CISO Express | A Security Professional’s Home Page

PCI Council

  • Did you know insecure remote access is one of the leading causes of data breaches?
    During this webinar PCI SSC discusses the responsibilities of a QIR and how it relates to remote access, authentication credentials and the Implementation Statement. Speakers include Elizabeth Terry​ (Community Engagement Manager), Travis Powell (D…
    - 10 Oct 19, 12:00am -
  • SSL and Early TLS Migration: Preparing for 30 June 2018 Deadline
    30 June 2018 is the deadline for disabling Secure Sockets Layer/early Transport Layer Security (SSL/early TLS) and implementing a more secure encryption protocol in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.…
    - 30 Jun 18, 12:00am -
  • How Hoteliers Can Reduce The Risk of a Data Breach
    The hospitality sector, globally, is a key target for attack – especially point-of-sale (POS) intrusions. That’s why the Council joined with American Hotel and Lodging Association (AHLA) to share best practices on securing payment data in this sp…
    - 15 Jun 16, 12:00am -

Security Forum

    Cloud Security Alliance

    • newTransforming Enterprise Cloud Security to Supercharge Developer Velocity
      Security has become the rate-limiting factor for how fast software development teams can go in the cloud. Security reviews, remediations, and audits soak up valuable engineering resources and steal away the speed and agility that the cloud promises.…
      - 27 days ago 19 Nov 21, 5:00pm -
    • newStandardize Identity Security: From On-Prem to Multi-Cloud
      Modern organizations face an exponentially complex identity landscape – cloud migrations, remote work, and rapidly evolving security and compliance philosophies are creating a proliferation of identities across on-premises and multi-cloud environme…
      - 24 days ago 16 Nov 21, 5:00pm -
    • newHybrid Cloud Security: Risks & Mitigation
      Panel Discussion​Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so pervasive and popular. This panel of experts will e…
      - 18 days ago 11 Nov 21, 8:15am -
    • newMitigation Measures for Risks, Threats & Vulnerabilities in Hybrid Cloud
      Hybrid clouds are often the starting point for organizations in their cloud journey. However, any cloud model consists of risks, threats, and vulnerabilities. Earlier this year, the Hybrid Cloud Security Working Group examined hybrid cloud model risk…
      - 18 days ago 11 Nov 21, 7:30am -
    • new​Introduction to the Cloud Controls Matrix v4.0
      The presentation aims to provide a synopsis about the latest release of the Cloud Control Matrix version 4.0, a greater insight into its development and new components, the current activities of the CCM working group (ongoing works, published and fut…
      - 18 days ago 11 Nov 21, 6:45am -
    • newSecuring the Cloud via CCSK
      As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of expertise and provides an individual with the foundati…
      - 18 days ago 11 Nov 21, 6:15am -
    • newKeynote Session
      Details to be announced
      - 18 days ago 11 Nov 21, 5:30am -
    • newLet's talk about ABC: Assume Nothing, Believe Nobody, Check Everything
      Panel DiscussionFor many people, Zero Trust spells the end of an era – the end of the perimeter defence. McKinnon said: "It’s a failure of the paradigm that you can have a gate and castle wall and everything on the inside is fine".MODERATOR:…
      - 18 days ago 11 Nov 21, 4:30am -
    • newMyths and Best Practices of Security by Design
      With the new normal continuously shaping, organizations are moving rapidly to migrate to the cloud to achieve business agility and resilience. However, cloud migration and cybersecurity are efforts taken separately. Thus, a shift left approach to sec…
      - 18 days ago 11 Nov 21, 3:45am -
    • newWhy We Need to Secure the Cloud & the Enterprise
      CSA PH Summit 2021
      - 18 days ago 11 Nov 21, 3:00am -
    • newSecuring the Cloud: It All Starts with Identities
      Keynote As organizations increasingly pursue cloud or multi-cloud strategies, they face the challenge of achieving consistent security controls across each cloud platform’s distinct entitlements paradigm. Additionally, the rapid increase in the n…
      - 18 days ago 11 Nov 21, 2:15am -
    • newData Provenance and Cloud Security: Challenges & Opportunities
      Keynote At the heart of all cyber and cloud security attribution challenges is the problem of data provenance tracking and its reconstruction. In this talk, I will cover past, present and developing provenance research in computer science, and cove…
      - 18 days ago 11 Nov 21, 1:30am -
    • newWelcome Remarks, Welcome Address & Opening Address
      Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) Welcome Address Don SACAMOS (President, CSA Philippines Chapter)​Opening Address Jim REAVIS (Co-Founder & CEO, CSA)
      - 18 days ago 11 Nov 21, 1:00am -
    • newCan security and usability co-exist in a remote working environment?
