June 14, 2023 | 9:00 AM PST
Cyber-attacks by state actors pose the greatest long-term economic threat to businesses around the world. In fact, “Cyber-attacks by state actors are no longer rare, they are actually the new normal.” According to the Dutch NCSC. Cyber Security Assessment Netherlands 2022 | Publication | National Coordinator for Security and Counterterrorism (nctv.nl)
Many organizations find this topic difficult to understand and how to allocate investments to mitigate these risk. Join cyber defence expert Marcel Van Kaam from KPMG and Vectra AI for a discussion to investigate this risk, to shed light on emerging advanced persistent threats (APT), the methods they deploy to infiltrate, evade, escalate, progress and breach organisations, and how best to detect and stop them in their tracks.
Register Now
June 23, 2023 | 10:30 AM EDT
Security teams need to build consistent, reusable design patterns for cloud security controls that can be automated and maintained readily over time. Within cloud infrastructure, many controls can be provisioned and enabled ahead of time and operate autonomously in any deployment scenario. Commonly termed “guardrails,” these controls ensure that security capabilities are always enabled and operate within the context of deployments without any required interaction from security operations or cloud engineering teams.
Register Now
June 01, 2023 | 2:00 PM ET
Increasingly, data at today's enterprises is spread across hybrid and multi-cloud environments. From CapEx savings to improved agility, IT leaders continue to see opportunities in the cloud. As a central component of modern data strategies, cloud drives discussions around brands, features, and migration strategies, as well as key IT issues such as performance, scalability, and security. The goal is faster, smarter, and more cost-effective data management capabilities. However, there are a variety of factors that impact success.
Register Now
October 27, 2023 | 8:30 AM EDT
Today, most security professionals are actively architecting and implementing cloud security controls across SaaS, PaaS, and IaaS environments. We’ve learned that what once worked on-premises may not work quite the same in the cloud, and a wide range of new and innovative security platforms and services have emerged and evolved in recent years to address critical cloud security use cases and categories, including:
Register Now