CISO Express | A Security Professional’s Home Page

PCI Council

  • Did you know insecure remote access is one of the leading causes of data breaches?
    During this webinar PCI SSC discusses the responsibilities of a QIR and how it relates to remote access, authentication credentials and the Implementation Statement. Speakers include Elizabeth Terry​ (Community Engagement Manager), Travis Powell (D…
    - 10 Oct 19, 12:00am -
  • SSL and Early TLS Migration: Preparing for 30 June 2018 Deadline
    30 June 2018 is the deadline for disabling Secure Sockets Layer/early Transport Layer Security (SSL/early TLS) and implementing a more secure encryption protocol in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.…
    - 30 Jun 18, 12:00am -
  • How Hoteliers Can Reduce The Risk of a Data Breach
    The hospitality sector, globally, is a key target for attack – especially point-of-sale (POS) intrusions. That’s why the Council joined with American Hotel and Lodging Association (AHLA) to share best practices on securing payment data in this sp…
    - 15 Jun 16, 12:00am -

Security Forum

    Cloud Security Alliance

    • newImpact of Digital Transformation on Security Strategy
      Panel session featuring key industry cyber executives to speak about the impact of digital transformation on organizational security strategy.
      - 35 days ago 28 Oct 21, 5:00pm -
    • newReducing the Attack Surface in the Cloud
      Each time a person or company deploys a new application, there is an additional surface for attackers to hack into systems. As we have seen in recent cyberattacks, software flaws continue to be at the center of data breaches. The National Vulnerabili…
      - 21 days ago 14 Oct 21, 4:00pm -
    • newQuantifying Cyber Risk In The Cloud
      Whether it’s cloud, multi-cloud, or hybrid cloud, there is no end to cyber risk. So, organizations must be confident in their ability to protect their cloud environments and prepare for emergency scenarios. In most cases, this preparation comes in…
      - 19 days ago 12 Oct 21, 5:00pm -
    • newThink Fast! - Machine Learning for Improved Security
      Cloud computing has ushered in an explosion of tools and resources to swiftly adapt applications, business processes, and even create entire industries. With this rapid growth comes an expanded compute surface and an exponentially increased challenge…
      - 14 days ago 7 Oct 21, 5:00pm -
    • newTop 10 Network Security Mistakes in AWS – And How To Fix Them
      This webinar will look at the top 10 most impactful network security mistakes for organizations deploying apps on AWS today. For many organizations, apps were deployed in AWS quickly – as lines of business moved to realize the business benefit of A…
      - 13 days ago 6 Oct 21, 4:00pm -
    • newManaging Entitlements for All Identities – Shared and Federated
      Distributed IT environments require unified security controls. As your organization unlocks the operational advantages of cloud-hosted infrastructure and applications, it’s essential that you take a consistent approach to securing the diverse range…
      - 12 days ago 5 Oct 21, 4:00pm -
    • newHybrid Cloud Security: Risks & Mitigation
      Panel Discussion : "Hybrid Cloud Security: Risks & Mitigation"Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so pervasive…
      - 8 days ago 1 Oct 21, 11:00am -
    • newIdentifying & Securing Against Crypto Asset Risks
      With Special Focus on Impact of Quantum Computing on Crypto AssetsThe speaker will be sharing CSA Blockchain Working Group research papers on "Securing Crypto assets, can Blockchains survive the Quantum Computing Threat" & then extending conclusion…
      - 8 days ago 1 Oct 21, 10:15am -
    • newIntroduction to the Cloud Controls Matrix v4.0
      The presentation aims to provide a synopsis about the latest release of the Cloud Control Matrix version 4.0, a greater insight into its development and new components, the current activities of the CCM working group (ongoing works, published and fut…
