CISO Express | A Security Professional’s Home Page

PCI Council

  • Did you know insecure remote access is one of the leading causes of data breaches?
    During this webinar PCI SSC discusses the responsibilities of a QIR and how it relates to remote access, authentication credentials and the Implementation Statement. Speakers include Elizabeth Terry​ (Community Engagement Manager), Travis Powell (D…
    - 10 Oct 19, 12:00am -
  • SSL and Early TLS Migration: Preparing for 30 June 2018 Deadline
    30 June 2018 is the deadline for disabling Secure Sockets Layer/early Transport Layer Security (SSL/early TLS) and implementing a more secure encryption protocol in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.…
    - 30 Jun 18, 12:00am -
  • How Hoteliers Can Reduce The Risk of a Data Breach
    The hospitality sector, globally, is a key target for attack – especially point-of-sale (POS) intrusions. That’s why the Council joined with American Hotel and Lodging Association (AHLA) to share best practices on securing payment data in this sp…
    - 15 Jun 16, 12:00am -

Security Forum

Cloud Security Alliance

  • newThe Blind Spot in Object Storage
    Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage many native features and security frameworks, including redundancy, bucket permissions, encryption an…
    - 44 days ago 25 Sep 20, 6:00pm -
  • newBuilding a World-Class Security Program
    There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of threat actors, and new attack vectors to defend against, simply working harder won't solve the probl…
    - 43 days ago 24 Sep 20, 6:00pm -
  • newUsing Security Automation to Better Adapt in Challenging Times
    One of the fundamental principles of any security program is a focus on reducing the “timeline to compromise” for security issues. Not only are attacks getting more and more sophisticated, but they are also starting to get more aggressive as all…
    - 42 days ago 23 Sep 20, 6:00pm -
  • newSECtember Experience
    TBA
    - 41 days ago 22 Sep 20, 6:00pm -
  • newIn the Trenches of Cloud Governance Battles
    When a large organization adopts cloud computing, it goes through several learning curves. Especially when during this journey, a transformation towards a DevOps way of working is implemented. It goes through multiple growth stages. After two to thre…
    - 40 days ago 21 Sep 20, 6:00pm -
  • newHow to Prepare for an Audit Against the CSA STAR Standard
    The CSA STAR allows for both an attestation under a SOC 2 audit or certification under ISO 27001. While most organizations self attest to the CSA Star, this presentation will discuss how to prepare for a successful audit under either SOC 2 or ISO 270…
    - 37 days ago 18 Sep 20, 6:00pm -
  • newVendor Risk Assessment: Secrets for Procuring Secure Cloud Services
    Panel Discussion
    - 36 days ago 17 Sep 20, 6:00pm -
  • newSECtember Experience
    TBA
    - 35 days ago 16 Sep 20, 6:00pm -
  • newPresentation from Starbucks CISO: Andy Kirkland
    TBA
    - 34 days ago 15 Sep 20, 6:00pm -
  • newMaturing Your Cloud Security
    In this session, Mike will go through the Cloud Security Maturity Model, developed in partnership between Securosis and IANS, to provide perspective on your cloud security journey. The session will describe the 12 categories across 3 domains, as well…
    - 33 days ago 14 Sep 20, 6:00pm -
  • newSoftware Defined Perimeter, Microsegmentation & Zero Trust
    Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working from anywhere they want. The rapid increase in global I…
    - 30 days ago 11 Sep 20, 6:00pm -
  • newTalking to the Board About the New Realities of IT Security
    With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity…
    - 29 days ago 10 Sep 20, 6:00pm -
  • newPandemic & Beyond: Migrating to Cloud Securely
    Tune into to this panel to hear key industry CISOs discuss the impact of the pandemic on the cloud security industry and how companies can manage securely moving to the cloud in this environment.
