CISO Express | A Security Professional’s Home Page

PCI Council

  • Did you know insecure remote access is one of the leading causes of data breaches?
    During this webinar PCI SSC discusses the responsibilities of a QIR and how it relates to remote access, authentication credentials and the Implementation Statement. Speakers include Elizabeth Terry​ (Community Engagement Manager), Travis Powell (D…
    - 10 Oct 19, 12:00am -
  • SSL and Early TLS Migration: Preparing for 30 June 2018 Deadline
    30 June 2018 is the deadline for disabling Secure Sockets Layer/early Transport Layer Security (SSL/early TLS) and implementing a more secure encryption protocol in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.…
    - 30 Jun 18, 12:00am -
  • How Hoteliers Can Reduce The Risk of a Data Breach
    The hospitality sector, globally, is a key target for attack – especially point-of-sale (POS) intrusions. That’s why the Council joined with American Hotel and Lodging Association (AHLA) to share best practices on securing payment data in this sp…
    - 15 Jun 16, 12:00am -

Security Forum

    Cloud Security Alliance

    • newForesight is 20/20: How to Use Cyber Threat Intelligence for Proactive SecOps
      The rapid-fire of cybersecurity threats hitting today’s businesses cause many security teams to “live in the moment.” It’s equally important, however, to receive and understand the early indicators cyber threat intelligence (CTI) provides. Wi…
      - 24 days ago 19 Aug 21, 6:00pm -
    • newHybrid Cloud Security: Risks & Mitigation
      Panel Discussion Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so pervasive and popular. This panel of experts will end…
      - 22 days ago 18 Aug 21, 4:45am -
    • newCOVID 19 : Challenging the OT-IT Convergent
      Operational Technology (OT) systems, especially Industrial Control Systems (ICS), are an increasingly attractive target for highly-sophisticate cyber actors around the world. A more worrying trend has developed with the increased connectivity between…
      - 22 days ago 18 Aug 21, 4:00am -
    • newCloud Incident Response Framework
      In cloud incidents, it is necessary to coordinate and share information with stakeholders and other organizations which will be discussed. This presentation is for all cloud customers as well as cloud service providers who need a clear framework for…
      - 22 days ago 18 Aug 21, 3:15am -
    • newThe Remote Workforce Cyber Problem – Resistance to Adoption
      Keynote AddressAs we celebrate the Workers aren’t going to be returning to the office in 2021. Work from home is going to be in place until there is a full vaccine rollout, and maybe even longer. That means whatever cybersecurity systems that are…
      - 22 days ago 18 Aug 21, 2:30am -
    • newZero Trust – Your Way to the Cloud for post-COVID Recovery
      Keynote Address The recent economic situation showed that companies that used cloud technologies to serve the customers anywhere anytime thrived better than companies whose businesses rely on customers visiting their shops physically. Companies tha…
      - 22 days ago 18 Aug 21, 1:45am -
    • newIntroduction, Welcome Remarks & Opening Address
      CSA Singapore Summit 2021Introduction & Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) Opening RemarksProf Alex SIOW (Chair, CSA Singapore Chapter​)Opening Address Jim REAVIS (Co-Founder & CEO, CSA)
      - 22 days ago 18 Aug 21, 1:00am -
    • newDefending your Cloud with MITRE D3FEND
      Modern cloud threats with complex, multi-stage kill chains cannot be mitigated simply by compliance and configuration checks. The MITRE ATT&CK framework for Cloud provides a structure for security teams to reason about attacker tactics in their cloud…
      - 17 days ago 12 Aug 21, 6:00pm -
    • newLeveraging the CAIQ to Prepare for the Next Supply Chain Attack
      Not much time has passed since the last supply chain cyberattacks: SolarWinds, Accellion, Codecov, and now Kaseya. Do you think Kaseya will be the last one? We don’t. While you’re probably wondering what can be done to predict or prevent an incid…
      - 10 days ago 5 Aug 21, 4:00pm -
    • newSecuring Cloud with CyberArk Identity Security and AWS Best Practices
      90% of enterprises today have a footprint in the cloud. But is security top of mind?As organizations are rapidly adopting the cloud, there has been increased diversity with a proliferation of identities, accounts, credentials & permissions. Securi…
      - 8 days ago 3 Aug 21, 4:00pm -
    • newLet's talk about ABC: Assume nothing, Believe nobody. Check everything
      Panel DiscussionFor many people, Zero Trust spells the end of an era – the end of the perimeter defence. McKinnon said: "It’s a failure of the paradigm that you can have a gate and castle wall and everything on the inside is fine".
