eSummit

The Cloud and Your Workforce: Winning the great cloud migration

Live Broadcast | -

Earn up to 6.5 CPE credits by attending this virtual event.

The adoption of cloud-based services among the workforce has surged in the era of COVID-19, and yet the business world is struggling with a dearth of infosec professionals who are trained and specialized in cloud security. To compensate, security leaders must understand and overcome the latest cloud-based threats targeting their employees, while relying on creative recruitment and upskilling to secure the cloud talent they desperately need. Don’t get “lost in the cloud.” Attend this eSummit on October 25-26 to learn more about topics like: 

  • CyberRisk Alliance’s exclusive cloud security research
  • Advice on recruiting, training and upskilling cloud security talent
  • How to shield your workforce from today’s cloud-based phishing and ransomware scams
  • Best practices for avoiding cloud misconfigurations, leaks and breaches

Tuesday, October 25 Agenda

OPENING KEYNOTE | Rewriting the security awareness training manual for the cloud era

Ira Winkler: Chief Security Architect, Walmart

Developing an effective security awareness program is never easy. Employees can tend to tune out key lessons if not properly motivated and engaged. And now the widespread adoption of cloud-based and hybrid IT models have added a whole new level of complexity to these lesson plans. Which leads us to the question: To what extent do CISOs and security awareness program managers need to rewrite their training manuals and cyber hygiene policies in order to factor in the latest cloud-based threats? This session will examine how security awareness programs must evolve to reflect the impact that cloud-based services have had on the way we all do business?


Walking the line: shift left security and what it means for modern app development
David Puzas: Director Product Marketing, Cloud Security, CrowdStrike

It’s no secret that the cloud-native cybersecurity threat landscape is intensifying. In a developer security survey conducted by ESG and sponsored by CrowdStrike, nearly all respondents reported that their organizations have encountered cloud security incidents and related consequences in the past year. Most respondents indicated their organizations have faced a variety of security incidents and related consequences tied to their internally developed cloud-native applications. To address these challenges many organizations are turning to a shift left approach to securing modern apps. In this session David Puzas, Director of Product Marketing, Cloud Security at CrowdStrike, will:

• Share the key findings of the ESG report, and the numbers behind them, that drive the need to incorporate security into development processes.
• Walk through the challenges IT and cybersecurity professionals are facing with faster cloud-native development lifecycles.
• Describe approaches to prioritizing the adoption of a developer-focused security strategy to secure the threat landscape.


1Password’s masterclass: security tactics vs. proven security theatre
Adam Pike: Solutions Architect, Password1

Many password myths and security policies make things less secure for everyone and harder to stay safe online. Learn how to spot and avoid security theatre.


Wednesday, October 26 Agenda

Securing Cloud Workloads With Context-Rich Insights
Maristelle Bagis Hosaka: Director, Product Marketing, Fortinet

As digital transformation and cloud adoption continue to accelerate, cybercriminals are getting smarter about the ways they are able to gain access to your network. Cloud-native protection platforms that natively integrate with Cloud Service Providers’ security services can provide a comprehensive, full-stack cloud security solution for securing cloud workloads.

However, many organizations are still struggling with data overload and security teams are not able to separate through the noise to get to the core concerns that matter most. By simplifying cloud security and proactively managing cloud risk, organizations can contextualize security findings and prioritize the most critical resources with actionable insights.

Join this discussion to learn more about:

• Insights on simplifying cloud security across cloud platforms
• Ways to Increase productivity with context-rich, actionable insights
• Actionable ways to maximize the value of your security investments


KEYNOTE | The quest for cloud security talent: Recruiting, training & upskilling

Kris Rides: CEO and Co-founder, Tiro Security

Cloud security has quickly become its own unique cyber specialization, and organizations are desperately scavenging the cyber workforce to find IT personnel with skills and expertise in this particular area. With such high demand, it’s definitely become an employee’s market, so companies are going to have to be creative and resourceful as they seek to build their rosters of cloud security talent. This session will look at strategies for recruiting, training and upskilling cloud security professionals, while highlighting the specific job attributes and cloud-based experience you should be looking for.


Aligning your app development team’s needs with your CISO’s cloud security needs
Sean Heide: Research Analyst, Cloud Security Alliance
Ashwini Siddhi: Senior Principal Product Security Provider & Threat Modeling Service Owner, Secure Design Services, Dell EMC

Your app developers want easy, convenient access to their cloud-based workloads and the proprietary data and source code within. On the other hand, your cyber leaders need to implement a series of safeguards in order to limit unnecessary access to projects and protect assets from intellectual property theft or sabotage. This panel session will look at how to formulate a cloud-based DevSecOps strategy that strikes the right balance between efficiency and security.


CLOSING KEYNOTE | The cloud and SMBs: new opportunities, new dangers

Karen Evans: Managing Director, Cyber Readiness Institute

Cloud-based services are a godsend for many small and medium-sized businesses, since they often lack the internal resources and personnel to manage all of their business functions and data storage internally. But with these new conveniences comes a dark side — as the cloud opens up new areas of risk that end-user organizations may not be adequately prepared to tackle. Making matters worse, smaller businesses may not have the internal IT/cyber expertise to detect and quell cloud-based threats or help spread awareness about proper cloud conduct. With that in mind, this session will look at cloud-based risk from an SMB perspective, offering tips on cyber hygiene best practices that businesses of any size should be able to follow.


*Please check back for updates to this agenda*

Sponsors

0%