      Now that we’ve settled into the rhythm of remote working, companies need to transition from the bootstrapped survival plans that were implemented back in 2020 to mature(r) remote working strategies.The early gripes of remote working such as an im…
      - 18 days ago 10 Nov 21, 6:00pm -
    • newAnatomy of a cloud breach: how to harden your cloud against attack
      Security breaches in the cloud usually don’t exploit a single misconfiguration or vulnerability but rather a toxic combination of multiple issues that in isolation wouldn’t raise a red flag given the abundance of alerts that teams get. In this we…
      - 17 days ago 9 Nov 21, 6:00pm -
    • newAutomating and Orchestrating the Top 3 Cloud Security Use Cases
      As security operations teams manage rapidly evolving and increasingly complex cloud infrastructures, there is more need than ever to reduce an organization's attack surface, increase speed and reliability by automating as many processes as possible,…
      - 16 days ago 8 Nov 21, 6:00pm -
    • newKey Considerations to Get Buy-in for a SaaS Data Security Program
      Despite increased calls to action from cloud experts, many IT leaders still believe SaaS data security is not their responsibility. A recent study by analyst firm ESG found that more than ⅓ of IT leaders rely solely on SaaS applications to protect…
      - 11 days ago 3 Nov 21, 4:00pm -
    • newAre we losing or gaining control of SaaS Data Access?
      Organizations use SaaS apps to drive business enablements across all departments and workforce. Collaboration with 3rd party vendors, customers, and partners over SaaS data is the new normal - and we just love it when things get done quickly right?…
      - 10 days ago 2 Nov 21, 4:00pm -
    • newCloud First Cryptography and Virtualization. Securing Fragmented Data.
      White & Case is an international law firm with locations that expand across 3 continents, in support of multinational and multi-global organizations. Cloudical is at the forefront of cloudification and helps organizations conceptualize, create and ut…
      - 5 days ago 28 Oct 21, 5:00pm -
    • newImpact of Digital Transformation on Security Strategy
      As companies shift their people, processes, and technologies into the digital age, cybersecurity strategy is sometimes an afterthought instead of an integrated part of planning. In fact, a recent survey of C-level executives* showed that nearly one-t…
      - 5 days ago 28 Oct 21, 5:00pm -
    • newWhat's Real & What's Possible with Self-Service and Developer Speed Governance
      Security, Cloud, Operations, and Product/Development groups are all building out their versions of the next cloud platform and governance controls. As each considers overlapping approaches including automated enforcement, shift left, and other postur…
      - 3 days ago 26 Oct 21, 5:00pm -
    • CSA Continuous Recap
      Session Details to be Announced
      - 3 days ago 20 Oct 21, 11:15pm -
    • Cloud is code... oops did I say that?
      We are all aware of the digital transformation many organizations are undergoing. What’s not being said is that basically means a rush to utilize services that organizations are not prepared to secure. This new digital frontier is not just pushing…
      - 3 days ago 20 Oct 21, 10:45pm -
    • A Conversation About Threat Modeling in Today's Cloud
      Threat modeling is an essential practice for software and systems security. Cloud threat modeling expands on standard threat modeling practices to account for unique cloud services and an application’s qualities and consideration. The CSA Threat Mo…
      - 3 days ago 20 Oct 21, 9:30pm -
    • Hiding In Plain Sight - An Untapped Path to Cloud Security
      All major cloud providers now offer a native vulnerability scanning service to help their customers identify potential cloud security issues. But is your team taking full advantage of these tools, and how are you using scan data to drive remediation…
      - 3 days ago 20 Oct 21, 9:00pm -
    • The Techonomic Cold War
      We are entering a prolonged phase of state interventionism which will blur the lines between government and business and give rise to new risks.What lies ahead is a “future of war” in which war is constantly being waged by state and non-state a…
      - 3 days ago 20 Oct 21, 8:30pm -
    • Catching Cloud Misconfigurations in Code Before They Manifest as Security Risks
      A recent study suggests that misconfiguration is the number one risk to cloud environments in 2021. With infrastructure-as-code (IaC), we have the opportunity to catch security issues within the CI/CD before they manifest themselves in the cloud. In…
      - 3 days ago 20 Oct 21, 7:45pm -
    • Managing and Measuring Risk on the Cloud
      A recent CSA study evaluated over 600 security professionals and 25 enterprise security executives to better understand the challenges and effectiveness of current risk management practices towards the public cloud. This report shares the top benefit…