    - 28 days ago 9 Sep 20, 6:00pm -
  • newAftermath of pandemic lockdown cloud adoption – Curse or Boon
    Panel Discussion
    - 28 days ago 9 Sep 20, 6:00am -
  • newCloud Adoption in ASEAN & Challenges
    Panel Discussion
    - 28 days ago 9 Sep 20, 5:00am -
  • newWelcome Address & Opening Keynote -CIO's Perspective on HPC Cloud
    HPC and AI, or shortly HPCAI, become increasingly important for both academics and industry. Many emerging types of research in biomedical, genomics, material science and nanotechnology, environmental, pharmaceutical rely heavily on the power of HPCA…
    - 28 days ago 9 Sep 20, 4:00am -
  • newSecuring the Work-From-Cloud Lifecycle
    In recent months, the COVID pandemic has forced employers to move to a work-from-home model much faster than expected. Many critical business employees are now virtual and may not be coming back to a secured office environment. As a security team, ho…
    - 27 days ago 8 Sep 20, 6:00pm -
  • newImpact of COVID-19 on Cloud Adoption in ASEAN
    Panel Discussion
    - 27 days ago 8 Sep 20, 6:00am -
  • newReflective Security & DevSecOps
    Businesses are now requiring a stronger collaboration between the development, security and operational functions. This addition of security creates DevSecOps. In the past, the security needs were either skipped or only addressed after the deployment…
    - 27 days ago 8 Sep 20, 5:00am -
  • newWelcome Address & Opening Keynote - Making Cognitive Wellbeing a Reality
    Opening Keynote - Making Cognitive Wellbeing a RealityNotifications on our devices and self-interruptions redirect our attention thousands of times every day. Multitasking is correlated with worse cognition and wellbeing (for example, the effects of…
    - 27 days ago 8 Sep 20, 4:00am -
  • newHybrid Clouds - Challenges
    As businesses are developing rapidly, many cloud consumers find that a single public/private cloud or traditional on-premises data center is no longer able to meet service requirements. Organizations are increasingly choosing hybrid cloud environment…
    - 26 days ago 7 Sep 20, 6:00am -
  • newFedRAMP - How Did we get here and where are we now?
    Brief overview of the history of the FedRAMP program including successfactors and lessons learned. Concentration on the improvements to the FedRAMP program that are designed to address to dominant criticism of the program - costs too much, takes too…
    - 26 days ago 7 Sep 20, 5:00am -
  • newWelcome Remarks & Opening Address
    Thailand Security Landscape
    - 26 days ago 7 Sep 20, 4:00am -
  • newAccelerate and Optimize Your Third Party Risk Management Program
    Third-Party Risk Management has become a critical component of protecting and securing your organization. However, many companies still need to find a way to operate at scale in order to be efficient, gain insights, and improve cybersecurity resilien…
    - 22 days ago 3 Sep 20, 5:00pm -
  • newZero Trust Access: From industry buzzword to a corporate reality
    Operationalizing industry buzzwords isn’t always possible. Sometimes these buzzwords are aspirational but the technology behind isn’t understood. In the case of Zero Trust, working with the right vendor means quickly deploying applications secure…
    - 15 days ago 27 Aug 20, 4:00pm -
  • newIntroducing Stringlifier – an Open Source String Detector
    “1e32jnd9312”, “32189321-DEF3123-9898312”, “ADEFi382819312.” Do these strings seem familiar? They could be hashes, randomly generated passwords, API keys, or other useful information. They can be found in logs, command lines, configuratio…
    - 13 days ago 25 Aug 20, 5:00pm -
  • newCloud Security in a Distributed World
    COVID-19 is driving the demand for cloud based remote access tools. However, while the majority of IT and Security leaders are now focused on remote access, an equally challenging issue looms: the resurgence of cloud transformation projects. Attacker…
    - 8 days ago 20 Aug 20, 4:00pm -
  • newSecurity Automation Simplified with Open Security Controls Assessment Language
    Security Automation Simplified with Open Security Controls Assessment LanguageAligning security risk management and compliance activities with the broader adoption of cloud technology and the exponential increase in the complexity of smart systems l…
    - 7 days ago 19 Aug 20, 5:00pm -
  • newStorm Clouds Ahead: Assessing AWS Environments
    Achieving good third-party risk outcomes requires that your vendors operate secure cloud environments. Many security teams have assumed that if a third-party is using Amazon Web Services that they are operating securely, when in fact, the sheer bread…
    - 6 days ago 18 Aug 20, 5:00pm -
  • newIs that Anomaly an Enemy? Understanding the Importance of Security Analytics
    With the rise in identity-based attacks due to the very distributed and remote workforce of 2020, how can your organization identify whether or not it’s the actual user who is attempting the authentication, or an attacker?Security analytics can p…
    - 1 day ago 13 Aug 20, 4:00pm -
  • newCSA's Executive Series - Advancing Cloud SIEM: A Hunter's Experience
    Join Gunter Ollman, CSO - Cloud and AI Security, Microsoft in this webinar, where he will discuss how cloud SIEM is advancing, how this is changing the role of the threat hunter and SecOps teams, & what is to come.
