Myth or Reality: Insider Threat Victims DON'T Have Their Heads in the Cloud

We can safely predict that an insider threat targeting cloud will be the cause of a major data breach over the next 12 months. While cloud insider threats consistently rank as a top concern, they have not been decomposed and mitigated like enterprise exploits. We will uncover threat vectors and behavioural traits and present new techniques for discovering and mitigating cloud insider threats. This webcast will also include a breakdown and comparison of different cloud models.
Watch Now

Spotlight

The cloud delivers on-demand, distributed access to the information and services we rely on to run our lives and businesses. While employees are meeting, searching, banking, purchasing and working on the go, enterprises are using the cloud to fuel new business models, generate revenues and create a competitive advantage.


OTHER ON-DEMAND WEBINARS

Cloud Computing and the Future of the Sysadmin

BoldLink - SIG

Cloud computing is the biggest revolution after the Industrial Revolution after the Eighteenth Century. The profound changes and Impact Cloud as with the Everything-As-A-Service movement has in your economy is everywhere. Follow me while we focus on how this ever evolving and growing technology is disrupting the System Administrator and Developer of tomorrow.
Watch Now

Are You Evaluating VoIP Solutions? Top 5 Mistakes to Avoid

mindSHIFT

Watch this informative webinar to find out how to avoid making costly mistakes when searching for a VoIP business telephone solution. Discover how hosted VoIP satisfies the phone, security and network needs of small and medium-sized businesses in one easy-to-understand package.
Watch Now

THE ELASTIC PERIMETER: SECURE WHAT MATTERS IN AN AGE OF DEVOPS, CONTAINERS AND CLOUD

Evolving threats and ongoing shifts in how we deploy services are putting security teams at a distinct disadvantage unless they shift their thinking and expand their strategy. The elastic nature of modern virtualized infrastructure compounds these issues. In this webinar Johna Till Johnson, CEO and Founding Partner of Nemertes Research, will share best practices and answer critical questions facing security professionals today:How has the security landscape changed in the last year?What are the new imperatives for security teams moving forward?How can we move security at the speed of DevOps?What are the key ingredients of modern security platforms?
Watch Now

Silos be Gone: Transition Data to the Cloud Your Way

IBM

It's hard to access and manage data that reside in disparate systems. The need to offer new services quickly on the cloud adds more complexity. While no two clients are alike, there are key considerations when choosing a cloud or a hybrid cloud environment. Depending on available skills, budget, time to market, and regulatory requirements, not all applications or services are suitable for cloud computing. So which cloud environment is right for you?In this presentation, we will go over general applicability for public vs. private cloud, reasons for dedicated service in either environment, and whether or not a managed service is right for you.
Watch Now

Spotlight

The cloud delivers on-demand, distributed access to the information and services we rely on to run our lives and businesses. While employees are meeting, searching, banking, purchasing and working on the go, enterprises are using the cloud to fuel new business models, generate revenues and create a competitive advantage.

resources