Assuring and Implementing Cybersecurity and Data Protection for Public Clouds
- LANGUAGE: English DATE: Tuesday, October 16, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
How to Ensure Confidential Cooperation by Moving From Infrastructure Security to Data Security
But things have changed substantially: The traditional security perimeter is proving to no longer be an effective cybersecurity control and fast-growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry. Protecting sensitive resources of modern organisations, which are becoming increasingly logically and geographically distributed, is becoming a challenge. Sensitive data and critical business processes need to be adequately protected, no matter where they are deployed and from where they are accessed.
The perimeter has moved, and organizations need to move with it.
Join this KuppingerCole Webinar to learn more about
- Which additional risks have to be considered when using cloud infrastructures and which approaches make sense for appropriate mitigation.
- How to use Microsoft Office 365, SharePoint and other public cloud services while ensuring the necessary security and complying with all data protection and compliance requirements.
- How to successfully deny cybercriminals access to your business-critical information.
In the first part of this webinar Matthias Reinwarth, senior analyst and lead advisor with KuppingerCole, will talk about the security and governance challenges of cloud environments in general and how to approach those in a structured manner.
In the second part of the webinar, Dr. Bruno Quint, Director of Cloud Encryption at Rohde & Schwarz Cybersecurity, will introduce the key components of data-centric security. He will explain how to securely share confidential data for trusted collaboration across any infrastructure while taking advantage of modern and agile cloud computing.
Mühldorfstraße 15 • 81671 München • Germany
Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT solutions are developed following the security-by-design approach. More than 500 people are employed at locations in Germany, France, Spain and the Netherlands.
- Contact person:
Mr. Levent Kara
+49 211 23707710
- Oct 16, 2018 4:00pm CEST, 10:00am EDT, 7:00am PDT
Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.
The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.