      - 3 days ago 20 Oct 21, 7:15pm -
    • Psychology of the Phish: Leveraging the Seven Principles of Influence
      According to the X-Force Threat Intelligence Index 2020, produced by IBM X-Force Incident Response and Intelligence Services, phishing is still the number one attack vector in use today. Security professionals often overlook the "social" aspect of "s…
      - 3 days ago 20 Oct 21, 6:15pm -
    • CxO Panel Discussion: Lessons Learned from our Journey to the Cloud
      Moving to the cloud is a big decision and encompasses areas including scope, risk, cost and many others. The benefits of a successful migration can be significant, but there is risk to any large project that must be managed. In this fireside chat we…
      - 3 days ago 20 Oct 21, 5:30pm -
    • Ransomware Prevention with a Zero Trust Architecture
      The evolving threat landscape requires a different approach to defeating ransomware. Cybercriminals are getting bolder and more sophisticated, and no industry is off-limits. It's time to rebalance the equation in favor of enterprise defenders, with a…
      - 3 days ago 20 Oct 21, 5:00pm -
    • The Impact of Cloud on the Landscape of Rapid Change
      The advent of cloud has transformed from what was once just a buzzword several years ago, into the fundamental way that the IT organizations of today and tomorrow are supporting the business objectives and critical operations of the entire organizati…
      - 3 days ago 20 Oct 21, 4:00pm -
    • North America Welcome Address
      Session Details to be Announced
      - 3 days ago 20 Oct 21, 3:30pm -
    • International Data Transfers and the new Standard Contractual Clauses
      Regulation (EU) 2016/679 – the General Data Protection Regulation, or GDPR – creates a need for organisations seeking to transfer personal data from within the EEA to third countries to implement safeguards which are appropriate to ensure the pro…
      - 3 days ago 20 Oct 21, 2:00pm -
    • The Implementation Guidelines for the Cloud Controls Matrix v4
      The Cloud Security Alliance has published the Implementation Guidelines for the Cloud Controls Matrix version 4. The CCMv4 Implementation Guidelines are tailored to the security and privacy control specifications of the 17 cloud security domains of t…
      - 3 days ago 20 Oct 21, 1:30pm -
    • Understanding Supply Chain Attacks
      Even though supply chain attacks have been a cybersecurity concern for many years, there has been a big rise in their number and sophistication in 2020. This trend is continuing in 2021, posing an increasing risk for organizations. Due to the more ro…
      - 4 days ago 20 Oct 21, 1:00pm -
    • The Continuous Audit Metrics Catalog
      Cloud providers can take full advantage of continuous auditing once standards and best practices for automated assurance tooling exist. We have translated a subset of CCMv4 controls into quantitative characteristics of the cloud service in the form o…
      - 4 days ago 20 Oct 21, 12:30pm -
    • Practical Preparations for the Post-Quantum World
      Cryptographically significant quantum computers, computers that can break traditional asymmetric cryptography and significantly weaken popular symmetric encryption, will likely appear in the near-term future. If you have digitally stored and/or trans…
      - 4 days ago 20 Oct 21, 11:30am -
    • CCM “Granular Add-on” & CCM “Concentrated”: Enhancing Cloud Controls Compliance
      CCMv4 is a broadly adopted and recognized instrument to assess and certify compliance with a globally standardised set of controls. The European User Group Entreprise & Cloud Data Protection (EuUG) which is joining the Cloud Security Alliance (CSA) a…
      - 4 days ago 20 Oct 21, 9:30am -
    • Zero-Trust: From Buzzword-land to Wake-up-and-do-your-homework
      Zero Trust (ZT), a rather simple and powerful approach to cybersecurity, is built on the idea of "trust no one and always verify". Since its inception over 10 years ago, the ZT concept has evolved and matured, and, under the impulse of some recent se…
      - 4 days ago 20 Oct 21, 9:00am -
    • Securing Public Cloud Usage by Default
      As more and more of us migrate their business to the cloud, nothing is more important than safeguarding that infrastructure, especially with the steadily increasing number of threats. For example, one recent study notes that hackers attack every 39 s…
      - 4 days ago 20 Oct 21, 8:30am -
    • Evolving Ransomware Landscape
      Session Details to be Announced
      - 4 days ago 20 Oct 21, 8:00am -
    • EMEA Welcome Address
      Session Details to be Announced
      - 4 days ago 20 Oct 21, 7:30am -
    • Panel Discussion: Perspectives on Cloud Usage as a CII
      When you think of national critical infrastructure, electricity distribution grids, transportation networks, banking systems, bridges, power plants, water filtration plants, airports, etc. come to mind. What about the clouds? With billions of people…
