Tuesday, April 23, 2024
Opening remarks and introductory presentation | Navigating the cloud: Unveiling the imperative shift, addressing challenges, and harnessing security advantages

The reality is that it is no longer a question of "if" you are moving to the cloud, it is a question of "when". It is not a battle; it is a digital transformation. There are several perceived challenges, but there are far more short- and long-term advantages. At the same time, there are very real risks that require diligence, attention and often assistance from the broader cybersecurity community. There are many cloud specific risks and an equal number of best practices. 

  • The security advantages of moving applications to the cloud compared to on premise
  • The perceived challenges in cloud deployments
  • How to compare the on-premise security model to the cloud world
  • Understand the greatest risks in the cloud environment
Paul Wagenseil David Cross
Breakout Session A | Protect your most critical enterprise application - the browser, with a zero trust approach to Browser Security

The browser is the most critical enterprise application and the most widely deployed. But browsers remain a security blind spot. Browsers rely on network and endpoint-based security controls to protect against internet-born threats, but fail to provide the necessary visibility and security controls, exposing enterprises to zero hour phishing, evasive malware and web exploits.
 
Join this session to learn how enterprises are taking a zero trust approach to Browser Security in order to shrink the existing risk gap and bring modern protection to every single user, no matter where they work.  Learn how robust Browser Security solutions help transform any browser into a secure enterprise browser and protect users from these highly evasive threats.

Neko Papez
Panel discussion | Above the clouds: Real-world tales of triumphs and tribulations in cloud security

Join seasoned experts as they unravel gripping narratives from the trenches, sharing firsthand accounts of triumphs, challenges, and pivotal moments in the pursuit of secure cloud environments. From thwarting sophisticated cyber threats to overcoming implementation hurdles, our panelists will bring these war stories to life, offering candid insights and practical lessons learned. Explore the dynamic interplay between innovation and risk mitigation in the cloud, and discover strategies that have proven effective in safeguarding organizations' digital assets. Whether you're a cloud security veteran or just setting out on your cloud security journey, this panel promises a riveting exploration of the real-world experiences that shape the future of cloud security.

David Cross Solomon Ugah Jason Kinder
CRA Business Intelligence study takeaways: Cloud security

Join Dana Jackson, CRA VP of research, and report author Daniel Thomas for a look at where security teams continue to struggle/succeed, and where respondents plan to make investments in the coming year.

Daniel Thomas Dana Jackson
Pitfalls of moving to the cloud | Conclusion & recap

Hidden obstacles lie in wait for companies migrating assets to the cloud. For example, many on-prem software licenses can't be ported to the cloud. Cloud service providers may overpromise what they can deliver or bundle in unwanted features. On-prem security tools often won't work well in the cloud. IT and security staffers may need heavy retraining. We'll explore the pitfalls, explain the benefits and debunk the myths about moving to the cloud.

Paul Wagenseil Jason Kinder