What You Can Do To Strengthen Security Over Your Clouds
Tuesday, June 26, 2018
1:00 p.m New York/ 6:00 p.m. London
with participation from
Cloud is transforming enterprises in every segment, yet security in the cloud may not be as strong as it should be. Responsibility for the security of data, applications, and services in the cloud remains with the enterprise, but control is limited. View this webinar to learn more about how cloud expands your attack surface and how your security architecture needs to adapt, to keep pace with cloud adoption. Find out how you can leverage your existing security solutions to keep your cloud data, applications, and customer experience safe from cyberattacks.
Maxine Holt, Research Director, Ovum
close this window
Maxine leads Ovum's security proposition, developing a comprehensive research program in this area to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong understanding of the challenges faced and how organizations can look to overcome these challenges.
Maxine rejoined Ovum in 2018, having spent over two years at the Information Security Forum (ISF) developing research in areas including Protecting the Crown Jewels and Securing Collaboration Platforms. Prior to the ISF, Maxine spent 15 years at Ovum covering topics including security, human capital management, and identity and access management. Maxine has a particular interest in how all the component parts of security combine to make up an organization's security posture.
Starting her career as a software developer in the financial services industry, Maxine gradually progressed into a systems analyst role and then moved into consulting for the financial services and internet sectors. She is a regular speaker at events and writes a monthly Computer Weekly article covering various aspects of information security.
Scott Register, Vice President Product Management at Ixia, a Keysight Business
close this window
Scott Register has more than 15 years of experience leading product management operations for global technology companies and is currently the vice president of product management leading the development of new Ixia products in the areas of Security, Virtualization and Cloud. Scott also spearheaded the company’s visibility product line prior to his current role.
Scott brings to Ixia a broad experience in managing enviable growth across a diverse range of environments, from embryonic to VC-backed startup to multi-hundred-million-dollar product lines. Innovative and energetic, Scott has a strong history of successful engagements with customers, channels, and business partners on a global basis.
Prior to Ixia, he led product management at BreakingPoint Systems where he was responsible for the industry's highest rated network performance, security, and resiliency testing equipment, before the company was acquired by Ixia.
Scott previously led product lines for Blue Coat, where he oversaw the successful launch of a new appliance suite designed specifically for low touch, rapid sales opportunities. At Check Point Software he managed all aspects of FireWall-1 product and a suite of supporting products including software management, load balancing, and intrusion protection systems.
He holds B.S. and M.S. degrees in computer science from Georgia Institute of Technology and also served as a member of the research faculty.
Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks
close this window
Brian is a Senior Product Marketing Manager for Palo Alto Networks, where he covers protections for mobile workforces and preventing credential-based attacks. He holds a Bachelor’s degree in Computer Engineering and is currently attending The Wharton School at the University of Pennsylvania.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
New research reveals that in the last nine months of 2018 there has been a 19x increase in cryptomining activity on the Internet.
It's better to hear about a data breach internally than by a security researcher who happens to discover a publicly exposed asset or confidential data for sale on a dark web.
The attack that fileless malware causes does not touch the disk of the target, loading the malware instructions only into memory. Sneaky.
The company has said that its goal is only to create a faster Internet, which allows for more use and hence more searches and thus more revenue for them.
Despite their rather innocuous name, ACE vulnerabilities can appear in just about any software. So here's what to do...
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.
An interview with Steve Grobman, CTO of McAfee