      - 4 days ago 20 Oct 21, 7:15am -
    • Secure Connection Requirements of Hybrid Cloud
      Hybrid cloud environments provide enterprises with diverse resources to run different workloads depending on the Cloud Service Customer (CSC) needs. On one hand, enterprises can quickly use innovative services, deploy Internet applications, and provi…
      - 4 days ago 20 Oct 21, 6:30am -
    • Understanding Cloud Computing Standards
      Many cloud service users are aware of some of the international Cloud Computing standards, such as: ISO/IEC 17788:2014 Information technology — Cloud computing — Overview and vocabulary, which is referenced in the CSA’s own Security Guidance fo…
      - 4 days ago 20 Oct 21, 5:45am -
    • Risks and Opportunities in Data Governance and Data Management
      As countries and organisations grow in cloud technology maturity, there is an increasing need to understand and map out the nuances of data governance and data management, such as the need for data classification mechanisms, and the requirement to up…
      - 4 days ago 20 Oct 21, 5:00am -
    • Future Standards will be Functional
      Standards today are published in document formats do not lend well to machine readability or automated compliance. In this session, we present a revolution of the understanding of standards - process and data requirements in standards can actually be…
      - 4 days ago 20 Oct 21, 4:15am -
    • Towards a Better Level of Protection of Personal Data
      Against the backdrop of the growing importance of Data Protection and Cybersecurity in the New Normal, many countries in Asia have existing laws for personal data protection, but is enough being done? Harmonisation of laws could pave the way for bett…
      - 4 days ago 20 Oct 21, 3:30am -
    • The Power of AND
      Accelerating cloud adoption for Enterprise and achieving security compliance, cloud assets protection, automation and continuous operations.We live in a connected world with an increasing pace and frequency of disruption. COVID 19 pandemic was a co…
      - 4 days ago 20 Oct 21, 2:45am -
    • Are We Having Second Thoughts of Migrating to Cloud?
      ​This session will discuss about the challenges which are still existing in migration and how to overcome it.
      - 4 days ago 20 Oct 21, 2:00am -
    • Welcome Address & Data Provenance and Cloud Security:Challenges & Opportunities
      Opening Address ​​Jim REAVIS (CEO & Co-Founder, CSA)Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) Data Provenance and Cloud Security: Challenges & OpportunitiesProf. Ryan KO (Chair & Director, UQ Cyber Security, University of Queensla…
      - 4 days ago 20 Oct 21, 1:00am -
    • Cloud Imposter: Using SSO to Stage a SaaS Invasion
      Cyber Attack Workshop:Watch our attacker perform a sneaky spear-phishing attack to take over an admin’s account and impersonate high-profile users with a built-in SSO feature.Our imposter will steal hundreds of sensitive HR docs from the company…
      - 4 days ago 19 Oct 21, 5:00pm -

    Bitglass (Lots of Interesting Webinars

    • Bitglass Product Vision & the Road to SASE
      While SASE lays out the paradigm for converging network security functions to meet the secure access needs of organizations, there is flexibility in execution and the approach to optimize each component of the architecture.Hear about Bitglass’ pr…
      - 12 May 21, 5:00pm -
    • Quarterly Product Features & Updates
      The Bitglass Quarterly Feature Update is a quarterly webinar highlighting the latest and greatest features Bitglass has introduced over the past 3-4 months. As a technology innovator in Secure Access Service Edge (SASE) and a leader in Gartner's Magi…
      - 29 Apr 21, 5:00pm -
    • Okta + Bitglass: Workforce Identity Security Meets SASE
      Secure access and identity go hand-in-hand. Workforce identity security is now a key pillar of a modern enterprise security architecture. But with IT shifting to a world of cloud services and remote working - how does workforce identity security fit…
      - 28 Apr 21, 5:00pm -
    • Bitglass 2021 Insider Report: The State of Remote Work Security
      One year through the global COVID pandemic and it's obvious to most that remote working is here to stay. That has big implications for your IT security environment.VPNs and legacy security tools were tolerated when only 10-15% of the worker were re…
      - 14 Apr 21, 5:00pm -
    • How to Supercharge Your Security with SD-WAN + SASE Integration
      SD-WAN is a key requirement for enabling global enterprise operations. The fact that these solutions route traffic stemming from branch sites creates numerous implications for secure access service edge (SASE) offerings which are designed to sit in t…
      - 7 Apr 21, 1:30am -
    • Comparing CASB Technologies: What's the Difference?
      Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and n…
      - 31 Mar 21, 5:00pm -
    • (APAC) SASE Starter Guide: What *You* Need to Know
      Gartner predicts that over 40% of companies will adopt a SASE architecture in the next several years. And yet there is no single industry standard view on what constitutes SASE, or it's practical deployment. Direct-to-Cloud SASE security integrates…
      - 31 Mar 21, 1:30am -
    • Healthcare Breaches on the Rise. How to Keep Patient Data Confidential.
      Each year Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health information (PHI). Organizations with legacy tools that are incapable…
      - 3 Mar 21, 6:00pm -
    • EMEA: Bitglass + CyberArk: Preventing Another SolarWinds Attack with Identity
      The recent SolarWinds attack has exposed vulnerabilities in identity and privileged access, infecting SolarWinds' Orion network management software to reach many of the targets as possible — using an attack vector that gained privileged access to 3…
      - 3 Mar 21, 9:30am -
    • Why Web Security is Leading a SASE Revolution
      Join this exclusive webinar session with Bitglass cloud experts to learn:· The drawbacks of traditional appliance and cloud-proxy secure web gateways.· How on-device SWGs deliver enhanced performance and provide more than 50% cost savings over…
      - 17 Feb 21, 1:30am -
    • Securely Connect Users to Cloud Apps with SASE
      During this live educational session with demo, hear more about: How SASE works and the problems solvedReal world public sector success storiesFedRAMP, licensing, deployment & maintenancePartnering for successProven procurement pathways
      - 11 Feb 21, 6:00pm -
    • Top Tips for Securing Remote Workers with Zero-Trust Network Access
      There’s a lot of noise in the cybersecurity industry around zero-trust and remote working. With the constant evolution of cybercrime, remote workers are targeted daily with phishing scams, ransomware attacks and remote access trojans, among many, m…
      - 10 Feb 21, 1:30am -
    • Getting Ahead of the Next Cyber Breach
      At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DB…
      - 6 Jan 21, 6:00pm -
    • Bitglass Cloud Security Report 2020: Key Findings & Recommendations
      As this year comes to a close, enterprises continue to navigate remote working, increased cloud migration, bring your own device, and digital transformation. Each of these requires an integrated and robust cybersecurity posture that is capable of per…
      - 10 Dec 20, 6:00pm -
    • Bitglass + Armature Systems: Demystifying SASE
      In this webinar, we will discuss how Secure Access Service Edge (SASE) can help organizations fast track digital and cloud transformation, and answer practical questions on how organization can leverage SASE, including:- Do I need to implement every…
      - 19 Nov 20, 6:00pm -
    • Thriving in a Highly Remote, Cloud-First Environment with Bitglass
      Join this webinar to learn how to:- Swiftly deploy security for your remote workforce while preparing for a future “normal”- Secure BYO devices while enabling productivity- Ensure proper protections on the web without compromising the user exp…
      - 3 Nov 20, 6:00pm -
    • Securing SaaS with Bitglass: ServiceNow & Confluence
      ServiceNow and Confluence are commonly used software-as-a-service applications in organizations around the world. ServiceNow provides automation and efficiency for streamlining business workflows, while Confluence enables communication and collaborat…
      - 21 Oct 20, 9:00am -
    • Comparing Secure Web Gateways: Time for a Reboot at the Edge
      Join this exclusive webinar session with Bitglass cloud experts to learn:· The shortcomings of traditional appliance and cloud delivered secure web gateways;· How on-device secure web gateways provide more than 50% cost savings over traditional…
      - 20 Oct 20, 5:00pm -
    • How to Address the Top 5 CISO Priorities (EMEA)
      "Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origi…
      - 6 Oct 20, 9:00am -
    • Identity & DLP: Two Critical Pillars in Your Defense Strategy
      Identity access management and Data Loss Prevention are the two most important aspects of protecting any organization sharing data over cloud. As businesses across the globe continue to face increasing regulations and stricter compliance, data leakag…
      - 29 Sep 20, 5:00pm -
    • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
      In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
      - 24 Sep 20, 9:00am -
    • Bitglass + IBM QRadar: Reinventing SIEM for Intelligent Cloud Detection & Resp
      Join this exclusive webinar session with IBM and Bitglass to learn:• The combined integration benefits provided by Bitglass’s CASB technology and QRadar’s intelligent SIEM;• How intelligent security analytics and insight can b…
      - 16 Sep 20, 5:00pm -
    • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
      In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
      - 2 Sep 20, 5:00pm -
