What You Can Do To Strengthen Security Over Your Clouds
Tuesday, June 26, 2018
1:00 p.m New York/ 6:00 p.m. London
with participation from
Cloud is transforming enterprises in every segment, yet security in the cloud may not be as strong as it should be. Responsibility for the security of data, applications, and services in the cloud remains with the enterprise, but control is limited. View this webinar to learn more about how cloud expands your attack surface and how your security architecture needs to adapt, to keep pace with cloud adoption. Find out how you can leverage your existing security solutions to keep your cloud data, applications, and customer experience safe from cyberattacks.
Maxine Holt, Research Director, Ovum
close this window
Maxine leads Ovum's security proposition, developing a comprehensive research program in this area to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong understanding of the challenges faced and how organizations can look to overcome these challenges.
Maxine rejoined Ovum in 2018, having spent over two years at the Information Security Forum (ISF) developing research in areas including Protecting the Crown Jewels and Securing Collaboration Platforms. Prior to the ISF, Maxine spent 15 years at Ovum covering topics including security, human capital management, and identity and access management. Maxine has a particular interest in how all the component parts of security combine to make up an organization's security posture.
Starting her career as a software developer in the financial services industry, Maxine gradually progressed into a systems analyst role and then moved into consulting for the financial services and internet sectors. She is a regular speaker at events and writes a monthly Computer Weekly article covering various aspects of information security.
Scott Register, Vice President Product Management at Ixia, a Keysight Business
close this window
Scott Register has more than 15 years of experience leading product management operations for global technology companies and is currently the vice president of product management leading the development of new Ixia products in the areas of Security, Virtualization and Cloud. Scott also spearheaded the company’s visibility product line prior to his current role.
Scott brings to Ixia a broad experience in managing enviable growth across a diverse range of environments, from embryonic to VC-backed startup to multi-hundred-million-dollar product lines. Innovative and energetic, Scott has a strong history of successful engagements with customers, channels, and business partners on a global basis.
Prior to Ixia, he led product management at BreakingPoint Systems where he was responsible for the industry's highest rated network performance, security, and resiliency testing equipment, before the company was acquired by Ixia.
Scott previously led product lines for Blue Coat, where he oversaw the successful launch of a new appliance suite designed specifically for low touch, rapid sales opportunities. At Check Point Software he managed all aspects of FireWall-1 product and a suite of supporting products including software management, load balancing, and intrusion protection systems.
He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology and also served as a member of the research faculty.
Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks
close this window
Brian is a Senior Product Marketing Manager for Palo Alto Networks, where he covers protections for mobile workforces and preventing credential-based attacks. He holds a Bachelor’s degree in Computer Engineering and is currently attending The Wharton School at the University of Pennsylvania.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
Researchers have successfully simulated an attack on an electrical power grid that employs IoT devices to trigger a blackout.
Foreshadow vulnerabilities expose processors and even the cloud to penetration.
Researchers presented a study at DEF CON that showed that a third of congressional candidates' websites are vulnerable to attack, adding to threats already seen by some politicians.
Researchers for the cybersecurity company found a way to exploit vulnerabilities in the fax system of an HP OfficeJet inkjet all-in-one printer to gain access to all systems on a network.
Persisting problems with identity and access management combined with usability demands are influencing the IAM market. But will enterprise IT step up its IAM game?
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.
An interview with Steve Grobman, CTO of McAfee