    - 3 hours ago 12 Aug 20, 5:00pm -
  • Dark Web Demystified
    Come to the dark side! Charity Wright, a former NSA analyst and current Cyber Threat Intelligence Advisor at IntSights will take you on a tour of the dark web and explain how you can collect and analyze pertinent intelligence from the dark web to neu…
    - 6 days ago 6 Aug 20, 4:00pm -
  • Tackling Security in the World of Containers and Hybrid Cloud
    Security teams are increasingly finding it challenging to keep up with the changing risks, compliance requirements, tools, and architectural changes introduced by new technologies - such as containers, kubernetes, software-defined infrastructure, and…
    - 8 days ago 4 Aug 20, 5:00pm -
  • Transitioning, Enhancing, and Innovating in the Cloud
    Wherever you are in your cloud journey, CSA research is available to help organizations transition to the cloud, enhance security in the cloud, and innovate from the cloud through their consensus-driven research and initiatives. In this session, John…
    - 14 days ago 29 Jul 20, 5:00pm -
  • Nefarious Uses of Cloud: A Case Study from Defending a Security Conference
    As organisations increasingly move to the cloud, so do the attackers. Come and listen to Onn Chee on how the cloud was used to attack a security conference's websites on the cloud, the profile of the attackers from cloud and how did the conference or…
    - 14 days ago 29 Jul 20, 6:00am -
  • Visibility & Security Challenges Across Multicloud, Hybrid, & Remote Deployments
    Migration to the cloud continues, now with even greater urgency as organizations around the world transition to remote workforces and shift operations off-premises. But cloud environments can expand the attack surface and erase visibility into critic…
    - 20 days ago 23 Jul 20, 4:00pm -
  • The Resurgence of Cloud
    TBDCloud has seen the typical technology pendulum swing experienced by most innovative technologies.Organizations started with the all in cloud first model only to have to later step back and take a moremoderate approach. Yet cloud continues to thr…
    - 21 days ago 22 Jul 20, 6:15pm -
  • CSA STAR Town Hall – Everything you’ve wanted to know
    CSA STAR is being recognized as the international harmonized solution, leading the way of trust for cloud providers, users, and their stakeholders, by providing an integrated cost-effective solution that decreases complexity and increases trust and t…
    - 21 days ago 22 Jul 20, 5:00pm -
  • Zero Trust: A Five Step Program
    If you’re eager to learn how you can elevate your Access Management journey, especially with the swift, mass pivot to remote work, don’t miss this webinar. The workforce to protect continues to expand, and everyone needs remote access, bringing m…
    - 22 days ago 21 Jul 20, 5:00pm -
  • Building a Successful Third Party Risk Management Program for a Modern World
    The challenges that organizations are facing today are increasingly more complex than the past. A global health crisis, an unstable economy and changing dynamics of business risks and opportunities make decision making difficult. These reasons, coupl…
    - 27 days ago 16 Jul 20, 5:00pm -
  • Update on FedRAMP with an Introduction with John Yeoh, Global VP of Research, CS
    Mr. Baldwin will define and discuss several new initiatives that FedRAMP is working on in response to feedback for their users including: Open Security Controls Assessment Language (OSCAL), Threat-based Risk Profiling, and Agency Liaison Program. Th…
    - 28 days ago 15 Jul 20, 5:00pm -
  • Emerging Top Threats in Cloud Computing – What We Can Do About Them
    With cloud becoming the preferred IT infrastructure, understanding the emerging security threats is important. A recent CSA study showed that traditional cloud security issues (such as DDoS, shared technology vulnerabilities, CSP data loss and syste…
    - 28 days ago 15 Jul 20, 6:00am -
  • Cloud IAM is the New Perimeter, Learn How to Govern It or Lose Control
    Strong IAM governance is the key to preventing data breaches and limiting the blast radius should a security incident occur. Join Tyler Smith, Senior Cloud Security Engineer at Allstate, along with Chris Hertz of DivvyCloud by Rapid7 for a discussi…
    - 29 days ago 14 Jul 20, 5:00pm -
  • Shift Left and Shift Down in the Cloud
    How Automation, Templates, and Autonomy Deliver Security with Agility in the CloudOrganizations are moving more workloads to the cloud. At the same time, industry surveys indicate that security remains high on the list of reported cloud challenges.…
    - 34 days ago 9 Jul 20, 4:00pm -
  • 2020 State of Federal Cloud Security: A Practitioner’s Perspective
