CISO Express | A Security Professional’s Home Page

PCI Council

  • Did you know insecure remote access is one of the leading causes of data breaches?
    During this webinar PCI SSC discusses the responsibilities of a QIR and how it relates to remote access, authentication credentials and the Implementation Statement. Speakers include Elizabeth Terry​ (Community Engagement Manager), Travis Powell (D…
    - 10 Oct 19, 12:00am -
  • SSL and Early TLS Migration: Preparing for 30 June 2018 Deadline
    30 June 2018 is the deadline for disabling Secure Sockets Layer/early Transport Layer Security (SSL/early TLS) and implementing a more secure encryption protocol in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.…
    - 30 Jun 18, 12:00am -
  • How Hoteliers Can Reduce The Risk of a Data Breach
    The hospitality sector, globally, is a key target for attack – especially point-of-sale (POS) intrusions. That’s why the Council joined with American Hotel and Lodging Association (AHLA) to share best practices on securing payment data in this sp…
    - 15 Jun 16, 12:00am -

Security Forum

Cloud Security Alliance

  • newThe Underrated Link Between Malicious Code & Cloud Security
    In order for an adversary to conduct a successful cyber attack and inflict any kind of damage, they must run malicious code or commands on a victim’s machine. This fact also holds true in the world of modern cloud infrastructure, which usually comp…
    - 1 day ago 18 Feb 20, 6:00pm -
  • Re-thinking vulnerability management in the era of Hybrid IT & DevOps
    The digital transformation through Hybrid IT and DevOps has fundamentally changed how organizations operate – with major security implications. How do companies detect and manage vulnerabilities when the enterprise network constantly evolves, and c…
    - 4 days ago 13 Feb 20, 6:00pm -
  • Zero Trust and the Flaming Sword of Justice
    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues…
    - 6 days ago 11 Feb 20, 6:00pm -
  • Rethinking DLP as You Move to the Cloud
    Whether it’s financial, bank or credit card data, customer or patient information, or intellectual property, the goal of cybersecurity is to protect sensitive data and prevent unwanted access or theft. Legacy DLP solutions often fall short of that…
    - 18 days ago 30 Jan 20, 6:00pm -
  • How NDR Powers Event-Driven Security in the Cloud
    For public cloud customers, event-driven security isn’t just practical—it’s expected. Although organizations still rely on perimeter-focused technologies, they’re moving away from a strictly protect-and-prevent mindset to one that includes de…
    - 20 days ago 28 Jan 20, 6:00pm -
  • Anatomy of a Cloud Data Breach
    Cloud adoption is exploding with nearly 1,300 cloud apps in use in an average enterprise. From suites like Office 365 to collaboration tools like Slack, the cloud has enabled new levels of productivity resulting in enterprises gaining strategic advan…
    - 25 days ago 23 Jan 20, 6:00pm -
  • A Strategic Approach to IoT Security Best Practices and Standards
    The market for IoT products continues to expand, with increased quantities of devices being integrated into consumer and business networks.  These products are turning into always-on services that incorporate cloud connectivity and expose many point…
    - 32 days ago 16 Jan 20, 5:00pm -
  • Getting Real: Sorting What’s ZT and What’s Just BS
    The buzz around zero-trust security has grown to a roar, but how do you pick out the useful tidbits and tactics from a heaping haystack of F.U.D.? Join Wendy Nather, Head of Advisory CISO Team at Duo Security, for an entertaining and informative sess…
    - 34 days ago 14 Jan 20, 6:00pm -
  • Rethinking Threat Intelligence with the LEAD Framework
    Adobe has been using threat intelligence for many years as part of the SOC, Incident Response, and Threat Hunting teams. But how do you start applying threat intelligence techniques and models to security efforts outside of these traditional areas? T…
    - 60 days ago 19 Dec 19, 5:00pm -
  • The Scary and Honest Truth About Securing the Public Cloud
    Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power.Join this webcast to learn valuable t…
    - 62 days ago 17 Dec 19, 6:00pm -
  • Automating Firewall Change Requests
    As many companies transform to multi-cloud environments, managing firewall changes at the speed of development teams can be challenging. Teams across Adobe are constantly evolving cloud services to continue to delight our customers. But one of the ma…
    - 67 days ago 12 Dec 19, 5:00pm -
  • Cyber criminals are adopting cloud services just as rapidly as the rest of us!
