Loading Events

Achieving Regulatory Compliance in the Microsoft Cloud

Home » Events » Achieving Regulatory Compliance in the Microsoft Cloud

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

September 16 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Sponsorship Contact

 

Send an email to

Overview

Regardless of the industry, most organizations report to unique regulatory bodies with their own set of requirements– and meeting those requirements only becomes more complicated when data and applications are stored in the cloud. And on top of that, many companies find themselves lacking direction around Data Loss Prevention (DLP), legacy data archiving, data classification, document tagging, third party access, and other issues that can bring your organization out of good standing with those regulatory bodies.

How can your company quickly adapt your cloud controls, standards, and processes to maintain compliance under changing conditions?

In this webinar, our group of experts will provide guidance on tools and resources for your organization to develop a roadmap to better tackle your compliance needs in the Azure cloud.

Moderator

Ken Dunham – Principal Consultant, Global Security Consulting Services

Ken Dunham brings more than 30 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence. He is very active in his visionary and leadership roles with World Wide Technology, Optiv, 4D5A Security, and Rampart Research. Mr. Dunham has a long history of innovation and highly successful ventures related to anti-virus, incident response, forensics, Darknet intelligence operations, responsible disclosure, and cyber-threat intelligence. He is also proud to have served the USAF as a contractor for innovation of new training solutions for U-2, Warthog, and Predator programs for pilots and navigators. Mr. Dunham also authored the 2015 ISSA article of the year, “Troubling Trends of Espionage”, has authored multiple books and thousands of computer security articles.

Mr. Dunham founded the Boise ISSA chapter and has been an active officer of ISSA since 2001. The Boise ISSA chapter also orchestrates a very successful annual Information Security conference. Mr. Dunham also serves as an ISSA Journal mentor. Ken Dunham has also been instrumental in other cyber security groups of the industry as a founder of the Idaho InfraGard chapter (FBI) and member/officer of groups like HTCIA and ISACA.

See Ken Dunham‘s full profile.

Speaker/s

Lisa Abshire – Cloud Managed Security Services, ACTS

Lisa Abshire is a dynamic professional with over 20 years of experience. She is a specialist in information and cyber security, technology and enterprise risk management, governance, and compliance in multiple industries and multiple geographies. She has spent most of her career in investment banking and financial services, and for last 10 years advised clients on strengthening their information security posture and implementing controls to manage risk. She has a Masters Degree in Advanced Information Systems Management from the University of New South Wales in Sydney, Australia and an MBA from the University of London. Lisa recently relocated back to the US from London and resides in Dallas, TX.

See Lisa Abshire‘s full profile.

Brendan Hoffman – Azure Service Manager, ACTS

Brendan is an Azure expert with a strong passion for enabling business acceleration and growth through cloud native technologies. He maintains a 300-400 level depth in core Azure Services (Compute, Networking, and Storage) and understanding current market trends and competitive insights. He is capable in multiple clouds including Amazon AWS and Google Cloud Platform.

Expert level knowledge and experience including Windows/Linux/MacOS, Microsoft 365 and Azure (IaaS/PaaS/SaaS), Azure Sentinel, Azure Security Center, Log Analytics, Splunk, PowerShell, IaC (Terraform, Azure Bicep, ARM Template), Azure Lighthouse, Cisco ASA/ISR’s, Firewalls (Palo Alto, CheckPoint, Fortinet, etc), VPN/MPLS/ExpressRoute, AAD/AD, ADFS, Exchange, SCCM, VMware ESX, Hyper-V, Wireless infrastructure, and security and compliance technologies.

See Brendan Hoffman‘s full profile.

Terry Baresh – Cybersecurity Solutions principal business Analyst, Securian Financial

Terry is the Enterprise Cybersecurity Solutions principal business analyst at Securian Financial. He was a co-author of the International Institute of Business Analysis (IIBA) Certificate in Cybersecurity Analysis, and an exam writer. Terry achieved the title Certified Business Analysis Professional (CBAP) in 2016 following a lengthy career in IT that included a range of positions and experiences. Terry also earned a SixSigma Brown Belt and practiced Lean and Kaizen methodologies in a high tech manufacturing enterprise. Terry is passionate about Business Analysis and Cybersecurity, applying his BA skills to engage with architects, engineers, regulatory and business leaders, analysts, and other stakeholders to promote secure designs to the organization's digital capabilities in a rapidly changing environment while recognizing the need to balance cost, efficiencies, and resources.

See Terry Baresh‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top