      - 3 days ago 30 Jul 21, 6:45am -
    • newDigital Identity: A Component of Security as a Service
      Identity and Access Management includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on the protected res…
      - 3 days ago 30 Jul 21, 6:00am -
    • newSecuring the Cloud via CCSK (in Thai)
      In Thai Language As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of expertise and provides an individua…
      - 3 days ago 30 Jul 21, 5:15am -
    • newNew Approach for Multi-cloud Security
      Managing and securing your multi-cloud solution which has the different private and public cloud workloads and environments isn't as easy as you might hope. Despite its many benefits, multi-cloud adoption adds extra layers of management complexity, e…
      - 3 days ago 30 Jul 21, 4:15am -
    • newData Protection in ASEAN
      Panel Discussion A number of ASEAN economies have introduced or are introducing personal data protection laws. These laws are seldom the same. The lack of cooperation between countries creates issues when it comes to using cloud services with data…
      - 3 days ago 30 Jul 21, 3:15am -
    • newHuman Factor in Cybersecurity Challenges
      The Covid-19 pandemic caused major changes in the ways we work and co-operate. We are now relied heavily on Cyber related technology, however cyber threats are also on the rise in alarming rate.This presentation will focus on the human factor rel…
      - 3 days ago 30 Jul 21, 2:30am -
    • newSecurity Incidents Landscape of Thailand during COVID-19
      Host Country Keynote - CSA ASEAN Summit 2021The presentation will cover an introduction to ThaiCERT and Cybersecurity situation in Thailand, observed trends and issues during COVID-19 and response to cybersecurity incidents with GMS (Government Mon…
      - 3 days ago 30 Jul 21, 1:45am -
    • newCloud Security Post-COVID & CSA CxO Trust
      Welcome RemarksDr. Hing Yan LEE (EVP APAC, CSA)Opening AddressDr. Sak SEGKHOODTHOD (Chairman, CSA Thailand Chapter)​Welcome Address - Cloud Security Post-COVID & CSA CxO Trust Illena ARMSTRONG (President, CSA)
      - 3 days ago 30 Jul 21, 1:00am -
    • newHow Can We Grow the Pool of Cloud Security Professionals
      Panel DiscussionAccording to one source, there are about 3 million cybersecurity professionals worldwide. And there we need an additional 4 million cybersecurity professionals. The question for the panelists today is what we can do to address the s…
      - 2 days ago 29 Jul 21, 9:15am -
    • newSecuring the Hybrid Multi Cloud
      With the improvement of private cloud technologies and the increased adoption of hyper-converged infrastructure, there is an increase in the use of hybrid cloud architecture in many organizations. With this new world of hybrid multi cloud world, ther…
      - 2 days ago 29 Jul 21, 8:45am -
    • newSmart Vehicle Ecosystem - Security Challenges IoT Cloud & Mobility
      IoT Cloud Convergence elevated the Smart Vehicle Ecosystem boosted by Mobility. With enhanced experience, Security challenges increased manifold. Striking a balance between risks & user experience became the most challenging ball game. Secure Cloud c…
      - 2 days ago 29 Jul 21, 8:00am -
    • newCloud Native Security Guidelines from Singapore TR 82:2020, NIST and CSA
      Cloud native computing is a new software development approach, not an infrastructure approach as commonly miscontrued. Come and hear what constitutes cloud native and learn more about the various security guidelines from Singapore, NIST and CSA, whic…
      - 2 days ago 29 Jul 21, 7:15am -
    • newAn Overview of Recent Updates to Data Protection & Cybersecurity Laws
      in Asia in Selected Jurisdictions
      - 2 days ago 29 Jul 21, 6:30am -
    • newData Sovereignty in APAC – Impact and Implications
      The term “data sovereignty” has been used to cover a multitude of policy approaches, but what exactly does it mean? Join Executive Director of the Asia Cloud Computing Association (ACCA) Lim May-Ann as she unpacks the various facets of the term,…
      - 2 days ago 29 Jul 21, 5:45am -
    • newMTCS: The New Edition (SS584:2020): What's New
      The Multi-Tier Cloud Security Standard was revised in 2020, and some changes have been made to reflect user concerns and changing technology. We look at what is new, and what is unchanged, and what (in the speaker's biased view) remains undone.