    Join Netskope for a 45 minute webinar, looking at the dark side of cloud - where it’s used not by respectable enterprises like yours, but instead by cyber criminals intent on attacking your respectable enterprise.It’s not surprising that cyber…
    - 69 days ago 10 Dec 19, 10:00am -
  • Network Security’s Future is in the Cloud
    Cloud adoption and user mobility are shifting the locations of applications, data and users. These changes create new vectors for cybersecurity risk. Organizations need a way to securely enable digital business transformation and innovation. We belie…
    - 76 days ago 3 Dec 19, 6:00pm -
  • Rethink Infrastructure Access with Zero Trust
    As you adopt cloud IaaS to meet business goals, effective security controls can’t be an afterthought. This elastic infrastructure environment requires smart access controls; but how do you adhere to your security policies without limiting automatio…
    - 88 days ago 21 Nov 19, 5:00pm -
  • Incorporating Identity in Your Security and Zero Trust Strategies
    Experts predict that total losses related to cybercrime will reach $6 trillion in 2021. The weapon of choice has been compromised identity and yet security teams run for the door when discussing identity and access management. The rapid adoption of…
    - 90 days ago 19 Nov 19, 6:00pm -
  • Cloud Security Fails of 2019 and Where to Focus in 2020
    Security has become one of the most pressing issues for organizations that are moving to the cloud. In this webinar, industry analyst Fernando Montenegro from 451 Research and Rachel Pepple from ExtraHop will take us through the cloud security journe…
    - 95 days ago 14 Nov 19, 4:00pm -
  • Reimagine Your Perimeter
    Recent research shows that more than 85% of web traffic is comprised of cloud services. The rapid adoption of cloud and mobile is fundamentally changing network traffic patterns and the movement of data, rendering existing network and security models…
    - 7 Nov 19, 5:00pm -
  • Is Your Business Audit-Ready? 3rd Party Risk Management Best Practices
    As the regulatory landscape for data privacy, security, and third-party risk management continues to change rapidly, so do the needs of the businesses that need to comply with the laws. Many organizations are still unsure of how to best tackle their…
    - 5 Nov 19, 6:00pm -
  • Transformation of Cybersecurity Risk
    The cyber landscape is continuing to evolve, and we're seeing digital trends continue to change. Digital technologies are accelerating the ability to do business, and really digitizing everything. In some ways, it's becoming quite common and helping…
    - 31 Oct 19, 5:00pm -
  • How to Stop Cloud Threats by Leveraging CASB With a People-Centric Cybersecurity
    Once your organization migrates to the cloud, protecting your people and the data they create becomes more challenging and critical than ever. Cybercriminals are launching wide-scale brute force attacks on cloud services to compromise user accounts.…
    - 29 Oct 19, 5:00pm -
  • A New Prescription for Cyber Security - Global IT Asset Inventory
    Most people think that a network is a static event. However, with new types of devices, transient workloads, contract and guest participation, the system is fluid. At any given time,15-20% of the network is unseen or unmanaged. This is why the princi…
    - 24 Oct 19, 4:00pm -
  • Why it's Time to Kill Your VPN
    VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?Join this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.Learn why:- VPNs canno…
    - 17 Oct 19, 4:00pm -
  • Master the Fundamentals of VM Analysis and Prioritization
    Learn how you can effectively analyze vulnerability data to prioritize patching and remediation to reduce cyber exposure. Overcome vulnerability overload and gain insight into the following topics:1. Recognizing the value and limitations of CVSS sco…
    - 17 Oct 19, 3:00am -
  • Diversify Defense — Improving Cybersecurity Through Smart Consolidation
    The rush to innovate has resulted in more sophisticated threat defenses, but it has also created a complex web of tools that must be managed by an already overworked and understaffed security team. Heterogeneity of defense systems is itself a defense…
    - 15 Oct 19, 5:00pm -
  • Zero Trust Application Delivery Pipeline
    Zero Trust is a concept that is typically used to describe the security model for a company's infrastructure and data. Application delivery pipelines are typically managed using a perimeter-centric security model. In this session, we will discuss how…
    - 10 Oct 19, 5:00pm -
  • Implementing CAIQ-Lite in a Cloud Vendor Security Assessment Workflow
    Come learn how leading technology companies are optimizing cloud vendor security assessments by leveraging the recently-released CAIQ-Lite in their workflow. Also learn how and why the CAIQ-Lite came to be, as well as best practices from early adopte…
    - 8 Oct 19, 5:00pm -
  • The Future of Audit and Compliance: Controls Automation
