Sign up for our weekly newsletter!
REGISTER NOW
What You Can Do To Strengthen Security Over Your Clouds

Date: Tuesday, June 26, 2018
Time: 1:00 p.m New York/ 6:00 p.m. London
 
sponsored by
with participation from
Speakers
Maxine Holt, Research Director, Ovum

Scott Register, Vice President Product Management at Ixia, a Keysight Business

Cloud is transforming enterprises in every segment, yet security in the cloud may not be as strong as it should be. Responsibility for the security of data, applications, and services in the cloud remains with the enterprise, but control is limited. View this webinar to learn more about how cloud expands your attack surface and how your security architecture needs to adapt, to keep pace with cloud adoption. Find out how you can leverage your existing security solutions to keep your cloud data, applications, and customer experience safe from cyberattacks.



 

Maxine Holt, Research Director, Ovum
Maxine leads Ovum's security proposition, developing a comprehensive research program in this area to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong understanding of the challenges faced and how organizations can look to overcome these challenges.

Maxine rejoined Ovum in 2018, having spent over two years at the Information Security Forum (ISF) developing research in areas including Protecting the Crown Jewels and Securing Collaboration Platforms. Prior to the ISF, Maxine spent 15 years at Ovum covering topics including security, human capital management, and identity and access management. Maxine has a particular interest in how all the component parts of security combine to make up an organization's security posture.

Starting her career as a software developer in the financial services industry, Maxine gradually progressed into a systems analyst role and then moved into consulting for the financial services and internet sectors. She is a regular speaker at events and writes a monthly Computer Weekly article covering various aspects of information security.

close this window

Scott Register, Vice President Product Management at Ixia, a Keysight Business
Scott Register has more than 15 years of experience leading product management operations for global technology companies and is currently the vice president of product management leading the development of new Ixia products in the areas of Security, Virtualization and Cloud. Scott also spearheaded the company’s visibility product line prior to his current role.

Scott brings to Ixia a broad experience in managing enviable growth across a diverse range of environments, from embryonic to VC-backed startup to multi-hundred-million-dollar product lines. Innovative and energetic, Scott has a strong history of successful engagements with customers, channels, and business partners on a global basis.

Prior to Ixia, he led product management at BreakingPoint Systems where he was responsible for the industry's highest rated network performance, security, and resiliency testing equipment, before the company was acquired by Ixia.

Scott previously led product lines for Blue Coat, where he oversaw the successful launch of a new appliance suite designed specifically for low touch, rapid sales opportunities. At Check Point Software he managed all aspects of FireWall-1 product and a suite of supporting products including software management, load balancing, and intrusion protection systems.

He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology and also served as a member of the research faculty.

close this window

Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks
Brian is a Senior Product Marketing Manager for Palo Alto Networks, where he covers protections for mobile workforces and preventing credential-based attacks. He holds a Bachelor’s degree in Computer Engineering and is currently attending The Wharton School at the University of Pennsylvania.

close this window


Webinar Archive Registration

To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
Email Address *
Username *
Create a Password
Re-enter Password
First Name *
Last Name *
Job Title *
Company *
Address *
City *
State / Province *
ZIP / Postal Code *
Country *
Phone Number *
What is your area of business? *
If you selected "Other" above, please clarify your answer.
What is your job function? *
If you selected "Other" above, please clarify your answer.
Company Annual Revenues *
Employees in entire organization *
Please indicate your agreement to the Terms of Use for this web site. *
I agree to abide by the Terms of Use.
By registering for our site, your email will be added to our promotions list. We will send you information about upcoming webinars and events. You may unsubscribe at any time. If you unsubscribe, you will continue to receive any newsletters to which you subscribed. *
I agree
Occasionally our sponsors may want to send you information about exciting new products and services. If you would like to receive these solicitations, please check this box.
Please indicate your agreement to Light Reading's Webinar Agreement for this webinar. *
I agree to abide by the Light Reading Webinar Agreement (printed in the box below).
Latest Articles
Trend Micro has picked up on a new exploit dubbed 'Novidade,' which targets small business and home routers and changes their DNS settings to redirect the traffic as part of an attack.
A report from ESET finds 12 new Linux backdoor malware families in the wild that had previously been undocumented.
The MQTT and CoAP protocols that are crucial to IoT and IIoT operations have significant vulnerabilities that puts devices at risk, according to analysis from Trend Micro.
SD-WAN provides big benefits compared to traditional WAN connections between data centers and remote locations. However, authentication remains a concern. Here's why zero trust is a must.
Established threat groups and new players alike made for an active APTs scene this year, according to researchers with Kaspersky Lab.
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with