- This event has passed so registration is closed.
The rapid increase in SaaS adoption has pushed technology innovation to new heights. With all the advantages that come with SaaS applications, it’s essential for companies to onboard providers as efficiently as possible. But SaaS adoption also introduces new cybersecurity risks, vulnerabilities, and policy changes.
Want to learn how to equip your team with the necessary tools to control the complexity, cost, and risks associated with managing SaaS apps — and cultivate a proactive and capable security culture?
In this session we’ll dive deep into how your organization and security program can benefit from:
• Gaining comprehensive visibility into all SaaS apps
• Identifying misconfigurations that can lead to data leaks
• Managing, optimizing, and reducing SaaS spend across apps
• Addressing the highly probable, high-impact risks associated with technology innovation
• Asking the right questions when time is of the essence
Betty currently serves on the ISSA International Board of Directors and is a past President of the MN-ISSA chapter. Betty has over twenty years’ experience in Information Technology and Information Security in positions of progressive responsibility and technical expertise. She has worked on information security planning, developing and delivering security programs. She is respected as a decision-maker and creative problem solver with demonstrated ability to achieve desired results while maintaining effective team cooperation. She has worked with several security regulations and standards including HIPAA, ISO17799, COBIT, Payment Card Industry Standard, NIST Standards and IRS Publication 1075. Betty is CISSP and CISA certified.
Justin Moss – Senior Sales Engineer, Axonius
Justin is passionate about informing industry practitioners on how to be proactive with their security tools and processes. Is a cybersecurity enthusiast with a CompTIA Security + certification as well as an extensive background in emerging cyber fields like Breach and Attack Simulations (BAS), Vulnerability Risk Management (VRM), Application Security, and Endpoint Protection by holding roles at companies like Rapid7, and CrowdStrike. He stays proactive in the workplace by creating and delivering workshops that bridge gaps be between security vendor solutions and practitioner needs.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.