    Over the past several years, we have developed and implemented Common Controls Framework (CCF) across Adobe, enabling our cloud products, services, platforms and operations to achieve compliance with various security certifications, standards, and re…
    - 3 Oct 19, 4:00pm -
  • Don’t Let Your Security Slow Your Cloud Journey
    Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is changing the approach for securing access to them. Th…
    - 1 Oct 19, 5:00pm -
  • Quandaries and Clouds: A Discussion on Cloud Security
    Are you experiencing these common challenges in your cloud security program?There is no question that the way we work has changed with the rise of cloud and the widespread access to mobile devices. This shift in how we work requires us to also shif…
    - 26 Sep 19, 5:00pm -
  • No Passwords, No Problem: Using WebAuthn to Stop Account Takeover
    Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. This new standard offers strong authenticators such as T…
    - 19 Sep 19, 5:00pm -
  • Protect Your Web Applications from Component Vulnerabilities
    Web applications are becoming increasingly complex, with most applications now built using multiple layered components, such as web servers, web frameworks, language engines and JavaScript libraries. The growing number of cyber attacks stemming from…
    - 10 Sep 19, 5:00pm -
  • 5 Identity Attacks that Exploit Your Broken Authentication
    It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users. While two-factor authentication solutions have been around for a while, the…
    - 5 Sep 19, 5:00pm -
  • Application of Security Ratings for Emerging Regulatory Compliance Trend in APAC
    This session will explore the emerging regulatory trends in Vendor Risk Management in APAC and demonstrate how Security Ratings can play a key role in supporting enterprises in the establishment of strong governance and compliance oversight for thei…
    - 4 Sep 19, 3:00am -
  • Achieving Cloud Visibility With Cloud-Native Network Detection & Response
    Without native network visibility in the cloud, enterprises have been limited to log or agent centric tools to support their cloud migration and to secure their workloads, making it challenging to detect and investigate complex threats in a timely ma…
    - 29 Aug 19, 4:00pm -
  • Gaining Decrypted Visibility in Public Cloud with Amazon VPC Traffic Mirroring
    Encryption of all traffic in the cloud is a widely adopted best practice. The new TLS 1.3 standard with Elliptic-Curve Diffie Helman (ECDH), perfect forward secrecy and ephemeral keys renders most traditional decryption methods ineffective and out-of…
    - 22 Aug 19, 5:00pm -
  • How Machine Learning is Taking Cyber Security Teams to the Next Level
    Ten years ago, security leaders couldn’t wait to tell you about their cutting edge use of Linux – nowadays, that’s considered table stakes. Today, the big buzzwords are AI and machine learning – and for good reason. With the computational pow…
    - 20 Aug 19, 5:00pm -
  • Application Containers and Microservices: Challenges and Best Practices
    Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operations. Security must be embedded into these software developme…
    - 9 Aug 19, 3:30pm -
  • Best Practices for Securely Moving Workloads Into the Cloud
    Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. In fact, spending on cloud infrastructure services will grow from $39.5 billion in 2019 to $63 billion through 2021 [accordi…
    - 8 Aug 19, 4:00pm -
  • Beyond Cryptocurrency: Blockchain and DLT Use Cases
    Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT) have proven their ability to increase security of data during transactions and provide immu…
    - 7 Aug 19, 6:30pm -
  • 2019 Cloud Security Threat Report: Understand the Latest Cloud Security Trends
    Is your perception of cloud security matching the reality? We surveyed security decision makers worldwide to understand their perceptions of the cloud security landscape and compared this to empirical data sources monitored by Symantec. Join Cl…
    - 25 Jul 19, 5:00pm -
  • IT & OT Security Best Practices-Survey Results of Over 700 Global Practitioners
    Security teams are frequently blind to the IT and Operational Technology (OT) assets, internal and external connections, and vulnerabilities on their industrial control system networks. This visibility gap is one of the key challenges highlighted in…
    - 24 Jul 19, 3:00am -
  • Hacker-Powered Data: Security Weaknesses and Embracing Risk with HackerOne
    Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. Using 6 years of data from 1,300+ bu…
    - 23 Jul 19, 5:00pm -
  • Automating Container Security
    Using containers in AWS enables agile orchestration of application capabilities and require less coordination and oversight than on-premises or virtualization infrastructure. While containers allow you to build and release fast, security teams need t…
    - 18 Jul 19, 5:00pm -
  • Hackers, Cybercriminals, or Employees - Who Poses the Biggest Threat to the Org?