      - 8 days ago 1 Oct 21, 9:30am -
    • newSmart Vehicle Ecosystem - Security Challenges IoT Cloud & Mobility
      IoT Cloud Convergence Elevated the Smart Vehicle Ecosystem boosted by Mobility. With enhanced experience, security challenges increased manifold. Striking a balance between risks & user experience became the most challenging ball game. Secure Cloud c…
      - 8 days ago 1 Oct 21, 8:45am -
    • newEstablishing Cloud Audit Expertise
      As the cloud becomes increasingly essential to organizational IT strategies, working knowledge of cloud security best practices is crucial. Cloud computing represents a radical departure from legacy IT which means that IT audits must be significantly…
      - 8 days ago 1 Oct 21, 8:15am -
    • newCloud Workplaces - Managing The Risks
      ​While the Cloud has been gaining in adoption for the last decade, the pandemic challenges of the last 2 years has made the move to the Cloud inevitable. The last 2 years have seen massive adoption of Cloud, Mobile Computing and telecommuting. Orga…
      - 8 days ago 1 Oct 21, 7:15am -
    • newCSA Guidance on Mobile App Security Testing
      The advent of Mobile Apps, as a default and mandatory requirement, with every service has caused an explosion in usage of smart mobile devices. The use of mobile applications over cloud have surpassed websites as the avenue of choice when it comes to…
      - 8 days ago 1 Oct 21, 6:30am -
    • newContinuous Compliance in Cloud
      The presentation will cover how continuous compliance can be achieved in a multi-cloud environment, in near real-time. It will also cover the strategy on anti-drift pattern, mitigation at scale, and mitigation-as-code approach.
      - 8 days ago 1 Oct 21, 5:45am -
    • newSecuring IoT Ecosystem leveraging CSA's IoT Framework
      ​The internet of Things (IoT) brings increased connectivity to all industries and business markets, enabling a wide range of services for customers, stakeholders, and service providers. IoT security risks could result in loss of business or life. D…
      - 8 days ago 1 Oct 21, 5:15am -
    • newKeynote : ​Cyber Resilience
      CSA India Summit 2021
      - 8 days ago 1 Oct 21, 4:30am -
    • newKeynote : Stepping Up the Security Journey
      In this session we will discuss about the changing nature of digital transformation and how it is altering the thinking in the security landscape. It will cover the ways to integrate security at every step of development life cycle.
      - 8 days ago 1 Oct 21, 4:00am -
    • newWelcome Remarks, Welcome Address & Opening Address
      Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) Welcome Address Ekta MISHRA (Country Manager India, CSA)Opening Address Jim REAVIS (Co-Founder & CEO, CSA)
      - 8 days ago 1 Oct 21, 3:30am -
    • newThe Top Mistakes in Cloud Security and How to Avoid Them
      Gartner Research recently predicted that “through 2025, more than 99% of cloud breaches will have a root cause of customer misconfigurations or mistakes.” Now that we know where we should focus our efforts to secure the enterprise cloud services…
      - 7 days ago 30 Sep 21, 4:00pm -
    • newHow to Protect Your Cloud Environment from Supply Chain Attacks
      Supply chain attacks are on the rise with high-profile breaches such as Mimecast and Kaseya changing the way we approach supply chain risk. Cloud environments are particularly exposed because cloud identities are complex and even innocent looking pri…
      - 6 days ago 29 Sep 21, 5:00pm -
    • newDiscovering the DDoS Criminal's M.O. (and what stops them)
      Presenting the crime scene investigation of today's sophisticated DDoS criminals. How the attacks are launched. Why aren't they getting detected and stopped in time? Why do companies with the best-of-breed mitigation still suffer DDoS attack damages?
