Browse Event Presentations
Why IAM is the New Perimeter in Public Cloud and How to Govern It | |
Case Study: Obvious and Not-So Obvious Lessons Learned On the Path to Cloud-First IT | |
Building the Next Generation Cybersecurity Workforce Cybersecurity as a field and threat to businesses is growing at a pace faster than we can train for or protect properly against. In this event presentation, ... Request to download | |
Transforming Security for the Clouds NA Request to download | |
The Future of a Secure Digital Transformation | |
Cloud Security Posture | |
Transitioning, Enhancing, and Innovating in the Cloud | |
SSL/TLS Then and Now | |
A Hackers Perspective, where do we go from here? | |
Change is Simply an Act of Survival | |
Identity Round Robin Workshop Serverless NA Request to download | |
Data Protection Controls for the Cloud | |
Taking Compliance to the Cloud | |
Are Your Cloud Servers Under Attack? | |
Attackers Battle for Hijacked Resources | |
Shared Responsibility Model in the Age of Cloud | |
Eight Ball For The Win: Key Cloud and Cybersecurity Trends for 2020 | |
Security Leaders as Change Leaders | |
Rethinking the Traditional Cloud Vendor Assessment Model: Proactive vs Reactive Vendor Security | |
Tell Me a Story – The Art of Explaining Risks |