    Understanding threats and shared responsibility that all Federal agencies have is key to building confidence in security. How has the government and Industry addressed these challenges and are they making progress? Dr. Spina will build on her assessm…
    - 35 days ago 8 Jul 20, 5:00pm -
  • 2020 State of CASB - CSA Research
    With the shift to work from home, cloud security is a bigger concern than ever. As the network perimeter is replaced by a user-defined security perimeter, enterprises need a people-focused approach to threat detection and data protection in the cloud…
    - 35 days ago 8 Jul 20, 4:00pm -
  • A Practitioner’s Guide to Cloud Security and Compliance Processes
    Are you trying to transform your organization into a savvy cloud security shop? This session will look at some of the biggest and most common challenges for maintaining security and compliance while scaling a public cloud environment, and will make p…
    - 36 days ago 7 Jul 20, 5:00pm -
  • Data Privacy and Security Threat Concerns in the Age of COVID-19
    Businesses are facing escalating security threats in the wake of the COVID-19 pandemic, which raises questions about the security of everyone’s private and personal data. Many companies are struggling with resource strains, operating in a remote en…
    - 41 days ago 2 Jul 20, 4:00pm -
  • Reducing Compliance Costs with DevSecOps Principles in the Hybrid Cloud
    58% of organizations are now viewing security compliance requirements and costs as a barrier to entering new markets. Their only choice is to reinvent their approach to compliance. While the vast majority of enterprises are turning to the public clou…
    - 42 days ago 1 Jul 20, 5:00pm -
  • Accelerating Hybrid Cloud Migration with Continuous Security Analytics
    As organizations take advantage of various cloud services for innovation and growth challenges arise at every phase of the security strategy, migration, monitoring, and threat management cycle. How do you detect what services are being used, monitor…
    - 43 days ago 30 Jun 20, 5:00pm -
  • Death of the Traditional Security Review
    Recent crises have not just exposed the many inefficiencies inherent in traditional security reviews, it has exacerbated them. Enterprises and Vendors, or Buyers and Sellers, had only one choice: adapt. Sales cycles and security reviews were accelera…
    - 44 days ago 29 Jun 20, 9:00pm -
  • The Resurgence of Cloud
    TBDCloud has seen the typical technology pendulum swing experienced by most innovative technologies.Organizations started with the all in cloud first model only to have to later step back and take a moremoderate approach. Yet cloud continues to thr…
    - 48 days ago 25 Jun 20, 7:00pm -
  • Key Security Controls & Practices for Moving to the Cloud: A CISO’s Perspective
    In Cloud We TrustWhile Mimecast is a significant cloud security services provider to more than 38K organizations, we also rely heavily on cloud-based IT and security services to run our own business. Like all global organizations this digital trans…
    - 48 days ago 25 Jun 20, 4:00pm -

Bitglass (Lots of Interesting Webinars

  • newBitglass Insider Threat Report 2020: How Your Enterprise Should Respond
    In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
    - 21 days ago 2 Sep 20, 5:00pm -
  • newHow to Address the Top 5 CISO Priorities
    Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origin…
    - 7 days ago 19 Aug 20, 5:00pm -
  • new(APAC) The Best of Both Worlds: CASB + IAAS (Azure)
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
    - 12 hours ago 12 Aug 20, 1:30am -
  • (EMEA) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex
    Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based def…
    - 1 day ago 11 Aug 20, 9:00am -
  • The Best of Both Worlds: CASB + IAAS (Azure)
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
    - 7 days ago 5 Aug 20, 5:00pm -
  • Sécurité du Cloud en temps réel dans le contexte du travail à distance
    Le monde vient d'observer une augmentation importante du travail à distance à une époque où sa mise en place démarrait. À plus long terme, nous observons un environnement de travail plus complexe à sécuriser avec une augmentation des équipe…
    - 15 days ago 28 Jul 20, 8:00am -
  • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce
    Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools,…
    - 29 days ago 14 Jul 20, 5:00pm -
  • Why CASB is the New Firewall for the Cloud
    Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
    - 35 days ago 8 Jul 20, 2:00am -
  • Comparing CASB Technologies: What's the Difference?