    The Top Threats Working Group from the Cloud Security Alliance produces annual research on the biggest risks to cloud environments. The recent Top Threats: Deep Dive publication examines nine recent case study examples of Treacherous Twelve in actio…
    - 16 Jul 19, 9:00pm -
  • Reaching for the STAR (Part 4): CSA GDPR Code of Conduct
    In this series, “Reaching for the STAR”, we will provide you with insight into the STAR foundation, and how it has evolved into a framework that provides a flexible, incremental and multi-layered cloud provider system that is being recognized as…
    - 16 Jul 19, 10:15am -
  • Using User Behavior Analytics to Detect Authentication Anomalies
    In modern cyber battlefield, we face new threats daily where signatures are not necessarily known. Identifying these anomalies in regular behavior is the core of User Behavior Analysis (UBA). Common UBA applications include detection of malicious ins…
    - 16 Jul 19, 3:00am -
  • Accelerating Your Journey to Zero Trust
    Zero Trust is trending. Every expo show floor is inundated with this concept that promises to transform of corporate security from a well-known failed perimeter-centric model. In this session, we will discuss what is Zero Trust, why are enterprises a…
    - 11 Jul 19, 4:00pm -
  • Does WebAuthn Signal the End of Passwords for Browsers?
    Passwords have been the de-facto standard for authentication in the last 40 years, but end users hate them. Not to mention they aren't considered safe anymore - 81% of hacking-related account breaches leveraged weak or stolen passwords. While passwor…
    - 27 Jun 19, 5:00pm -
  • The Nexus of Organized Cyber Crime and Cyber Terrorism
    New Services and Tools for Supporting First-line-practitioners and Law Enforcement Agencies.In recent years, Europe has been at increased risk of extremist violence and terrorism – from Islamic fundamentalists, far-right fascist hate groups and o…
    - 26 Jun 19, 12:00pm -
  • 2019 Trends Report: The Zero Trust Journey
    As your workforce becomes more distributed, security is even more critical. Protecting the network is important but it’s no longer enough to secure applications and data. That’s why adoption of a Zero Trust security framework is on the rise.Int…
    - 20 Jun 19, 5:00pm -
  • 5 Steps to Protecting Your Data in Today's Cloud- and Mobile-First World
    The rapid adoption of cloud and mobile in the enterprise is powering the transformation of legacy IT systems to more modern technology and processes. The business benefits of speed and agility for the enterprise can’t be denied, but the challenge i…
    - 13 Jun 19, 5:00pm -
  • IoT Threats and Vulnerabilities
    The year 2018 saw increased adoption of consumer and enterprise IoT. These IoT products were faced with multiple IoT attack variants: Wicked, OMG Mirai, ADB.Miner, DoubleDoor, Hide 'N Seek and even a Mirai-Variant IoT Botnet used to target the Finan…
    - 12 Jun 19, 3:00pm -
  • Securing Cloud Infrastructure with Cyber Exposure
    Cloud is dramatically expanding your attack surface and introducing new visibility challenges into infrastructure security. Without foundational visibility, it’s nearly impossible to execute other cloud security programs supporting compliance, poli…
    - 6 Jun 19, 4:00pm -

Bitglass (Lots of Interesting Webinars

  • newCloud and SASE - Continued Disruption
    SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remo…
    - 16 days ago 4 Mar 20, 6:00pm -
  • Securing the Exploding Cloud Footprint
    With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs ca…
    - 5 days ago 12 Feb 20, 6:00pm -
  • SASE: Security for the Cloud & from the Cloud
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:What exactly is a SASE?How are CASB and SWG e…
    - 67 days ago 11 Dec 19, 11:00pm -
  • The Scoop on SASE: Converging Your Cloud Security Footprint
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:What exactly is a SASE?…
    - 75 days ago 4 Dec 19, 6:00pm -
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solution…
    - 16 Oct 19, 5:00pm -
  • Ensuring a Safe IT Ecosystem through Integrated Cloud Security
