ITProToday Logo

The State of Cloud Security: How to Protect Your Most Precious Assets

April 16, 2020 11 a.m. ET-5 p.m. ET

11:00 AM – 11:45 AM

Insider Threat Insights: Securing the Cloud Against Internal Danger

Sponsored by:
Divvy Cloud logo
Presented By: Nick Cavalancia

Not all cloud security threats originate from outside the organization. Modern business must also contend with compromised insiders (e.g., employees whose credentials were stolen), negligent insiders (staffers who misplace a device or mistakenly share critical information with unauthorized users) and malicious insiders (disgruntled workers who gain revenge via acts of theft, fraud and sabotage). Even worse, the risk of human error multiplies in the cloud, where compromised or stolen credentials can quickly cause damage across a range of applications and data sources. This session will explore how businesses can protect the cloud environment from internal threats.

11:45 AM– 12:00 PM

Fireside Chat featuring DivvyCloud

Editorial Interview with Chris Hertz of DivvyCloud

12:00PM – 12:15 PM

Networking Break

Spotlight Video: DivvyCloud

12:15 PM– 1:00 PM

Cloud Security 101: Simple Strategies for Safeguarding Your Business
Sponsored by:
A10 Network Logo
Presented by: Bill Kleyman

Migrating to the cloud heralds a radical evolution of information technology — and that spells dramatic changes for how organizations secure their IT assets. In this session, tech journalist James A. Martin will address the fundamentals of cloud security, exploring the key controls and policies that define how data, systems, applications and infrastructure are protected in the cloud environment, as well as spotlighting essential capabilities like identity and access management, data encryption, and event detection and monitoring. In this session, you'll learn:

  • How cloud security plays a pivotal role in your organization's resilience
  • How to separate fears from facts about cloud security
  • The essential security features and controls to look for with cloud vendors and why they’re important
  • The basic steps you should take to prevent or minimize cybersecurity threats in a cloud environment

1:00 PM – 1:15 PM

Fireside Chat featuring A10 Networks

Editorial Interview with Paul Nicholson of A10 Networks

1:15 PM - 1:30 PM

Networking Break

Spotlight Video: A10 Networks

1:30 PM– 2:00 PM

Premier Sessions

Security Today: Responding to the Call of a Remote Workforce
Sponsored by: Panda Security
Panda Security Logo
Presented by: James Manning

The last few years have seen a marked increase in remote work fueled by advancements in technology and an increasingly connected global economy. Recently, the infrastructure supporting this trend has been tested, as COVID-19 forced companies to move their workforces remote. Whether it’s a temporary response to a current event or a long-term business decision, moving part or all of your workforce remote brings a unique set of security challenges. In this session, Panda Presales Engineer James Manning dives into the world of remote work, including:

  • A look at the preparedness of companies forced to move their employees remote
  • A look ahead at the challenges of secure remote work
  • Strategies for maintaining your security posture across a remote workforce

Mission Impossible? Securing the Cloud Without Making Headlines
Sponsored by: Sophos
Sophos Logo
Presented by: Jorn Lutters

While the words “security” and “public cloud” often make news headlines, this combination never bodes well for the company involved. Why is it that organizations of all sizes still struggle so much with this challenge? How can we learn from these examples to avoid becoming a headline ourselves?

In this session, we’ll explore common examples of successful hacks and data losses. Attendees will learn how, through a combination of applying security best practices, common sense, tooling, and testing you can avoid becoming the next big headline.

2:00 PM - 2:15 PM

Break

Spotlight Video: Panda Security

2:15 PM – 2:45 PM

Premier session

Mitigating the Risk of Insider Threats in the Cloud
Sponsored by: Netwrix
Netwrix Logo
Presented by: Dakota Brewer

The Netwrix Cloud Data Security Report found that the biggest source of security risk for organizations is their own business users. In fact, 43 percent of organizations say their employees were responsible for recent cloud security incidents. In this session, Dakota Brewer and … will share ways to identify security threats in time to prevent serious damage, along with practical advice for preventing data leakage.
During this session, we’ll answer these key questions:

  • What specific challenges are there for securing data in the cloud?
  • How can you detect abnormal user behavior in your cloud applications?
  • What steps can you take to protect your data across your cloud-based systems?

2:45 PM–3:00 PM

Break

Spotlight Video: Sophos

3:00 PM - 3:30PM

Spotlight Webinar: The State of Enterprise Cloud Adoption and Security

Sponsored by: DivvyCloud
Divvy Cloud logo

3:30 PM –3:45 PM

Break

Spotlight Video: Netwrix

3:45 PM - 4:15 PM

Spotlight Webinar: Managing Multi-Cloud Chaos: Automated and Secure Application Delivery

Sponsored by: A10 Networks
A10 Network Logo

4:15 PM - 5:00 PM

Panel Session: Hybrid/Multi-Cloud Security
Moderated by: Orin Thomas

Sponsored by:

Citrix Logo A10 Network Logo

Enterprise adoption of hybrid, multi-cloud approaches continues to soar. But managing the privacy and security of customer data across these environments poses significant headaches: in fact, movement of data between partners and third parties is often to blame data breaches. This session will analyze the unique complexities inherent in securing data from one environment to another, offering practical solutions to guarantee your business insights remain safe from harm.