How a Security Company Secures its Own Cloud
Driving Office 365 adoption is an important goal—87% of IT professionals say it’s a top priority -- yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. Security companies too, face these same fundamental challenges. As a recent Office 365 adopter, Forcepoint has first-hand experience securely migrating users to the cloud.
Join Forcepoint’s CIO and Chief Scientist as they share learnings, surprises and insights from our own migration.
Presented by;
* Meerah Rajavel, CIO, Forcepoint
* Dr. Richard Ford, Chief Scientist, Forcepoint
TOPICS:
|
|
|
Is Your MFA Secure or Security Theater?
Join us as we talk about some of the trends that highlight the importance of multi-factor authentication (MFA) for protecting your workforce. While MFA is more widely deployed to better protect your applications and resources, these trends also highlight the inherent weaknesses of today’s MFA solutions.
We will review a strong authentication factor based on the FIDO2 standards that present its own challenges in balancing security against cost and productivity. Finally, we will address how to ensure you choose a modern authentication framework tailored to your business model and needs to develop a secure, cost-effective, and low-friction solution.
What you will learn:
- The critical role of MFA (and the factor you use) within your cybersecurity program
- The advantages of a strong authentication factor based on FIDO2
- Solving the risk management challenges of security vs. cost and productivity
- How to select a secure, cost-effective MFA solution
TOPICS:
|
|
|
Is Your MFA Secure or Security Theater?
Join us as we talk about some of the trends that highlight the importance of multi-factor authentication (MFA) for protecting your workforce. While MFA is more widely deployed to better protect your applications and resources, these trends also highlight the inherent weaknesses of today’s MFA solutions.
We will review a strong authentication factor based on the FIDO2 standards that present its own challenges in balancing security against cost and productivity. Finally, we will address how to ensure you choose a modern authentication framework tailored to your business model and needs to develop a secure, cost-effective, and low-friction solution.
What you will learn:
- The critical role of MFA (and the factor you use) within your cybersecurity program
- The advantages of a strong authentication factor based on FIDO2
- Solving the risk management challenges of security vs. cost and productivity
- How to select a secure, cost-effective MFA solution
TOPICS:
|
|
|
Secure your clouds by securing your keys
Entrust Data Protection Solutions are proud to introduce our new partner within EMEA - Sycomp, a global provider of innovative data centre, cloud and security services. This extended partnership will enable Sycomp to provide their customers across EMEA with an added level of security to protect critical business data and help meet compliance mandates.
With Covid-19 being a catalyst for most companies to adopt a more cloud-first approach we chose this as our first joint webcast topic. We all know the cloud offers the benefits of agility and scalability - but these benefits don’t come without their security challenges.
Join Entrust and Sycomp live on May 25 where we will provide a brief 101 on Hardware Security Modules (HSMs) and then discuss the top 6 use cases that are helping our customers secure both their journey to the cloud and their cloud data while maintaining control of all encryption keys:
• BYOK – Bring your own key to maintain control with Cloud Service Providers
• DKE - Double Key Encryption to protect your most sensitive Microsoft O365 assets
• Migrating data to the clouds, including using multiple cloud service providers
• Managing the proliferation of information silos, credentials and secrets using ready-made integrations for CyberArk, BeyondTrust, HashiCorp and Thycotic
• Deploying containers at scale utilizing high assurance crypto
• Encrypting virtualized workloads – but what do I do with all the keys?
TOPICS:
|
|
|
Security Practices for a More Secure Cloud
The cloud is full of potential – but also unwanted risks and guests. Threat actors of all skill levels and intentions seek to disrupt, destroy and derail your utilization of cloud hosting for your critical data workloads. How do you defend against this menace? Join Armor and (ISC)2 on June 22, 2017 at 1:00PM Eastern for a discussion on securing and maximizing your cloud investment. We’ll examine the expertise needed, the need to share responsibilities, leveraging proven and emerging technologies and the role integration and automation plays.
TOPICS:
|
|
|
Secure Every Second
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation.
Sysdig. Secure Every Second.
TOPICS:
|
|
|
Would you like security with that?
FIPS, Common Criteria, Encryption, Immutability
TOPICS:
|
|
|
Symantec Protection Suite Enterprise Edition
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
|
|
|
Symantec Protection Suite Challenge
Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
|
|
|
Women in Security SIG: The intersection of space security and cyber security.
As the United States becomes more reliant on satellites for every day life such as ATMs and gas machines, cyber attacks are now occurring in space. Tune into to hear about what is on the horizon for space security and you.
TOPICS:
|
|
|