      - 5 days ago 28 Sep 21, 5:00pm -
    • Cloud-Native Attacks on Availability: How Ransomware Can Follow You to the Cloud
      The rapid shift to remote work in 2020 saw adoption of public cloud skyrocket. Organizations quickly saw the benefits of public cloud from SaaS based applications, to the agility that PaaS provides. While the pandemic dominated the headlines last yea…
      - 15 days ago 8 Sep 21, 5:00pm -
    • The Latest Threats, Techniques, Risks & Vulnerabilities in Cloud Environments
      Join us for this webinar where eSentire and Sumo Logic threat intelligence experts will brief CSA members on cutting edge threat intelligence developed from threat reports and first-hand detections our threat hunting teams have encountered in cloud e…
      - 16 days ago 7 Sep 21, 5:00pm -
    • Becoming a STAR
      This presentation will review what certification means, why is it the most important criterion for a business, sales. How does a Certification Program achieve this? And what are the costs, not just direct. How should an organisation begin this proces…
      - 20 days ago 3 Sep 21, 9:00am -
    • Hybrid Cloud and Its Associated Risks
      As businesses are developing rapidly, many cloud consumers find that a single public/private cloud or traditional on-premises data center is no longer able to meet service requirements. Organizations are increasingly choosing hybrid cloud environment…
      - 20 days ago 3 Sep 21, 8:15am -
    • Journey to the Cloud: What You Need to Prepare
      Cloud computing brings with it many benefits such as cost savings, disaster recovery, resiliency, automatic software update just to name a few. And these benefits are driving adoption, it is estimated that by 2024 cloud services market will be worth…
      - 20 days ago 3 Sep 21, 7:30am -
    • Welcome Remarks, Welcome Address & Opening Address
      CSA Cambodia Summit 2021Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) Welcome Address Phannarith OU (Chair, CSA Cambodia Chapter)Opening Address Jim REAVIS (Co-Founder & CEO, CSA)
      - 20 days ago 3 Sep 21, 7:00am -
    • So A Cloud Security Expert Walks Into a CISO Role...
      Join Ashish Rajan, CISO and host of the popular Cloud Security Podcast and Nathan Burke, CMO at Axonius as they discuss the cloud security challenges facing a CISO in a new role, how to prioritize the fundamentals, and how to optimize and foster a sy…
      - 23 days ago 31 Aug 21, 5:00pm -
    • How-To: Securing Messaging in Mobile Apps
      Are You Using Push Notifications? Mobile Push Messaging is a powerful communication channel that allows mobile app developers to draw their user's attention with the right information at the right time. This feature can offer things as simple as remi…
      - 28 days ago 26 Aug 21, 6:00pm -
    • A User-First Approach to MFA
      The burden of proving a customer’s identity today rests mostly on the end user. Companies and services do not trust end users by default, and those end users--their customers--do not trust a service with their information. This leads to unnecessary…
      - 30 days ago 24 Aug 21, 5:00pm -
    • Foresight is 20/20: How to Use Cyber Threat Intelligence for Proactive SecOps
      The rapid-fire of cybersecurity threats hitting today’s businesses cause many security teams to “live in the moment.” It’s equally important, however, to receive and understand the early indicators cyber threat intelligence (CTI) provides. Wi…
      - 35 days ago 19 Aug 21, 6:00pm -
    • How Unity Uses Continuous Risk Assessment to Empower its Google Cloud Estate
      Meet Justin Somaini, Chief Security Officer at Unity. Somaini is an expert in securing large environments having done stints as the CISO of Yahoo! and SAP. The scale of operations at Unity is even bigger as their games and experiences reach billions…
      - 36 days ago 18 Aug 21, 5:00pm -
    • Data Sovereignty - What’s the Big Fuss About?
