A CISOs Guide to Effective Security Practices in Cloud Computing Environments

On-Demand Webcast|1 hour

With the potential of cost savings, reduced operational complexities, and speed to market, many organizations are migrating from on-premises and third-party data centers to Cloud computing environments.  However, accompanying these “cloud first” strategies are many challenges that include protecting confidential data and operating new security technologies. 
In this CISO Stories webinar, panelists share their experiences about migrating to and managing the security of Cloud environments. Guidance tools developed by a cross sector task force of CISOs are shared as well, highlighting: 
• Overview of Cloud services and Cloud Service Providers 
• Best Practices for migrating to the Cloud 
• Tools and services for managing the security of Cloud environments 
• Methods for protecting tenant data 
• Defining security roles and responsibilities for the tenant and Cloud Service Provider 
• Managing shadow IT Cloud implementations 
Join us for key insights and tools to help your organization effectively address security requirements in cloud computing environments.


Parham Eftekhari
Executive Vice President, Collaboration
CyberRisk Alliance

Parham Eftekhari is a recognized business executive in the information security sector with a lifelong passion for leadership, and community engagement. His expertise spans critical infrastructure technology and policy, business strategy and operations, executive advising, and thought leadership content initiatives.

Parham has published over a dozen information security reports, regularly engages with the media, and has contributed to countless briefings and events at institutions including TEDx, Congress, the World Bank, RSA, IFA+, (ISC)2, C-SPAN, and the Institute for Critical Infrastructure Technology (ICIT).

Tom Scurrah
VP, Cybersecurity Programs and Content
Cybersecurity Collaborative

For over 20 years, Tom has practiced as a cyber security professional as an executive director of information security for Verizon, a founder of two cyber security consulting firms, and Vice President of Content and Programs for the Cybersecurity Collaborative.

Tom is CEO of MyDataOnly, Inc., which offers privacy and security consultation and security (penetration) testing services. Tom began his career in IT in programming and strategic planning and later founded a customer satisfaction measurement firm.

Tom holds four security certifications (CISSP, CISM, PCIP) and one privacy certification (CIPP/US). He has a master’s degree from MIT’s Sloan School of Management and is a Marine Corps veteran.