Saturday, November 30, 2024
Loading Events

« All Events

  • This event has passed.

Operating a Security Program in a Cloud or Hybrid Environment

September 15, 2020 @ 11:30 am - 1:00 pm

An overview of relevant cloud concepts, common mistakes, and tips for evaluating your operating risks and efficiencies in the cloud.

Presenter: Roger Delph, CCSP, CISSP Senior Manager, Security and Privacy, Protiviti

Event Type: Chapter/Luncheon Meetings

Date: Tuesday, September 15, 2020

Time: 11:30am – 1:00pm PT

Location: Virtual Meeting

Pricing: Members – Free; Non-members – $15

Instructional delivery method: Online

CPE credit(s): 1 hour

Advanced preparation: None required

Event Details:

Cloud assets were involved in about 24% of the data breaches in 2020. Organizations are struggling with how to structure their cybersecurity and risk management programs in cloud-native and hybrid-cloud environments. Operating in the cloud is not inherently more or less secure than traditional on-premise facilities; however, companies need to adapt to cloud architectures and concepts to be protected. Organizations need to understand the frameworks and resources available to help them configure and audit their cloud footprints, and they need to know where the risks reside. In this webinar, we will provide an overview of relevant cloud concepts, discuss common mistakes organizations make when they move to the cloud, review resources that can assist you in evaluating your operating risks and efficiencies in the cloud.

Presenter Bio:

Roger is a top-performing and results-driven information security leader with broad-based expertise safeguarding critical and confidential applications, systems, and infrastructure for multiple Fortune 500 corporations. Roger started his career at Microsoft as a Lead Operations Engineer, and prior to joining Protiviti, Roger spent 7 years at Expedia Group, most recently as a Principal Architect – Enterprise Risk & Security. In his previous industry experience, he led a multimillion-dollar initiative to implement a cloud security program across numerous application architectures, engaged in an analysis of business operations that served as the foundation for the development of risk profiles, as well as technology and operational controls.

Refund Policy: Refunds up to 1 day before event

Consent for Photos, Audio and Video Recordings Taken at Events or for Marketing Purposes:

By attending this event I agree irrevocably and free of charge that ISACA or any third party who is acting on ISACA’s behalf may create images, videos and/or sound recordings of me (“works”) at the event for marketing purposes. For these purposes, the granting of rights in the works also includes the rights to adapt, reproduce, distribute, perform, making available to the public, broadcast, retransmit or sublicense the works to ISACA’s affiliates. The granting of rights in the works also includes all current and future media, goes beyond the repetition of an event and is not restricted to time or territory.

View ISACA Puget Sound Chapter’s Privacy Policy >>

https://engage.isaca.org/pugetsoundchapter/privacypolicy

For more information on this topic and our speakers, please see our website at www.isaca-psc.org