      There will be a live Q&A after the panel discussion. The term “data sovereignty” has often been used by stakeholders (including cloud service consumers, cloud service providers, sectoral regulators) to mean different things. Just like the ter…
      - 36 days ago 18 Aug 21, 8:15am -
    • Cloud Native Security Guidelines from Singapore TR 82:2020, NIST and CSA
      Cloud native computing is a new software development approach, not an infrastructure approach as commonly miscontrued. Come and hear what constitutes cloud native and learn more about the various security guidelines from Singapore, NIST and CSA, whic…
      - 36 days ago 18 Aug 21, 7:30am -
    • MTCS: The New Edition (SS584:2020): What's New
      The Multi-Tier Cloud Security (MTCS) Singapore Standard was revised in 2020, and some changes have been made to reflect user concerns and changing technology. We look at what is new, and what is unchanged, and what (in the speaker's biased view) rem…
      - 36 days ago 18 Aug 21, 6:45am -
    • CCM Addendum - Mapping of ABS Cloud Computing Implementation Guide 2.0 to CCM
      Presented by - Arun Vivek IYER (​Head of Cloud & Container Security – Cyber Security Services, Standard Chartered Bank & Co-chair, CCM ABS Mapping WG, CSA)In the technology space, there are also multiple frameworks and guidelines available, suc…
      - 36 days ago 18 Aug 21, 6:00am -
    • Hybrid Cloud Security: Risks & Mitigation
      There will be a live Q&A after the panel discussion.Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so pervasive and popul…
      - 36 days ago 18 Aug 21, 4:45am -
    • COVID 19 : Challenging the OT-IT Convergent
      Operational Technology (OT) systems, especially Industrial Control Systems (ICS), are an increasingly attractive target for highly-sophisticate cyber actors around the world. A more worrying trend has developed with the increased connectivity between…
      - 36 days ago 18 Aug 21, 4:00am -
    • Cloud Incident Response Framework
      In cloud incidents, it is necessary to coordinate and share information with stakeholders and other organizations which will be discussed. This presentation is for all cloud customers as well as cloud service providers who need a clear framework for…
      - 36 days ago 18 Aug 21, 3:15am -
    • The Remote Workforce Cyber Problem – Resistance to Adoption
      Keynote AddressThe speaker will be available for live Q&A.As we celebrate the Workers aren’t going to be returning to the office in 2021. Work from home is going to be in place until there is a full vaccine rollout, and maybe even longer. That…
      - 36 days ago 18 Aug 21, 2:30am -
    • Zero Trust – Your Way to the Cloud for post-COVID Recovery
      Keynote Address The speaker will be available for live Q&A.The recent economic situation showed that companies that used cloud technologies to serve the customers anywhere anytime thrived better than companies whose businesses rely on customers v…
      - 36 days ago 18 Aug 21, 1:45am -
    • Introduction, Welcome Remarks & Opening Address
      CSA Singapore Summit 2021Introduction & Welcome Remarks​Dr. Hing-Yan LEE (EVP APAC, CSA) Opening RemarksProf Alex SIOW (Chair, CSA Singapore Chapter​)Opening Address Jim REAVIS (Co-Founder & CEO, CSA)
      - 36 days ago 18 Aug 21, 1:00am -
    • Defending your Cloud with MITRE D3FEND
      Modern cloud threats with complex, multi-stage kill chains cannot be mitigated simply by compliance and configuration checks. The MITRE ATT&CK framework for Cloud provides a structure for security teams to reason about attacker tactics in their cloud…
      - 42 days ago 12 Aug 21, 6:00pm -
    • Leveraging the CAIQ to Prepare for the Next Supply Chain Attack
      Not much time has passed since the last supply chain cyberattacks: SolarWinds, Accellion, Codecov, and now Kaseya. Do you think Kaseya will be the last one? We don’t. While you’re probably wondering what can be done to predict or prevent an incid…
      - 49 days ago 5 Aug 21, 4:00pm -
    • Securing Cloud with CyberArk Identity Security and AWS Best Practices
      90% of enterprises today have a footprint in the cloud. But is security top of mind?As organizations are rapidly adopting the cloud, there has been increased diversity with a proliferation of identities, accounts, credentials & permissions. Securi…
      - 51 days ago 3 Aug 21, 4:00pm -
    • Let's talk about ABC: Assume nothing, Believe nobody. Check everything
      Panel DiscussionFor many people, Zero Trust spells the end of an era – the end of the perimeter defence. McKinnon said: "It’s a failure of the paradigm that you can have a gate and castle wall and everything on the inside is fine".
