The State of Cloud Security: Results of the SANS 2019 Cloud Security Survey

Sysdig

Cloud is part of today's infrastructures, and infrastructures are part of clouds. Are security infrastructures maturing to support the business and improve risk management in the cloud model? How are organizations using the public cloud to meet their business needs? This webcast will explore the results of the SANS 2019 Cloud Security Survey, conducted in cooperation with the Cloud Security Alliance, concerning organizations' use of the public cloud and will provide actionable advice for attendees to improve their cloud security. Attendees will learn about the: Types of applications that are implemented most frequently through the cloud. Number of public cloud providers most organizations use.
Watch Now

Spotlight

MGM Resorts confirmed with News 3 that a cloud server containing information of previous guests was compromised in the summer of 2019. According to ZDNet, which initially reported the breach Feb. 20, stated the breach compromised the personal details of more than 10.6 million people who had previously at MGM Resorts hotels.

OTHER ON-DEMAND WEBINARS

Improve Security, Privacy and Compliance with Continuous Oversight

Isaca

The concept of monitoring information system security has long been recognized as sound and valuable management practice. For additional consideration, a large portion of compliance requirements for information security and privacy are supported by such monitoring. Security programs must be aligned with privacy and compliance programs to ensure those areas of data protection compliance are appropriately met and monitored, and then actions based on maturity levels must be aligned with information assurance programs.
Watch Now

Your Network Needs to Be the First and Last Line in Your Cyber-Security Defense

VMware

Most people think firewalls when it comes to network security and defending against cyber-threats. But with today’s increasingly sophisticated cyber-security threats, you need to think beyond firewalls to your entire network—from center to edge. In this webinar, we will take a look how network virtualization can extend your security from data center, to branch, to cloud, to edge. In this webinar, you will learn: The latest outlook on the growing cyber-security threats. How you can better protect your data center by focusing on your network.How to extend your network and security to branches and beyond with software-defined WAN.
Watch Now

Creating a Modern Identity Strategy for Hybrid IT Environments

| Sponsored

The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-time deployments and the hardware, softwa
Watch Now

THE DIFFERENCE BETWEEN ENDPOINT PROTECTION AND TRADITIONAL ANTIVIRUS

SentinelOne

Traditional antivirus solutions require a list of virus definitions - or "signatures" to detect known viruses and malware. But with nearly 1 million new malware threats released - every day, it is no wonder traditional antivirus can no longer cope. Learn the difference between traditional AV and Endpoint Protection. Discover the difference between signature-based and behaviour-based detection, and the fundamental differences between Antivirus and Endpoint Protection.
Watch Now

Spotlight

MGM Resorts confirmed with News 3 that a cloud server containing information of previous guests was compromised in the summer of 2019. According to ZDNet, which initially reported the breach Feb. 20, stated the breach compromised the personal details of more than 10.6 million people who had previously at MGM Resorts hotels.

resources