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and n…
    - 36 days ago 7 Jul 20, 5:00pm -
  • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
    - 42 days ago 1 Jul 20, 9:00am -
  • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
    - 43 days ago 1 Jul 20, 1:00am -
  • Legal Firms Adopting Cloud and Mobile Working Strategies
    IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for des…
    - 51 days ago 23 Jun 20, 1:30am -
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
    - 71 days ago 2 Jun 20, 9:00am -
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC)
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
    - 72 days ago 2 Jun 20, 1:30am -
  • How to secure remote workers and data at access (EMEA)
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
    - 90 days ago 14 May 20, 9:00am -
  • Remote Worker Alert! Who Moved My VPN and Why Should I Care?
    Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote work…
    - 91 days ago 14 May 20, 12:00am -
  • How to secure remote workers and data at access
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
    - 91 days ago 13 May 20, 5:00pm -
  • A Cloud Security Checkup: CASBs in Healthcare
    Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breache…
    - 98 days ago 6 May 20, 5:00pm -
  • Cloud and SASE - Continued Disruption (APAC)
    SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remo…
    - 100 days ago 5 May 20, 12:00am -
  • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture
    In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish…
    - 8 Apr 20, 5:00pm -
  • Cloud Security Essentials – Bitglass and Zscaler
    Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security tech…
    - 25 Mar 20, 5:00pm -
  • Securing the Exploding Cloud Footprint
    With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs ca…
    - 12 Feb 20, 6:00pm -
  • SASE: Security for the Cloud & from the Cloud
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:What exactly is a SASE?How are CASB and SWG e…
    - 11 Dec 19, 11:00pm -
  • The Scoop on SASE: Converging Your Cloud Security Footprint
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:What exactly is a SASE?…
    - 4 Dec 19, 6:00pm -
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solution…
    - 16 Oct 19, 5:00pm -
  • Ensuring a Safe IT Ecosystem through Integrated Cloud Security
    With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, securi…
    - 12 Sep 19, 5:00pm -
  • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security
    Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that org…
    - 29 Aug 19, 5:00pm -
  • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
    The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August…
    - 1 Aug 19, 5:00pm -
  • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases
    Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data…
    - 27 Jun 19, 5:00pm -
  • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
    CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud sec…
    - 22 May 19, 5:00pm -
  • CISO Stories: Challenges and Tips for Securing your Evolving Cloud Footprint
    Today’s CISOs face a number of challenges when it comes to securing the move into the cloud. From a lack of cyber security talent and budgetary concerns to countless number of vendors and numerous cloud applications being acquired, CISO's are under…
    - 15 May 19, 5:00pm -
  • CASB Fundamentals: How Leading Organisations Protect Sensitive Cloud Data
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organisations that need end-to-end data security, from c…
    - 7 May 19, 12:00pm -
  • Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to…
    - 17 Apr 19, 3:00am -
  • How Leading Organizations Classify and Protect Cloud Data
    Data is one of an organization's most valuable assets. Unfortunately, in today's dynamic, cloud-first world, protecting sensitive information without the right tools is incredibly difficult. However, through solutions like data discovery, data classi…
    - 21 Feb 19, 6:00pm -
  • Banking on Cloud Security: CASBs in Finance
    Adoption of public cloud applications means new PII data protection challenges for financial services firms, requiring a new approach to cybersecurity. Fortunately, others have already embarked on this journey and much can be learned from their succe…
    - 14 Feb 19, 6:00pm -
  • Top 5 Office 365 Security Challenges
    Presented by: RFA & BitglassAs a leading SaaS productivity application, Office 365 has seen tremendous adoption in financial services around the globe for its advantages over premise-based apps, including easy access, rapid deployment, and lower co…
    - 30 Jan 19, 5:00pm -
  • A Match Made in the Clouds: IDaaS and CASB
