Securely Moving Workloads into the Cloud



Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. According to Gartner, spending on cloud infrastructure services will grow from $39.5 billion in 2019 to $63 billion through 2021.

 

However, when transitioning to the cloud, it’s critical to understand that cloud security is a shared responsibility between the cloud service provider and the customer. The cloud service provider typically secures the core infrastructure and services while securing operating systems, platforms, and data remains the responsibility of the customer.

 

As your organization formulates a cloud security strategy, it is important to remember that the #1 cause of today’s breaches is privileged access abuse. And it takes just one single compromised privileged credential to impact millions of data records and result in millions of dollars in fines.

 

To limit their exposure to these attacks, organizations need to move to an identity-centric approach based on a Zero Trust model: “never trust, always verify, enforce least privilege”. This concept should be extended to the organization’s workforce, as well as partners, privileged IT admins, and outsourced IT.

 

During our webinar you’ll learn:
-The state of cloud computing
-Key threats for cloud environments
-Best practices for cloud security confidence in a world of Zero Trust
-How to apply these best practices to critical privileged cloud access use cases
-A customer success story
-The benefits of Zero Trust Privilege

Speaker and Presenter Information

Dr. Torsten George
Cyber Security Evangelist
Centrify


Dr. Torsten George is a cyber security evangelist at Centrify, which delivers Zero Trust Privilege to secure modern enterprises and stop the leading cause of breaches — privileged access abuse. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Dr. George has been part of the global IT security community for more than 25 years and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response and IT security best practices, as well as other cyber security topics in media outlets. He is also the co-author of the Zero Trust Privilege For Dummies book.

 

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Fri, Sep 27, 2019, 1:00pm - 2:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Centrify


Contact Event Organizer


Join the event conversation:
@Centrify
#ZeroTrust


Return to search results