    • Protecting Legal Firm Data: Navigating a Cloud Security Strategy
      "IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for de…
      - 1 Sep 20, 9:00am -
    • How to Address the Top 5 CISO Priorities
      Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origin…
      - 19 Aug 20, 5:00pm -
    • (APAC) The Best of Both Worlds: CASB + IAAS (Azure)
      Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
      - 12 Aug 20, 1:30am -
    • (EMEA) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex
      Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based def…
      - 11 Aug 20, 9:00am -
    • The Best of Both Worlds: CASB + IAAS (Azure)
      Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
      - 5 Aug 20, 5:00pm -
    • Sécurité du Cloud en temps réel dans le contexte du travail à distance
      Le monde vient d'observer une augmentation importante du travail à distance à une époque où sa mise en place démarrait. À plus long terme, nous observons un environnement de travail plus complexe à sécuriser avec une augmentation des équipe…
      - 28 Jul 20, 8:00am -
    • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce
      Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools,…
      - 14 Jul 20, 5:00pm -
    • Why CASB is the New Firewall for the Cloud
      Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
      - 8 Jul 20, 2:00am -
    • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB
      Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
      - 1 Jul 20, 9:00am -
    • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB
      Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
      - 1 Jul 20, 1:00am -
    • Legal Firms Adopting Cloud and Mobile Working Strategies
      IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for des…
      - 23 Jun 20, 1:30am -
    • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
      Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
      - 2 Jun 20, 9:00am -
    • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC)
      Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
      - 2 Jun 20, 1:30am -
    • How to secure remote workers and data at access (EMEA)
      The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
      - 14 May 20, 9:00am -
    • Remote Worker Alert! Who Moved My VPN and Why Should I Care?
      Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote work…
      - 14 May 20, 12:00am -
    • How to secure remote workers and data at access
      The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
      - 13 May 20, 5:00pm -
    • A Cloud Security Checkup: CASBs in Healthcare
      Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breache…
      - 6 May 20, 5:00pm -
    • Cloud and SASE - Continued Disruption (APAC)
      SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remo…
      - 5 May 20, 12:00am -
    • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture
      In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish…
      - 8 Apr 20, 5:00pm -
    • Cloud Security Essentials – Bitglass and Zscaler
      Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security tech…
      - 25 Mar 20, 5:00pm -
    • Securing the Exploding Cloud Footprint
      With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs ca…
      - 12 Feb 20, 6:00pm -
    • SASE: Security for the Cloud & from the Cloud
      What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:What exactly is a SASE?How are CASB and SWG e…
      - 11 Dec 19, 11:00pm -
    • The Scoop on SASE: Converging Your Cloud Security Footprint
      What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:What exactly is a SASE?…
      - 4 Dec 19, 6:00pm -
    • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
      Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solution…
      - 16 Oct 19, 5:00pm -
    • Ensuring a Safe IT Ecosystem through Integrated Cloud Security
      With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, securi…
      - 12 Sep 19, 5:00pm -
    • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security
      Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that org…
      - 29 Aug 19, 5:00pm -
    • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
      The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August…
      - 1 Aug 19, 5:00pm -
    • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases
      Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data…
      - 27 Jun 19, 5:00pm -
    • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
      CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud sec…
      - 22 May 19, 5:00pm -
    • CISO Stories: Challenges and Tips for Securing your Evolving Cloud Footprint
      Today’s CISOs face a number of challenges when it comes to securing the move into the cloud. From a lack of cyber security talent and budgetary concerns to countless number of vendors and numerous cloud applications being acquired, CISO's are under…
      - 15 May 19, 5:00pm -

    More Security Webinars