Browse Event Presentations
![]() | Why IAM is the New Perimeter in Public Cloud and How to Govern It |
![]() | Case Study: Obvious and Not-So Obvious Lessons Learned On the Path to Cloud-First IT |
![]() | Building the Next Generation Cybersecurity Workforce Cybersecurity as a field and threat to businesses is growing at a pace faster than we can train for or protect properly against. In this event presentation, ... Request to download |
![]() | Transforming Security for the Clouds NA Request to download |
![]() | The Future of a Secure Digital Transformation |
![]() | Cloud Security Posture |
![]() | Transitioning, Enhancing, and Innovating in the Cloud |
![]() | SSL/TLS Then and Now |
![]() | A Hackers Perspective, where do we go from here? |
![]() | Change is Simply an Act of Survival |
![]() | Data Protection Controls for the Cloud |
![]() | Identity Round Robin Workshop Serverless NA Request to download |
![]() | Taking Compliance to the Cloud |
![]() | Attackers Battle for Hijacked Resources |
![]() | Are Your Cloud Servers Under Attack? |
![]() | Shared Responsibility Model in the Age of Cloud |
![]() | Eight Ball For The Win: Key Cloud and Cybersecurity Trends for 2020 |
![]() | Security Leaders as Change Leaders |
![]() | Rethinking the Traditional Cloud Vendor Assessment Model: Proactive vs Reactive Vendor Security |
![]() | Tell Me a Story – The Art of Explaining Risks |