Free Trial
0 Results Found
              Back To Results
                Close Free Trial

                Three Key Principles for Managing Cloud Security Risk

                Understand the importance of cloud security, common misconceptions and how to go about managing the risk

                Speaker: Hadi Hosn, Head of Security Strategy and GRC Consulting, EMEA
                Recorded: August 1, 2017
                Duration: 60 Mins

                In this webcast you will learn:

                • 3 key principles for managing cloud security risk
                • 5 common misconceptions and how to avoid them
                • The 5 fundamental cloud security controls you should implement

                Whether you like it or not, the security industry is being cloudified.

                As IT moves into the Cloud, security must follow, and with IT losing its grip on the endpoint, Cloud is the only Security option. In addition, the Internet of Things continues to scale upwards, and Cloud computing will be its data repository, application engine, provisioning system and Security platform.

                Join Hadi Hosn, Head of Security Strategy & GRC Consulting in EMEA, as he explains why cloud security is so important, and provides guidance on key considerations when building out a cloud security program.

                View Your On-Demand Webcast

                All fields are required.

                We generate around 2 billion events each month. With Secureworks, we are able to crunch down that number to 20-30 high fidelity alerts — and that makes my team's job much easier.
                Sunil Saale, Head of Cyber and Information Security, Minter Ellison
                Taegis™ XDR isn’t just the next generation of SIEM, it’s an evolution.
                David Levine, CISO, Ricoh Group

                Why Secureworks?

                Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress with Secureworks® Taegis™, a cloud-native security analytics platform built on 20+ years of real-world threat intelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.