      - 55 days ago 30 Jul 21, 6:45am -
    • Digital Identity: A Component of Security as a Service
      Identity and Access Management includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on the protected res…
      - 55 days ago 30 Jul 21, 6:00am -
    • Securing the Cloud via CCSK (in Thai)
      In Thai Language As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of expertise and provides an individua…
      - 55 days ago 30 Jul 21, 5:15am -
    • New Approach for Multi-cloud Security
      Managing and securing your multi-cloud solution which has the different private and public cloud workloads and environments isn't as easy as you might hope. Despite its many benefits, multi-cloud adoption adds extra layers of management complexity, e…
      - 55 days ago 30 Jul 21, 4:15am -
    • Data Protection in ASEAN
      Panel Discussion A number of ASEAN economies have introduced or are introducing personal data protection laws. These laws are seldom the same. The lack of cooperation between countries creates issues when it comes to using cloud services with data…
      - 55 days ago 30 Jul 21, 3:15am -
    • Human Factor in Cybersecurity Challenges
      The Covid-19 pandemic caused major changes in the ways we work and co-operate. We are now relied heavily on Cyber related technology, however cyber threats are also on the rise in alarming rate.This presentation will focus on the human factor rel…
      - 55 days ago 30 Jul 21, 2:30am -
    • Security Incidents Landscape of Thailand during COVID-19
      Host Country Keynote - CSA ASEAN Summit 2021The presentation will cover an introduction to ThaiCERT and Cybersecurity situation in Thailand, observed trends and issues during COVID-19 and response to cybersecurity incidents with GMS (Government Mon…
      - 55 days ago 30 Jul 21, 1:45am -
    • Cloud Security Post-COVID & CSA CxO Trust
      Welcome RemarksDr. Hing Yan LEE (EVP APAC, CSA)Opening AddressDr. Sak SEGKHOODTHOD (Chairman, CSA Thailand Chapter)​Welcome Address - Cloud Security Post-COVID & CSA CxO Trust Illena ARMSTRONG (President, CSA)
      - 55 days ago 30 Jul 21, 1:00am -

    Bitglass (Lots of Interesting Webinars

    • Bitglass Product Vision & the Road to SASE
      While SASE lays out the paradigm for converging network security functions to meet the secure access needs of organizations, there is flexibility in execution and the approach to optimize each component of the architecture.Hear about Bitglass’ pr…
      - 12 May 21, 5:00pm -
    • Quarterly Product Features & Updates
      The Bitglass Quarterly Feature Update is a quarterly webinar highlighting the latest and greatest features Bitglass has introduced over the past 3-4 months. As a technology innovator in Secure Access Service Edge (SASE) and a leader in Gartner's Magi…
      - 29 Apr 21, 5:00pm -
    • Okta + Bitglass: Workforce Identity Security Meets SASE
      Secure access and identity go hand-in-hand. Workforce identity security is now a key pillar of a modern enterprise security architecture. But with IT shifting to a world of cloud services and remote working - how does workforce identity security fit…
      - 28 Apr 21, 5:00pm -
    • Bitglass 2021 Insider Report: The State of Remote Work Security
      One year through the global COVID pandemic and it's obvious to most that remote working is here to stay. That has big implications for your IT security environment.VPNs and legacy security tools were tolerated when only 10-15% of the worker were re…
      - 14 Apr 21, 5:00pm -
    • How to Supercharge Your Security with SD-WAN + SASE Integration
      SD-WAN is a key requirement for enabling global enterprise operations. The fact that these solutions route traffic stemming from branch sites creates numerous implications for secure access service edge (SASE) offerings which are designed to sit in t…
      - 7 Apr 21, 1:30am -
    • Comparing CASB Technologies: What's the Difference?
      Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and n…
      - 31 Mar 21, 5:00pm -
    • (APAC) SASE Starter Guide: What *You* Need to Know
      Gartner predicts that over 40% of companies will adopt a SASE architecture in the next several years. And yet there is no single industry standard view on what constitutes SASE, or it's practical deployment. Direct-to-Cloud SASE security integrates…
      - 31 Mar 21, 1:30am -
    • Healthcare Breaches on the Rise. How to Keep Patient Data Confidential.
