Video: Securing the Cloud Transformation Journey
In this 45 minute session, InfoTrust and Netskope cloud security experts covered;
- What are the new types of cloud-based threats businesses are faced with and how they can protect themselves against them?
- When businesses make the move from on-premise to cloud proxy, what are some of the common challenges they face?
- How can you gain visibility and control of your business’ shadow IT?
- What are the benefits of integrating technologies across your security architecture?
InfoTrust Principal Engineer, Richard Skeldon, hosted the session and was joined by Netskope Director of Systems Engineering – APAC, Geoff Prentis and ex-CISO, David Fairman. Richard, Geoff and David all shared their insights and experiences of the cloud transformation journeys they’ve been a part of and their advice to businesses.
To access the recording today fill in the form below.
You may also be interested in our white paper Cloud Transformation in a New Decade.
If you’d like to find out more about how InfoTrust and Netskope can help protect you from cloud-based threats and ensure security remains a priority on your cloud transformation journey contact us today.
see our
Related resources
In this 45 minute session, InfoTrust and Mimecast email security experts broke down the different types of prevalent email attacks by their tactics and how these can be mitigated.
We looked at the attack chain for;
- Phishing attacks
- Business Email Compromise and Spear Phishing
- Account Takeover Attacks
- Ransomware Attacks
Giving examples of how each tactic evades your traditional security controls, and why next-generation solutions – specifically Secure Email Gateways, are a necessity for businesses.
In July 2019, InfoTrust partnered with Symantec to host an Overcoming the Challenges of DLP webinar. In this session presenters; Saaim Khan, Security Practice Director of InfoTrust and Sean Callaghan, Senior Systems Engineer at Symantec covered;
InfoTrust and Insentra partnered together in September 2018 to produce a webinar to help answer some of the common questions asked by customers when considering a Data Loss Prevention solution. Together we covered;
1. What problems do DLP and CASB solutions solve?
2. Should your organisation be considering DLP or CASB?
3. What flavour of DLP & CASB do you need?
The first part of this webinar was run by InfoTrust’s Senior GRC Consultant, Saaim Khan, where he shared insights and strategies that have helped InfoTrust clients maximise their DLP technology investments.
For the first webinar in our Combatting Modern Email Attacks Series, we looked at email as a persistent threat vector and critical vulnerability requiring a layered security approach. The InfoTrust team analysed the human factor and how social engineering techniques evade traditional security measures.
To watch the recording of the webinar complete the form today.
In this 48 minute session called “Driving connectivity across your security ecosystem”, InfoTrust shared some of the ways in which we help our customers mature their security strategy, operationalise their security management and realise an optimal return on technology investments.
We were also joined by Neal Krempin, Head of IT at PICA Group, who shared some of the tactics their business has incorporated over the past few years to mature their security strategy.
During the webinar we covered;
- What do good security KPIs look like?
- Assessing your security posture
- What makes a good security roadmap
- Integrating your security platforms
To access the recording today fill in the form below.
We're Here To Help