      - 2 days ago 29 Jul 21, 5:00am -
    • newSecuring IoT Ecosystem leveraging CSA's IoT Framework
      The internet of Things (IoT) brings increased connectivity to all industries and business markets, enabling a wide range of services for customers, stakeholders, and service providers. IoT security risks could result in loss of business or life. Devi…
      - 2 days ago 29 Jul 21, 4:00am -
    • newIntroduction to the Cloud Controls Matrix v4.0
      The presentation aims to provide a synopsis about the latest release of the Cloud Control Matrix version 4, a greater insight into its development and new components, the current activities of the CCM WG (ongoing works, published and future works) an…
      - 2 days ago 29 Jul 21, 3:15am -
    • newData Provenance and Cloud Security: Challenges & Opportunities
      At the heart of all cyber and cloud security attribution challenges is the problem of data provenance tracking and its reconstruction. In this talk, I will cover past, present and developing provenance research in computer science, and cover its rela…
      - 2 days ago 29 Jul 21, 2:30am -
    • newThe Key Role of Training and Education for a Secure Approach to Cloud Computing
      Keynote - Introducing the CCAK Developed by CSA and ISACA to meet the unique demands of evaluating and auditing cloud based environments, the Certificate of Cloud Auditing Knowledge (CCAK) is the first credential that industry professionals can obt…
      - 2 days ago 29 Jul 21, 1:45am -
    • newWelcome Remarks & Opening Address
      ​Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) ​Opening Address Jim REAVIS (CEO & Co-Founder, CSA)
      - 2 days ago 29 Jul 21, 1:00am -
    • newBest Practices for Managing Secrets in Multi-cloud Environments
      The need to properly manage secrets is an essential part of the software development lifecycle. It can also be a tedious and time-consuming, not to mention error-prone, effort. Having a strong, enforced policy on secret rotation is essential. But it…
      - 14 hours ago 27 Jul 21, 5:00pm -
    • Moving from Cyber Security to Cyber Resiliency in the Cloud
      How can cybersecurity catch up to the business, while still maintaining a dynamic, resilient, and secure operation? Transitioning and operating in the cloud is no longer just about moving from your on-premises data centers. It’s about optimizing co…
      - 4 days ago 22 Jul 21, 5:00pm -
    • Publicly Exposed Databases: The #1 Cloud Security Risk Today
      The most common cloud security issue facing organizations today is a database containing sensitive data that’s inadvertently accessible to the internet. It seems every week another brand is in the headlines because attackers exploited this situatio…
      - 5 days ago 21 Jul 21, 5:00pm -
    • The Rise of Ransomware: Time to Expand Your Defense Beyond Data Backups
      Join IntSights to see first hand, recent intelligence on how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware continues to evolve.Attend this session to hear IntSights Yotam Katz and…
      - 14 days ago 13 Jul 21, 3:00pm -
    • Building a Data Visibility and Control Framework for The MultiCloud
      Modern multi-cloud environments are complex, noisy, and full of sensitive data. It’s critical to gain visibility and control for data in the cloud - to reduce risk, get more value from your data, and take a strategic and scalable approach to data…
      - 26 days ago 30 Jun 21, 4:00pm -
    • Data Sovereignty - What’s the Big Fuss About?