    When organizations adopt cloud apps like Office 365, Salesforce, and AWS, developing a solid strategy for identity management and data protection becomes the main security and compliance concern. In this webinar, Rich Campagna and Sophia Zheng from B…
    - 14 Nov 18, 10:00pm -
  • CASBs in the EU: How Leading Organisations Protect Cloud Data
    While public cloud apps like Office 365, AWS, and Slack increase organisational productivity and agility, they aren't without security challenges. For most enterprises, these apps typically usher in cloud-first strategies that dramatically expand the…
    - 8 Nov 18, 2:00pm -
  • CISO Stories: Securing an Expanding Cloud Presence
    Public cloud apps like Office 365 and AWS can provide your organization with increased speed and agility, but also come with security & compliance challenges that only increase as your organization expands its cloud footprint. In this webinar, Bob Tu…
    - 25 Oct 18, 5:00pm -
  • 5 Most Common CASB Use Cases
    Cloud and mobile usage has skyrocketed in many enterprises, introducing many new risks to corporate data. Cloud access security brokers (CASBs) have quickly become go-to solutions for securing apps like Office 365, Salesforce, and AWS.However, the…
    - 13 Sep 18, 5:00pm -
  • Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps
    The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was f…
    - 9 Aug 18, 5:00pm -
  • Securing the Expanding Enterprise Cloud Footprint
    For John Muir Health (JMH) and other leading healthcare firms, Office 365 is often IT's first foray into the public cloud and the start of a broader initiative to migrate from premises-based applications to cloud. Most are now looking to deploy cloud…
    - 24 Jul 18, 4:30pm -
  • Mind the Gap: The 5 Most Common Cloud Security Oversights
    Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate co…
    - 12 Jul 18, 5:00pm -
  • Webinar Express: Cloud Security Must-Haves for HCM
    Human Capital Management (HCM) platforms, like many critical enterprise productivity solutions, are quickly becoming cloud-first platforms. Security is essential for organizations that wish to leverage the power and lower cost of cloud HCM platforms,…
    - 12 Jun 18, 5:00pm -
  • Bitglass Part 1: CASBs in the Wild - The Most Leveraged Cloud Security Policies
    Cloud security is top of mind for all organizations as they migrate to SaaS and IaaS platforms like Office 365 and AWS, but many are grappling with selecting solutions that best balance employee privacy, productivity, and data integrity. While most e…
    - 7 Jun 18, 5:00pm -
  • Webinar Express: Achieving HIPAA Compliance for Office 365
    As healthcare organizations and healthcare affiliates migrate to cloud services like Office 365, a new approach to security is required to ensure compliance under HIPAA. To maintain compliance in this new cloud environment, healthcare firms need acce…
    - 22 May 18, 5:00pm -
  • Webinar Express: Top 5 Office 365 Security Challenges
    As a leading SaaS productivity application, Office 365 has seen tremendous adoption in enterprises around the globe for its advantages over premises-based apps, including easy access, rapid deployment, and lower costs. On the security side, organizat…
    - 16 May 18, 5:00pm -
  • Two Steps to the Cloud Security Epiphany: IDaaS and CASB
    As the enterprise adopts cloud apps like Office 365, Salesforce, and AWS, developing solid strategies for identity and data protection are the main security and compliance concerns. Increasingly, organizations are leveraging the combination of IDaaS…
    - 3 May 18, 5:00pm -
  • Webinar Express: 6 Top CASB Use Cases
    Cloud access security brokers (CASBs) have become the go-to solutions for CISOs and security architects looking to protect data in applications like Office 365, Box, G Suite, and AWS. Still, there remains the question of what challenges CASBs solve.…
    - 12 Apr 18, 5:00pm -
  • BlueCross BlueShield’s CASB Journey to Secure the Cloud
    As one of the nation’s largest insurance providers, BlueCross BlueShield is always looking to make its workforce more efficient through the use of cloud applications like Office 365. Gains in mobility and flexibility, however, can come at a cost if…
    - 14 Mar 18, 5:00pm -
  • Healthcare orgs: Slay the risks of data-enabling your care providers
    The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices…
    - 21 Feb 18, 5:00pm -
  • GDPR - Countdown to Compliance
    As GDPR comes into effect May 2018, organizations are scrambling to reach compliance with its many requirements - particularly as they relate to the cloud. The regulation takes a comprehensive approach to guaranteeing that organizations protect EU ci…
    - 25 Jan 18, 10:00pm -
  • Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security
    Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient…
    - 13 Dec 17, 6:00pm -

More Security Webinars