How to Keep a Cloud Environment Current, Secure and Available

"This webinar will dive into the industry standard for architecture of cloud computing. It will provide an overview of the most important people, processes and technology to keep the cloud environment up and running, secure and available. Best practices and experience will be shared."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

What Salesforce Customers Need to Know About China’s Data Security Law

On September 1st of this year, China’s Data Security Law went into effect, including strict guidelines on data residency. Combined with the existing Cybersecurity law and the PIPL regulation to come into effect on November 1st, this creates new requirements for data storage and processing. Companies that do business in China may need to keep some data in China only. This has significant implications for global companies that rely on Salesforce.
Watch Now

Cyber Security in the Healthcare Industry

The healthcare industry in today’s world has experienced tremendous technological transformation. The developments have brought efficiency and significant benefits to care delivery. On the other hand, the industry faces increasing threats from cybersecurity issues.
Watch Now

Hacker vs CISO: How to Exploit/Protect the WFH Workforce

A Former Hacker and a Current CISO Face Off In today’s world where entire workforces were forced to move to an entirely remote work environment overnight, IT security leaders are facing new cyber attacks every day. Not only have hackers and adversaries become more sophisticated over the past decades, the hastily distributed work
Watch Now

Winning the Zero Trust Race with Micro-Segmentation

GuardiCore

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data. Originally conceived in 2010, the zero trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption. However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.
Watch Now