single industry standard view on what constitutes SASE, or it's practical deployment. Direct-to-Cloud SASE security integrates…
    - 15 days ago 31 Mar 21, 1:30am -
  • Bitglass Partner Sales Forum How to Sell Next Generation CASB
    A Cloud Access Security Broker (CASB) is a policy enforcement point that delivers data and threat protection in the cloud, on any device, anywhere. Gartner predicts that CASB is the fastest growing area of IT security in 2021, offering significant op…
    - 35 days ago 11 Mar 21, 1:30am -
  • Healthcare Breaches on the Rise. How to Keep Patient Data Confidential.
    Each year Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health information (PHI). Organizations with legacy tools that are incapable…
    - 43 days ago 3 Mar 21, 6:00pm -
  • EMEA: Bitglass + CyberArk: Preventing Another SolarWinds Attack with Identity
    The recent SolarWinds attack has exposed vulnerabilities in identity and privileged access, infecting SolarWinds' Orion network management software to reach many of the targets as possible — using an attack vector that gained privileged access to 3…
    - 43 days ago 3 Mar 21, 9:30am -
  • Bitglass Partner Sales Forum An Introduction to SmartEdge Secure Web Gateway
    Bitglass SmartEdge Secure Web Gateway delivers the flexibility and low management overhead of a 100% cloud solution and eliminates latency for almost all traffic. SmartEdge is designed to be 100% cloud in combination with a smart endpoint agent. With…
    - 56 days ago 18 Feb 21, 1:30am -
  • Why Web Security is Leading a SASE Revolution
    Join this exclusive webinar session with Bitglass cloud experts to learn:· The drawbacks of traditional appliance and cloud-proxy secure web gateways.· How on-device SWGs deliver enhanced performance and provide more than 50% cost savings over…
    - 57 days ago 17 Feb 21, 1:30am -
  • Securely Connect Users to Cloud Apps with SASE
    During this live educational session with demo, hear more about: How SASE works and the problems solvedReal world public sector success storiesFedRAMP, licensing, deployment & maintenancePartnering for successProven procurement pathways
    - 63 days ago 11 Feb 21, 6:00pm -
  • Top Tips for Securing Remote Workers with Zero-Trust Network Access
    There’s a lot of noise in the cybersecurity industry around zero-trust and remote working. With the constant evolution of cybercrime, remote workers are targeted daily with phishing scams, ransomware attacks and remote access trojans, among many, m…
    - 64 days ago 10 Feb 21, 1:30am -
  • An Introduction to Selling Secure Access Service Edge (SASE)
    Join this exclusive partner sales webinar with Bitglass. We’ll cover:- An introduction to the Bitglass SASE portfolio- The basics customer value propositions for SASE- Key product areas that make up the SASE solution a. SmartEdge Secure Web…
    - 78 days ago 27 Jan 21, 1:30am -
  • Getting Ahead of the Next Cyber Breach
    At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DB…
    - 99 days ago 6 Jan 21, 6:00pm -
  • Bitglass Cloud Security Report 2020: Key Findings & Recommendations
    As this year comes to a close, enterprises continue to navigate remote working, increased cloud migration, bring your own device, and digital transformation. Each of these requires an integrated and robust cybersecurity posture that is capable of per…
    - 10 Dec 20, 6:00pm -
  • Bitglass + Armature Systems: Demystifying SASE
    In this webinar, we will discuss how Secure Access Service Edge (SASE) can help organizations fast track digital and cloud transformation, and answer practical questions on how organization can leverage SASE, including:- Do I need to implement every…
    - 19 Nov 20, 6:00pm -
  • Thriving in a Highly Remote, Cloud-First Environment with Bitglass
    Join this webinar to learn how to:- Swiftly deploy security for your remote workforce while preparing for a future “normal”- Secure BYO devices while enabling productivity- Ensure proper protections on the web without compromising the user exp…
    - 3 Nov 20, 6:00pm -
  • Securing SaaS with Bitglass: ServiceNow & Confluence
    ServiceNow and Confluence are commonly used software-as-a-service applications in organizations around the world. ServiceNow provides automation and efficiency for streamlining business workflows, while Confluence enables communication and collaborat…
    - 21 Oct 20, 9:00am -
  • Comparing Secure Web Gateways: Time for a Reboot at the Edge
    Join this exclusive webinar session with Bitglass cloud experts to learn:· The shortcomings of traditional appliance and cloud delivered secure web gateways;· How on-device secure web gateways provide more than 50% cost savings over traditional…
    - 20 Oct 20, 5:00pm -
  • How to Address the Top 5 CISO Priorities (EMEA)
    "Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origi…
    - 6 Oct 20, 9:00am -
  • Identity & DLP: Two Critical Pillars in Your Defense Strategy
