Video: Securing the Cloud Transformation Journey
In this 45 minute session, InfoTrust and Netskope cloud security experts covered;
- What are the new types of cloud-based threats businesses are faced with and how they can protect themselves against them?
- When businesses make the move from on-premise to cloud proxy, what are some of the common challenges they face?
- How can you gain visibility and control of your business’ shadow IT?
- What are the benefits of integrating technologies across your security architecture?
InfoTrust Principal Engineer, Richard Skeldon, hosted the session and was joined by Netskope Director of Systems Engineering – APAC, Geoff Prentis and ex-CISO, David Fairman. Richard, Geoff and David all shared their insights and experiences of the cloud transformation journeys they’ve been a part of and their advice to businesses.
To access the recording today fill in the form below.
You may also be interested in our white paper Cloud Transformation in a New Decade.
If you’d like to find out more about how InfoTrust and Netskope can help protect you from cloud-based threats and ensure security remains a priority on your cloud transformation journey contact us today.
see our
Related resources
In this 45 minute session, InfoTrust and Mimecast email security experts broke down the different types of prevalent email attacks by their tactics and how these can be mitigated.
We looked at the attack chain for;
- Phishing attacks
- Business Email Compromise and Spear Phishing
- Account Takeover Attacks
- Ransomware Attacks
Giving examples of how each tactic evades your traditional security controls, and why next-generation solutions – specifically Secure Email Gateways, are a necessity for businesses.
In December 2019, InfoTrust’s Cyber Defence Team presented with Okta specialists on Zero Trust and how organisations can incorporate it into their security strategy. Our cloud security experts covered;
- What is Zero Trust and where did it come from? More than just a buzzword, a practical security strategy for businesses
- Why is Zero Trust needed as part of a holistic security strategy?
- The Zero Trust maturity curve and how your business can progress through it
- Frequently asked questions by organisations when on the Zero Trust journey
To watch the webinar recording fill out the form below.
In August 2019, InfoTrust’s Cyber Defence Team presented on the advanced threats that we are seeing in the market, and common email security challenges we help our customers solve in their ecosystem.
Richard, John, and Caitlin covered how your organisation can mitigate the risk of;
We're Here To Help