    With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, securi…
    - 12 Sep 19, 5:00pm -
  • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security
    Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that org…
    - 29 Aug 19, 5:00pm -
  • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
    The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August…
    - 1 Aug 19, 5:00pm -
  • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases
    Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data…
    - 27 Jun 19, 5:00pm -
  • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
    CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud sec…
    - 22 May 19, 5:00pm -
  • CISO Stories: Challenges and Tips for Securing your Evolving Cloud Footprint
    Today’s CISOs face a number of challenges when it comes to securing the move into the cloud. From a lack of cyber security talent and budgetary concerns to countless number of vendors and numerous cloud applications being acquired, CISO's are under…
    - 15 May 19, 5:00pm -
  • CASB Fundamentals: How Leading Organisations Protect Sensitive Cloud Data
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organisations that need end-to-end data security, from c…
    - 7 May 19, 12:00pm -
  • Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to…
    - 17 Apr 19, 3:00am -
  • How Leading Organizations Classify and Protect Cloud Data
    Data is one of an organization's most valuable assets. Unfortunately, in today's dynamic, cloud-first world, protecting sensitive information without the right tools is incredibly difficult. However, through solutions like data discovery, data classi…
    - 21 Feb 19, 6:00pm -
  • Banking on Cloud Security: CASBs in Finance
    Adoption of public cloud applications means new PII data protection challenges for financial services firms, requiring a new approach to cybersecurity. Fortunately, others have already embarked on this journey and much can be learned from their succe…
    - 14 Feb 19, 6:00pm -
  • Top 5 Office 365 Security Challenges
    Presented by: RFA & BitglassAs a leading SaaS productivity application, Office 365 has seen tremendous adoption in financial services around the globe for its advantages over premise-based apps, including easy access, rapid deployment, and lower co…
    - 30 Jan 19, 5:00pm -
  • A Match Made in the Clouds: IDaaS and CASB
    When organizations adopt cloud apps like Office 365, Salesforce, and AWS, developing a solid strategy for identity management and data protection becomes the main security and compliance concern. In this webinar, Rich Campagna and Sophia Zheng from B…
    - 14 Nov 18, 10:00pm -
  • CASBs in the EU: How Leading Organisations Protect Cloud Data
    While public cloud apps like Office 365, AWS, and Slack increase organisational productivity and agility, they aren't without security challenges. For most enterprises, these apps typically usher in cloud-first strategies that dramatically expand the…
    - 8 Nov 18, 2:00pm -
  • CISO Stories: Securing an Expanding Cloud Presence
    Public cloud apps like Office 365 and AWS can provide your organization with increased speed and agility, but also come with security & compliance challenges that only increase as your organization expands its cloud footprint. In this webinar, Bob Tu…
    - 25 Oct 18, 5:00pm -
  • 5 Most Common CASB Use Cases
    Cloud and mobile usage has skyrocketed in many enterprises, introducing many new risks to corporate data. Cloud access security brokers (CASBs) have quickly become go-to solutions for securing apps like Office 365, Salesforce, and AWS.However, the…
    - 13 Sep 18, 5:00pm -
  • Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps
    The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was f…
    - 9 Aug 18, 5:00pm -
  • Securing the Expanding Enterprise Cloud Footprint
    For John Muir Health (JMH) and other leading healthcare firms, Office 365 is often IT's first foray into the public cloud and the start of a broader initiative to migrate from premises-based applications to cloud. Most are now looking to deploy cloud…
    - 24 Jul 18, 4:30pm -
  • Mind the Gap: The 5 Most Common Cloud Security Oversights
    Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate co…
    - 12 Jul 18, 5:00pm -
  • Webinar Express: Cloud Security Must-Haves for HCM
    Human Capital Management (HCM) platforms, like many critical enterprise productivity solutions, are quickly becoming cloud-first platforms. Security is essential for organizations that wish to leverage the power and lower cost of cloud HCM platforms,…
    - 12 Jun 18, 5:00pm -
  • Bitglass Part 1: CASBs in the Wild - The Most Leveraged Cloud Security Policies
    Cloud security is top of mind for all organizations as they migrate to SaaS and IaaS platforms like Office 365 and AWS, but many are grappling with selecting solutions that best balance employee privacy, productivity, and data integrity. While most e…
    - 7 Jun 18, 5:00pm -
  • Webinar Express: Achieving HIPAA Compliance for Office 365
    As healthcare organizations and healthcare affiliates migrate to cloud services like Office 365, a new approach to security is required to ensure compliance under HIPAA. To maintain compliance in this new cloud environment, healthcare firms need acce…
    - 22 May 18, 5:00pm -
  • Webinar Express: Top 5 Office 365 Security Challenges
    As a leading SaaS productivity application, Office 365 has seen tremendous adoption in enterprises around the globe for its advantages over premises-based apps, including easy access, rapid deployment, and lower costs. On the security side, organizat…
    - 16 May 18, 5:00pm -
  • Two Steps to the Cloud Security Epiphany: IDaaS and CASB
    As the enterprise adopts cloud apps like Office 365, Salesforce, and AWS, developing solid strategies for identity and data protection are the main security and compliance concerns. Increasingly, organizations are leveraging the combination of IDaaS…
    - 3 May 18, 5:00pm -
  • Webinar Express: 6 Top CASB Use Cases
    Cloud access security brokers (CASBs) have become the go-to solutions for CISOs and security architects looking to protect data in applications like Office 365, Box, G Suite, and AWS. Still, there remains the question of what challenges CASBs solve.…
    - 12 Apr 18, 5:00pm -
  • BlueCross BlueShield’s CASB Journey to Secure the Cloud
    As one of the nation’s largest insurance providers, BlueCross BlueShield is always looking to make its workforce more efficient through the use of cloud applications like Office 365. Gains in mobility and flexibility, however, can come at a cost if…
    - 14 Mar 18, 5:00pm -
  • Healthcare orgs: Slay the risks of data-enabling your care providers
    The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices…
    - 21 Feb 18, 5:00pm -
  • GDPR - Countdown to Compliance
    As GDPR comes into effect May 2018, organizations are scrambling to reach compliance with its many requirements - particularly as they relate to the cloud. The regulation takes a comprehensive approach to guaranteeing that organizations protect EU ci…
    - 25 Jan 18, 10:00pm -
  • Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security
    Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient…
    - 13 Dec 17, 6:00pm -
  • Zero-Day Read-Only Cloud Apps
    A common problem in regulated industries is that clients wish to interact with business users via unmanaged consumer applications such Box, Dropbox etc. At the same time, security demands that internal documents not be uploaded to these applications…
    - 28 Nov 17, 6:00pm -
  • Security Checklist for Data Migration from On-prem to AWS
    Enterprises are quickly moving their corporate data and custom internal apps to IaaS platforms like AWS, but many lack the visibility and control they need over business-critical data and workloads. Services like S3 and RDS, for example, store massiv…
    - 16 Nov 17, 6:00pm -
  • Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud
    Organizations in the healthcare industry handle data more sensitive (and valuable) than that of companies in perhaps any other sector. Because of this, those organizations need to demonstrate a heightened standard of data security and privacy. To ens…
    - 2 Nov 17, 5:00pm -
  • Are you going to access that data, FROM THERE?
