Talking to the Board About the New Real...
With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services. While these examples of agility allowed business to continue, they also greatly increased the risk of misconfigurations and cybe...
Pandemic & Beyond: Migrating to Cloud S...
In this panel, our group of CISOs will be discussing the central cloud security issues currently being faced. Is the pandemic accelerating the push to the cloud? What are the governance, technical and cultural lessons learned? The CISO panelists represent organizations with diverse cloud maturity, from dipping the toes to all in, and the panel will have something of value to all audience members.
Mitigating Misconfiguration Risk Across...
Self-service access, richer service capabilities, auto-scaling workloads, and API-based usage and configurations. These are just a handful of the capabilities that make public cloud and Kubernetes-based environments appealing to DevOps teams. As more organizations embrace the flexibility and agility advantages of these environments, they also introduce heightened risk of security breaches due to misconfigurations and the complexity of managing...
Securing the Work-From-Cloud Lifecycle
In recent months, the COVID pandemic has forced employers to move to a work-from-home model much faster than expected. Many critical business employees are now virtual and may not be coming back to a secured office environment. As a security team, how do you provision capabilities for thousands of employees working in this new normal? Jerry shares over 20 additional authoritative requirements for identified security gaps, regulatory challenge...
CSA Federal Summit 2020
Cloud is now the dominant IT environment, with everyone in the civilian and government sectors leveraging it to some degree. In our current pandemic, the importance of cloud and cybersecurity cannot be overstated. Now more than ever, we are dependent on a secure cloud environment to do our jobs while complying with “Stay at Home” orders. Reliance on cloud technology brings concerns about system breaches, privacy, and compliance wit...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.