      Panel DiscussionThe term “data sovereignty” has often been used by stakeholders (including cloud service consumers, cloud service providers, sectoral regulators) to mean different things. Just like the term "cloud computing" in the initial yea…
      - 27 days ago 30 Jun 21, 8:30am -
    • How Can We Grow the Pool of Cloud Security Professionals
      Panel DiscussionAccording to one source, there are about 3 million cybersecurity professionals worldwide. And there we need an additional 4 million cybersecurity professionals. The question for the panelists today is what we can do to address the s…
      - 27 days ago 30 Jun 21, 7:30am -
    • Auditing the Cloud
      2020 was the year of cloud computing due to the COVID19 pandemic, which required more businesses to operate remotely, and the staff to Work From Home. Though it is the obligation of the cloud service provider to take responsibility for their infrastr…
      - 27 days ago 30 Jun 21, 6:45am -
    • ​Establishing Cloud Audit Expertise
      As the cloud becomes increasingly essential to organizational IT strategies, working knowledge of cloud security best practices is crucial. Cloud computing represents a radical departure from legacy IT which means that IT audits must be significantly…
      - 27 days ago 30 Jun 21, 6:00am -
    • Modeling Against the Top Threats in Cloud
      Since 2010, the CSA Top Threats report has revealed major security concerns in cloud computing from top industry professionals. John shares how the report can be used to protect against the latest attacks and high profile breaches of the past year. L…
      - 27 days ago 30 Jun 21, 5:15am -
    • Cloud Security in the Age of Hybrid Clouds
      Panel Discussion Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so pervasive and popular. This panel of experts will end…
      - 27 days ago 30 Jun 21, 4:00am -
    • Mitigation Measures for Risks,Threats & Vulnerabilities Hybrid Cloud Environment
      Hybrid clouds are often the starting point for organizations in their cloud journey. However, any cloud model consists of risks, threats, and vulnerabilities. Earlier this year, the Hybrid Cloud Security Working Group examined hybrid cloud model risk…
      - 27 days ago 30 Jun 21, 3:15am -
    • Hybrid Cloud and Its Associated Risks
      As businesses are developing rapidly, many cloud consumers find that a single public/private cloud or traditional on-premises data center is no longer able to meet service requirements. Organizations are increasingly choosing hybrid cloud environment…
      - 27 days ago 30 Jun 21, 2:30am -
    • Keynote - New normal: Accelerating Business Digital Adoption
      Acceleration of digital during new normal by catalysing digital business adoption with greater flexibility, productivity, improving customer experience and staying ahead with more innovative solutions
      - 27 days ago 30 Jun 21, 1:45am -
    • Introduction, Welcome Remarks & Opening Keynote
      Introduction & Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) ​Opening AddressJim REAVIS (Co-Founder & CEO, CSA)
      - 27 days ago 30 Jun 21, 1:00am -
    • 2021 State of Secure Identity Report
      Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in pres…
      - 27 days ago 29 Jun 21, 5:00pm -
    • Better AppSec with Secure Blocks
      When developers build security into services at Adobe, we make it to where they don’t have to start from scratch. We provide a set of core building blocks for use such as identity service, API platform, event-based messaging system, and others. T…
      - 32 days ago 24 Jun 21, 5:00pm -
    • Enabling Software Security With DevSecOps
      A lot of folks talk about the “what” behind DevSecOps, but few have mastered the “how” that makes it a success. With Development and Operations functions fused together in most organizations, Security must become a first-class cultural compon…
      - 34 days ago 22 Jun 21, 5:00pm -
    • Securing the Cloud via CCSK
      As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of expertise and provides an individual with the foundati…
      - 39 days ago 18 Jun 21, 6:30am -
    • 5 Steps to Streamline Third-Party Due Diligence and Business Continuity
      Recent events have created uncertainty around the viability of the third parties you depend on. Suddenly, third-party risk and business continuity have become the top priority of many board members.We're actively working with organizations to help…
      - 39 days ago 17 Jun 21, 4:00pm -
    • Fragmented Security and Threat Management: We seriously can’t go on like this.
      Many of today's organizations have as many staff resources integrating security tools and data sources as they do actually running their security programs. This is a tragic duplication of effort and not the most productive use of precious talent that…
      - 40 days ago 16 Jun 21, 5:00pm -
    • Live Hack: Securing Privileged Access to Stop Attackers in Their Tracks
      See why endpoints are the favored targets of attackers in this live hack simulation and how cyber criminals use compromised credentials to escalate privileges and access your cloud applications.Join Thycotic Chief Security Scientist Joseph Carson a…
      - 41 days ago 15 Jun 21, 4:00pm -
    • AWS Security: Practical Tips for Compliance Managers
      AWS is releasing new services all the time, yet it seems like a blackbox to many people. Compliance managers need to be highly attuned to the work that happens inside their organization’s AWS environments. Given the flexibility provided by AWS and…
      - 45 days ago 11 Jun 21, 4:00pm -

    Bitglass (Lots of Interesting Webinars

    • Bitglass Product Vision & the Road to SASE
      While SASE lays out the paradigm for converging network security functions to meet the secure access needs of organizations, there is flexibility in execution and the approach to optimize each component of the architecture.Hear about Bitglass’ pr…
      - 75 days ago 12 May 21, 5:00pm -
    • Quarterly Product Features & Updates
      The Bitglass Quarterly Feature Update is a quarterly webinar highlighting the latest and greatest features Bitglass has introduced over the past 3-4 months. As a technology innovator in Secure Access Service Edge (SASE) and a leader in Gartner's Magi…
      - 88 days ago 29 Apr 21, 5:00pm -
    • Okta + Bitglass: Workforce Identity Security Meets SASE
      Secure access and identity go hand-in-hand. Workforce identity security is now a key pillar of a modern enterprise security architecture. But with IT shifting to a world of cloud services and remote working - how does workforce identity security fit…
      - 89 days ago 28 Apr 21, 5:00pm -
    • Bitglass 2021 Insider Report: The State of Remote Work Security
      One year through the global COVID pandemic and it's obvious to most that remote working is here to stay. That has big implications for your IT security environment.VPNs and legacy security tools were tolerated when only 10-15% of the worker were re…
      - 14 Apr 21, 5:00pm -
    • How to Supercharge Your Security with SD-WAN + SASE Integration
      SD-WAN is a key requirement for enabling global enterprise operations. The fact that these solutions route traffic stemming from branch sites creates numerous implications for secure access service edge (SASE) offerings which are designed to sit in t…
      - 7 Apr 21, 1:30am -
    • Comparing CASB Technologies: What's the Difference?
      Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and n…
      - 31 Mar 21, 5:00pm -
    • (APAC) SASE Starter Guide: What *You* Need to Know
      Gartner predicts that over 40% of companies will adopt a SASE architecture in the next several years. And yet there is no single industry standard view on what constitutes SASE, or it's practical deployment. Direct-to-Cloud SASE security integrates…
      - 31 Mar 21, 1:30am -
    • Healthcare Breaches on the Rise. How to Keep Patient Data Confidential.
      Each year Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health information (PHI). Organizations with legacy tools that are incapable…
      - 3 Mar 21, 6:00pm -
    • EMEA: Bitglass + CyberArk: Preventing Another SolarWinds Attack with Identity
      The recent SolarWinds attack has exposed vulnerabilities in identity and privileged access, infecting SolarWinds' Orion network management software to reach many of the targets as possible — using an attack vector that gained privileged access to 3…
      - 3 Mar 21, 9:30am -
    • Why Web Security is Leading a SASE Revolution
      Join this exclusive webinar session with Bitglass cloud experts to learn:· The drawbacks of traditional appliance and cloud-proxy secure web gateways.· How on-device SWGs deliver enhanced performance and provide more than 50% cost savings over…
      - 17 Feb 21, 1:30am -
    • Securely Connect Users to Cloud Apps with SASE
      During this live educational session with demo, hear more about: How SASE works and the problems solvedReal world public sector success storiesFedRAMP, licensing, deployment & maintenancePartnering for successProven procurement pathways
      - 11 Feb 21, 6:00pm -
    • Top Tips for Securing Remote Workers with Zero-Trust Network Access
      There’s a lot of noise in the cybersecurity industry around zero-trust and remote working. With the constant evolution of cybercrime, remote workers are targeted daily with phishing scams, ransomware attacks and remote access trojans, among many, m…
      - 10 Feb 21, 1:30am -
    • Getting Ahead of the Next Cyber Breach
      At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DB…
      - 6 Jan 21, 6:00pm -
    • Bitglass Cloud Security Report 2020: Key Findings & Recommendations
      As this year comes to a close, enterprises continue to navigate remote working, increased cloud migration, bring your own device, and digital transformation. Each of these requires an integrated and robust cybersecurity posture that is capable of per…
      - 10 Dec 20, 6:00pm -
    • Bitglass + Armature Systems: Demystifying SASE
      In this webinar, we will discuss how Secure Access Service Edge (SASE) can help organizations fast track digital and cloud transformation, and answer practical questions on how organization can leverage SASE, including:- Do I need to implement every…
      - 19 Nov 20, 6:00pm -
    • Thriving in a Highly Remote, Cloud-First Environment with Bitglass
      Join this webinar to learn how to:- Swiftly deploy security for your remote workforce while preparing for a future “normal”- Secure BYO devices while enabling productivity- Ensure proper protections on the web without compromising the user exp…
      - 3 Nov 20, 6:00pm -
    • Securing SaaS with Bitglass: ServiceNow & Confluence
      ServiceNow and Confluence are commonly used software-as-a-service applications in organizations around the world. ServiceNow provides automation and efficiency for streamlining business workflows, while Confluence enables communication and collaborat…
      - 21 Oct 20, 9:00am -
    • Comparing Secure Web Gateways: Time for a Reboot at the Edge
      Join this exclusive webinar session with Bitglass cloud experts to learn:· The shortcomings of traditional appliance and cloud delivered secure web gateways;· How on-device secure web gateways provide more than 50% cost savings over traditional…
      - 20 Oct 20, 5:00pm -
    • How to Address the Top 5 CISO Priorities (EMEA)
      "Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origi…
      - 6 Oct 20, 9:00am -
    • Identity & DLP: Two Critical Pillars in Your Defense Strategy
      Identity access management and Data Loss Prevention are the two most important aspects of protecting any organization sharing data over cloud. As businesses across the globe continue to face increasing regulations and stricter compliance, data leakag…
      - 29 Sep 20, 5:00pm -
    • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
      In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
      - 24 Sep 20, 9:00am -
    • Bitglass + IBM QRadar: Reinventing SIEM for Intelligent Cloud Detection & Resp
      Join this exclusive webinar session with IBM and Bitglass to learn:• The combined integration benefits provided by Bitglass’s CASB technology and QRadar’s intelligent SIEM;• How intelligent security analytics and insight can b…
      - 16 Sep 20, 5:00pm -
    • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
      In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
      - 2 Sep 20, 5:00pm -