    The modern science of securing applications to a broad range of devices.Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applic…
    - 17 Oct 17, 5:00pm -
  • Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they also face heavier regulations than many other verticals. In particular, these organizations must reach compliance with…
    - 5 Oct 17, 5:00pm -
  • How to Protect Data in the Cloud
    Driven by ease of deployment, cost effectiveness, and improved productivity among employees, many organizations have adopted cloud technology. Although there are significant benefits to cloud adoption, some organizations still face major challenges p…
    - 12 Sep 17, 5:00pm -
  • Security Briefings Part 1: GDPR - Using Technology for Compliance
    The General Data Protection Regulation (GDPR) is designed to ensure the privacy and security of European citizens’ personal data. The regulation takes a comprehensive approach to guaranteeing that organizations protect personal data completely and…
    - 31 Aug 17, 5:00pm -
  • Securing BYOD Without MDM Hassles
    With the increasing demand for BYOD in the workplace, many organizations are adopting Mobile Device Management (MDM) solutions. However MDM is seen by many as cumbersome and invasive and has struggled to see meaningful adoption among employees. Fortu…
    - 16 Aug 17, 8:00pm -
  • How To Secure And Empower Your Mobile Workforce
    The rise of Millennials in the workforce, increasing employeedemand for technology flexibility, and a focus on the employee experience continue to disrupt traditional work procedures. Companies launch limited bring-your-own-device (BYOD) deployments…
    - 19 Jul 17, 6:00pm -
  • Empowering the Cloud Through G Suite
    Adoption of G Suite has increased year over year. Despite this increased adoption, securing data still remains a challenge as employees want access to cloud apps from any device, anywhere.In this webinar, we will discuss the the security gaps withi…
    - 12 Jul 17, 5:00pm -
  • Bitglass Webinar Express: Securing the Cloud for Financial Services
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they face heavier regulations than many other enterprises. As cloud adoption continues to spread within the industry, finan…
    - 21 Jun 17, 5:00pm -
  • Healthcare Security in a Cloud-first World
    Healthcare security requirements become even more complicated with the move to the cloud. Competing internal priorities, along with numerous cloud apps to control, increase strain on already under-resourced teams. Visibility and control over data can…
    - 1 Jun 17, 6:00pm -
  • Securing O365 Using AI-based Advanced Threat Protection
    Office 365 has garnered widespread adoption from enterprises due to its advantages such as ease of deployment, lower TCO, and high scalability. Additionally, it enables end-users to work and collaborate from anywhere and on any device. Although Offic…
    - 24 May 17, 5:00pm -
  • Hidden Threats: How Organizations are Handling Changes in Security
    Enterprises are migrating to the cloud in droves, taking advantage of lower costs, easy deployment, and improved infrastructure security. Protecting data in the cloud, however, remains a challenge as employees push to access cloud apps from any devic…
    - 5 Apr 17, 5:00pm -
  • CASBs for IaaS
    Enterprises are quickly moving their corporate data and custom internal apps to IaaS platforms like AWS, but many lack the visibility and control they need over business-critical workloads. Services like S3 and RDS, for example, store massive volumes…
    - 22 Mar 17, 5:00pm -
  • Bitglass Technology Update Q1 2017
    At Bitglass, innovation and growth are our foundation. As a part of that, we want to keep you in the loop on the new things that are happening with our technology and business. This webinar will cover new features and integration partnerships that we…
    - 21 Mar 17, 5:00pm -
  • Security Briefings Part 1: Cloud Apps and Protecting Against Malware
    Cloud applications have garnered widespread adoption from enterprises in part due to their advantages such as ease of deployment, lower TCO, and high scalability. These applications are also popular because end-users can rely on these applications to…
    - 9 Mar 17, 6:00pm -
  • 6 Essentials for Secure BYOD in Healthcare
    For healthcare organizations struggling to secure BYOD, Mobile Device Management (MDM) was widely heralded as a solution, one that could completely control unmanaged assets. However, physicians with multiple hospital affiliations coupled with privacy…
    - 1 Feb 17, 7:00pm -
  • Your 2017 Cloud Security Action Plan
    We are now three plus years into widespread adoption across industries of public SaaS apps like Office 365. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Matt Hollcraft, CISO for Maxim Integrated, Dave…
    - 18 Jan 17, 9:00pm -
  • Are CASBs Ready for Primetime?
    Enterprises are migrating to the cloud in droves, taking advantage of lower costs, easy deployment, and improved infrastructure security. Protecting data in the cloud, however, remains a challenge as employees push to access cloud apps from any devic…
    - 2 Nov 16, 5:00pm -

More Security Webinars