    Identity access management and Data Loss Prevention are the two most important aspects of protecting any organization sharing data over cloud. As businesses across the globe continue to face increasing regulations and stricter compliance, data leakag…
    - 29 Sep 20, 5:00pm -
  • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
    In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
    - 24 Sep 20, 9:00am -
  • Bitglass + IBM QRadar: Reinventing SIEM for Intelligent Cloud Detection & Resp
    Join this exclusive webinar session with IBM and Bitglass to learn:• The combined integration benefits provided by Bitglass’s CASB technology and QRadar’s intelligent SIEM;• How intelligent security analytics and insight can b…
    - 16 Sep 20, 5:00pm -
  • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
    In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
    - 2 Sep 20, 5:00pm -
  • Protecting Legal Firm Data: Navigating a Cloud Security Strategy
    "IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for de…
    - 1 Sep 20, 9:00am -
  • How to Address the Top 5 CISO Priorities
    Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origin…
    - 19 Aug 20, 5:00pm -
  • (APAC) The Best of Both Worlds: CASB + IAAS (Azure)
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
    - 12 Aug 20, 1:30am -
  • (EMEA) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex
    Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based def…
    - 11 Aug 20, 9:00am -
  • The Best of Both Worlds: CASB + IAAS (Azure)
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
    - 5 Aug 20, 5:00pm -
  • Sécurité du Cloud en temps réel dans le contexte du travail à distance
    Le monde vient d'observer une augmentation importante du travail à distance à une époque où sa mise en place démarrait. À plus long terme, nous observons un environnement de travail plus complexe à sécuriser avec une augmentation des équipe…
    - 28 Jul 20, 8:00am -
  • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce
    Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools,…
    - 14 Jul 20, 5:00pm -
  • Why CASB is the New Firewall for the Cloud
    Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
    - 8 Jul 20, 2:00am -
  • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
    - 1 Jul 20, 9:00am -
  • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
    - 1 Jul 20, 1:00am -
  • Legal Firms Adopting Cloud and Mobile Working Strategies
    IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for des…
    - 23 Jun 20, 1:30am -
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
    - 2 Jun 20, 9:00am -
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC)
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
    - 2 Jun 20, 1:30am -
  • How to secure remote workers and data at access (EMEA)
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
    - 14 May 20, 9:00am -
  • Remote Worker Alert! Who Moved My VPN and Why Should I Care?
    Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote work…
    - 14 May 20, 12:00am -
  • How to secure remote workers and data at access
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
    - 13 May 20, 5:00pm -
  • A Cloud Security Checkup: CASBs in Healthcare
    Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breache…
    - 6 May 20, 5:00pm -
  • Cloud and SASE - Continued Disruption (APAC)
    SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remo…
    - 5 May 20, 12:00am -
  • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture
    In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish…
    - 8 Apr 20, 5:00pm -
  • Cloud Security Essentials – Bitglass and Zscaler
    Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security tech…
    - 25 Mar 20, 5:00pm -
  • Securing the Exploding Cloud Footprint
    With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs ca…
    - 12 Feb 20, 6:00pm -
  • SASE: Security for the Cloud & from the Cloud
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:What exactly is a SASE?How are CASB and SWG e…
    - 11 Dec 19, 11:00pm -
  • The Scoop on SASE: Converging Your Cloud Security Footprint
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:What exactly is a SASE?…
    - 4 Dec 19, 6:00pm -
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solution…
    - 16 Oct 19, 5:00pm -
  • Ensuring a Safe IT Ecosystem through Integrated Cloud Security
    With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, securi…
    - 12 Sep 19, 5:00pm -
  • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security
    Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that org…
    - 29 Aug 19, 5:00pm -
  • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
    The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August…
    - 1 Aug 19, 5:00pm -
  • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases
    Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data…
    - 27 Jun 19, 5:00pm -
  • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
    CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud sec…
    - 22 May 19, 5:00pm -

More Security Webinars