      Each year Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health information (PHI). Organizations with legacy tools that are incapable…
      - 3 Mar 21, 6:00pm -
    • EMEA: Bitglass + CyberArk: Preventing Another SolarWinds Attack with Identity
      The recent SolarWinds attack has exposed vulnerabilities in identity and privileged access, infecting SolarWinds' Orion network management software to reach many of the targets as possible — using an attack vector that gained privileged access to 3…
      - 3 Mar 21, 9:30am -
    • Why Web Security is Leading a SASE Revolution
      Join this exclusive webinar session with Bitglass cloud experts to learn:· The drawbacks of traditional appliance and cloud-proxy secure web gateways.· How on-device SWGs deliver enhanced performance and provide more than 50% cost savings over…
      - 17 Feb 21, 1:30am -
    • Securely Connect Users to Cloud Apps with SASE
      During this live educational session with demo, hear more about: How SASE works and the problems solvedReal world public sector success storiesFedRAMP, licensing, deployment & maintenancePartnering for successProven procurement pathways
      - 11 Feb 21, 6:00pm -
    • Top Tips for Securing Remote Workers with Zero-Trust Network Access
      There’s a lot of noise in the cybersecurity industry around zero-trust and remote working. With the constant evolution of cybercrime, remote workers are targeted daily with phishing scams, ransomware attacks and remote access trojans, among many, m…
      - 10 Feb 21, 1:30am -
    • Getting Ahead of the Next Cyber Breach
      At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DB…
      - 6 Jan 21, 6:00pm -
    • Bitglass Cloud Security Report 2020: Key Findings & Recommendations
      As this year comes to a close, enterprises continue to navigate remote working, increased cloud migration, bring your own device, and digital transformation. Each of these requires an integrated and robust cybersecurity posture that is capable of per…
      - 10 Dec 20, 6:00pm -
    • Bitglass + Armature Systems: Demystifying SASE
      In this webinar, we will discuss how Secure Access Service Edge (SASE) can help organizations fast track digital and cloud transformation, and answer practical questions on how organization can leverage SASE, including:- Do I need to implement every…
      - 19 Nov 20, 6:00pm -
    • Thriving in a Highly Remote, Cloud-First Environment with Bitglass
      Join this webinar to learn how to:- Swiftly deploy security for your remote workforce while preparing for a future “normal”- Secure BYO devices while enabling productivity- Ensure proper protections on the web without compromising the user exp…
      - 3 Nov 20, 6:00pm -
    • Securing SaaS with Bitglass: ServiceNow & Confluence
      ServiceNow and Confluence are commonly used software-as-a-service applications in organizations around the world. ServiceNow provides automation and efficiency for streamlining business workflows, while Confluence enables communication and collaborat…
      - 21 Oct 20, 9:00am -
    • Comparing Secure Web Gateways: Time for a Reboot at the Edge
      Join this exclusive webinar session with Bitglass cloud experts to learn:· The shortcomings of traditional appliance and cloud delivered secure web gateways;· How on-device secure web gateways provide more than 50% cost savings over traditional…
      - 20 Oct 20, 5:00pm -
    • How to Address the Top 5 CISO Priorities (EMEA)
      "Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origi…
      - 6 Oct 20, 9:00am -
    • Identity & DLP: Two Critical Pillars in Your Defense Strategy
      Identity access management and Data Loss Prevention are the two most important aspects of protecting any organization sharing data over cloud. As businesses across the globe continue to face increasing regulations and stricter compliance, data leakag…
      - 29 Sep 20, 5:00pm -
    • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
      In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
      - 24 Sep 20, 9:00am -
    • Bitglass + IBM QRadar: Reinventing SIEM for Intelligent Cloud Detection & Resp
      Join this exclusive webinar session with IBM and Bitglass to learn:• The combined integration benefits provided by Bitglass’s CASB technology and QRadar’s intelligent SIEM;• How intelligent security analytics and insight can b…
      - 16 Sep 20, 5:00pm -
    • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond
      In this webinar, you will learn:- The state of security for organizations wrestling with insider threats;- How various security capabilities can help IT and security teams to respond; and- How SASE platforms like Bitglass can help your enterprise…
      - 2 Sep 20, 5:00pm -
    • Protecting Legal Firm Data: Navigating a Cloud Security Strategy
      "IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for de…
      - 1 Sep 20, 9:00am -
    • How to Address the Top 5 CISO Priorities
      Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the origin…
