Find out what's inside the August 2021 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
Cybersecurity for a long time revolved around the central idea of the classic network perimeter, driven by the theory—inside is trusted and outside must be verified. When the cloud burst onto the enterprise IT landscape, many organizations resisted cloud migration because it infringed on the traditional concept of the network perimeter. Moving data and applications outside the data center into the cloud meant no control over user access and data security.
Today, the enterprise IT landscape is undergoing a radical transformation. The impact of the COVID-19 pandemic has irrevocably altered workplace dynamics. Retail office spaces have closed doors and organizations have shifted to long-term remote work. To support modern workforce needs, organizations are rapidly moving data and applications to multi-cloud and hybrid-cloud environments. The once trusted network perimeter is slowly disappearing. And cloud security has yet again become a top priority for business leaders. Thankfully, cybersecurity has evolved significantly, shifting the focus from network to identity as the new perimeter. And, machine identity is the modern approach to cybersecurity in a perimeter-less environment.
Machine identity-driven solutions such as Public Key Infrastructure (PKI) and CLM (Certificate Lifecycle Management) help organizations take complete control of all digital assets and enable secure online communication regardless of where they are located. This helps build a fluid and agile cybersecurity model that is identity-first and location-independent.
Join this webinar to understand how machine identity is redefining cloud security for today’s distributed and hybrid IT environments and helping organizations build cyber-resilience.
Lee Neely – Senior IT & Security Professional, LLNL
Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely
Muralidharan Palanisamy – Chief Solutions Officer, AppViewX
Passionate enterprise technology influencer, currently overseeing Innovation, Strategy and Product Direction to enable Customers achieve friction-less application deployment using Automation at AppViewX.
As Chief Solutions Officer, Murali is responsible for the overall product vision, development, and technical direction of AppViewX. Before joining the company, he served as Senior Vice President at Bank of America, where he led an architecture and engineering team of e-commerce application delivery.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.