Lock Down: How to Keep your Important Data Safe in the Cloud

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

For security reasons, cloud computing presents a huge dilemma: How do you embrace the benefits of the cloud while maintaining security controls over your organization’s assets? It is difficult to determine whether the increased risks are truly worth the agility and economic benefits.

This shift in control is the #1 reason why new data security approaches and techniques are required. When an outside party owns, controls and manages infrastructure and computational resources, how can you be assured that sensitive data remains private and secure, that your organization is protected from damaging data breaches, and that you can still satisfy the full range of reporting, compliance and regulatory requirements?

In this session you will learn how to proactively address security in the cloud so that your organization isn't next week's data breach headline.

 

Speakers

Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Photo of Daniele Catteddu

Daniele Catteddu

Chief Technology Officer, Cloud Security Alliance

Photo of CJ Radford

CJ Radford

Vormetric, Vice President of Cloud

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.