Browse Event Presentations
![]() | Transforming Information Security for Businesses of All Sizes In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transform... Request to download |
![]() | The Future of Work is Probably Not What You Think This presentation will challenge conventional thinking about how the tech workforce will evolve in the faceof (1) a persistently volatile marketplace for ... Request to download |
![]() | Take a Deep Dive Into Common SaaS Data Breaches — And How to Avoid Them SaaS adoption has exploded over the past decade. What used to be point solutions are now fully developed platforms with large ecosystems of connected appl... Request to download |
![]() | How NTT DATA embarked on the Zero Trust Journey 2022 is about Zero Trust being the number one priority of every organization’s cybersecurity roadmap. On May 12th 2021, an Executive Order turned into pol... Request to download |
![]() | An Executive View on How Zero Trust Protects Organizations by Securely Connecting Users to Resources from Anywhere What is Zero Trust and Security Service Edge? What are the best practices to create an effective Zero Trust strategy that aligns with NIST 800-207? Does t... Request to download |
![]() | Protect Every Application on Any Cloud At organizations with multi-cloud operations, security teams face deeper complexity when securing applications and workloads across environments.Luckily, ... Request to download |
![]() | Four Tips for Communicating about Cybersecurity Risk to Non IT Audiences Everybody thinks they are brilliant at communicating with business stakeholders. While some people are right ... we can always be better. Let's spend some... Request to download |
![]() | State of Financial Services in the Cloud Financial institutions and their partners are moving quickly to migrate further into cloud computing. This presentation will discuss the emergence of rece... Request to download |
![]() | CSA as a Guiding Light to Cybersecurity With cloud finally entrenched as the primary IT system worldwide and cloud security now the foundation of cybersecurity programs, partnering with CSA is c... Request to download |
![]() | Implementing an External Attack Surface Management Program Digital transformation, increased adoption of cloud and Internet of Things (IoT), a growing remote workforce, and a technology talent shortage have led to... Request to download |
![]() | Democratize Cloud Security with your CNAPP As cloud adoption expands, security teams are faced with securing an increasingly complex cloud estate. Keeping pace requires a new approach. Completely a... Request to download |
![]() | The Evolution of Private/Public Collaboration and Responsibility CISA has shifted its focus from traditional public/private partnership to one focused on operational collaboration. The results are already paying off, bu... Request to download |
![]() | Measuring the Maturity of Your Cloud Security Program What is mature cloud security, and how mature is your organization? Is there a way to track maturity progress and hire the right people? We will dive into... Request to download |
![]() | Searching for ZERO TRUST |
![]() | GDPR and national implementation. Best practice to national compliance requirements across EU. |
![]() | The Role of CSA STAR in the Italian Cloud Strategy |
![]() | CISO Responsibilities Matrix: Understanding the CISO Role |
![]() | Implementing zero-trust network with service mesh and kubernetes |
![]() | Fireside Chat with Tima Soni, Director of Cybersecurity at UNICC |
![]() | Existential Challenges Facing Cybersecurity |