      - 19 Aug 20, 5:00pm -
    • (APAC) The Best of Both Worlds: CASB + IAAS (Azure)
      Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
      - 12 Aug 20, 1:30am -
    • (EMEA) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex
      Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based def…
      - 11 Aug 20, 9:00am -
    • The Best of Both Worlds: CASB + IAAS (Azure)
      Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, or…
      - 5 Aug 20, 5:00pm -
    • Sécurité du Cloud en temps réel dans le contexte du travail à distance
      Le monde vient d'observer une augmentation importante du travail à distance à une époque où sa mise en place démarrait. À plus long terme, nous observons un environnement de travail plus complexe à sécuriser avec une augmentation des équipe…
      - 28 Jul 20, 8:00am -
    • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce
      Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools,…
      - 14 Jul 20, 5:00pm -
    • Why CASB is the New Firewall for the Cloud
      Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
      - 8 Jul 20, 2:00am -
    • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB
      Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
      - 1 Jul 20, 9:00am -
    • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB
      Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
      - 1 Jul 20, 1:00am -
    • Legal Firms Adopting Cloud and Mobile Working Strategies
      IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.The technologies relied on for des…
      - 23 Jun 20, 1:30am -
    • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
      Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
      - 2 Jun 20, 9:00am -
    • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC)
      Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile,…
      - 2 Jun 20, 1:30am -
    • How to secure remote workers and data at access (EMEA)
      The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
      - 14 May 20, 9:00am -
    • Remote Worker Alert! Who Moved My VPN and Why Should I Care?
      Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote work…
      - 14 May 20, 12:00am -
    • How to secure remote workers and data at access
      The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data…
      - 13 May 20, 5:00pm -
    • A Cloud Security Checkup: CASBs in Healthcare
      Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breache…
      - 6 May 20, 5:00pm -
    • Cloud and SASE - Continued Disruption (APAC)
      SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remo…
      - 5 May 20, 12:00am -
    • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture
      In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish…
      - 8 Apr 20, 5:00pm -
    • Cloud Security Essentials – Bitglass and Zscaler
      Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security tech…
      - 25 Mar 20, 5:00pm -
    • Securing the Exploding Cloud Footprint
      With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs ca…
      - 12 Feb 20, 6:00pm -
    • SASE: Security for the Cloud & from the Cloud
      What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:What exactly is a SASE?How are CASB and SWG e…
      - 11 Dec 19, 11:00pm -
    • The Scoop on SASE: Converging Your Cloud Security Footprint
      What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar on Dec 4th at 10am PST to learn about:What exactly is a SASE?…
      - 4 Dec 19, 6:00pm -
    • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
      Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solution…
      - 16 Oct 19, 5:00pm -
    • Ensuring a Safe IT Ecosystem through Integrated Cloud Security
      With so many security vendors out there, how do you know what tools you need in order to ensure that your data is truly secure? The modern workforce now expects to be able to perform their work duties in any app, any device, anywhere. As such, securi…
      - 12 Sep 19, 5:00pm -
    • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security
      Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that org…
      - 29 Aug 19, 5:00pm -
    • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
      The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August…
      - 1 Aug 19, 5:00pm -
    • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases
      Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data…
      - 27 Jun 19, 5:00pm -
    • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
      CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud sec…
      - 22 May 19, 5:00pm -
    • CISO Stories: Challenges and Tips for Securing your Evolving Cloud Footprint
      Today’s CISOs face a number of challenges when it comes to securing the move into the cloud. From a lack of cyber security talent and budgetary concerns to countless number of vendors and numerous cloud applications being acquired, CISO's are under…
      - 15 May 19, 5:00pm -

    More Security Webinars