    • Protecting Legal Firm Data: Navigating a Cloud Security Strategy
      "IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for de…
      - 1 Sep 20, 9:00am -
    • How to Address the Top 5 CISO Priorities
      Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origin…
      - 19 Aug 20, 5:00pm -
    • (APAC) The Best of Both Worlds: CASB + IAAS (Azure)
      Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
      - 12 Aug 20, 1:30am -
    • (EMEA) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex
      Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based def…
      - 11 Aug 20, 9:00am -
    • The Best of Both Worlds: CASB + IAAS (Azure)
      Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
      - 5 Aug 20, 5:00pm -
    • Sécurité du Cloud en temps réel dans le contexte du travail à distance
      Le monde vient d'observer une augmentation importante du travail à distance à une époque où sa mise en place démarrait. À plus long terme, nous observons un environnement de travail plus complexe à sécuriser avec une augmentation des équipe…
      - 28 Jul 20, 8:00am -
    • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce
      Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools,…
      - 14 Jul 20, 5:00pm -
    • Why CASB is the New Firewall for the Cloud
      Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
      - 8 Jul 20, 2:00am -
    • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB
      Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
      - 1 Jul 20, 9:00am -
    • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB
      Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
      - 1 Jul 20, 1:00am -
    • Legal Firms Adopting Cloud and Mobile Working Strategies
      IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for des…
      - 23 Jun 20, 1:30am -
    • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
      Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
      - 2 Jun 20, 9:00am -
    • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC)
      Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
      - 2 Jun 20, 1:30am -
    • How to secure remote workers and data at access (EMEA)
      The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
      - 14 May 20, 9:00am -
    • Remote Worker Alert! Who Moved My VPN and Why Should I Care?
      Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote work…
      - 14 May 20, 12:00am -
    • How to secure remote workers and data at access
      The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
      - 13 May 20, 5:00pm -
    • A Cloud Security Checkup: CASBs in Healthcare
      Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breache…
      - 6 May 20, 5:00pm -
    • Cloud and SASE - Continued Disruption (APAC)
      SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remo…
      - 5 May 20, 12:00am -
    • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture
      In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish…
      - 8 Apr 20, 5:00pm -
    • Cloud Security Essentials – Bitglass and Zscaler
      Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security tech…
      - 25 Mar 20, 5:00pm -
    • Securing the Exploding Cloud Footprint
      With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs ca…
      - 12 Feb 20, 6:00pm -
    • SASE: Security for the Cloud & from the Cloud
      What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:What exactly is a SASE?How are CASB and SWG e…
      - 11 Dec 19, 11:00pm -
    • The Scoop on SASE: Converging Your Cloud Security Footprint
      What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:What exactly is a SASE?…
      - 4 Dec 19, 6:00pm -
    • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
      Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solution…
      - 16 Oct 19, 5:00pm -
    • Ensuring a Safe IT Ecosystem through Integrated Cloud Security
      With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, securi…
      - 12 Sep 19, 5:00pm -
    • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security
      Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that org…
      - 29 Aug 19, 5:00pm -
    • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
      The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August…
      - 1 Aug 19, 5:00pm -
    • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases
      Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data…
      - 27 Jun 19, 5:00pm -
    • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
      CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud sec…
      - 22 May 19, 5:00pm -
    • CISO Stories: Challenges and Tips for Securing your Evolving Cloud Footprint
      Today’s CISOs face a number of challenges when it comes to securing the move into the cloud. From a lack of cyber security talent and budgetary concerns to countless number of vendors and numerous cloud applications being acquired, CISO's are under…
      - 15 May 19, 5:00pm -

    More Security Webinars