Loading Events

The Cost of Cloud Compromise and Shadow IT

Home » Events » The Cost of Cloud Compromise and Shadow IT

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

May 5, 2021 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Amelia Ghidotti

Contact

Lisa O'Connell

Overview

With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?

Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT.
In this session, we’ll cover:

  • The state of cloud usage in organizations
  • Security risks and practices to secure the cloud
  • Cloud compromises and the end user risk
  • The cost of compromised cloud accounts

Moderator

Kip Schroeder – Sr. Solutions Architect, Softchoice

Kip Schroeder is a Sr. Solutions Architect with Softchoice and lives with his wife in San Diego, California. He specializes in Cisco solutions though feels most at home assisting customers with their network security challenges. Kip has been with Softchoice since 2020 and prior to that twice worked for Cisco as a Sr. Systems Engineer for a total of 16 years. In between Cisco stints Kip traveled the world for a year and spent another two working for a manufacturer with a global footprint. In addition to his daily employment you can find Kip teaching network security principles as an adjunct instructor for a local community college. Throughout his career progression he has consistently gravitated toward security technologies earning his CISSP in 2005 along with a host of Cisco network and security certs along the way.

See Kip Schroeder‘s full profile.

Speaker/s

Itir Clarke – Manager, Product Marketing, Information and Cloud Security, Proofpoint

Itir Clarke is a Manager, Product Marketing for Proofpoint's Information and Cloud Security solutions. Before joining Proofpoint, Itir worked on data center products at Cisco, Brocade and Sun Microsystems. Itir has over 20 years of information technology experience in OEM Marketing, Product Marketing and Management roles. Her responsibilities at Proofpoint include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to Enterprise Data Loss Prevention, blogging about cloud and insider threats, definition and execution of campaigns and promotions, and sales enablement.

See Itir Clarke‘s full profile.

Larry Ponemon – Chairman and Founder, CIPP

Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy, data protection and information security practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework. Security Magazine named him one of the “Most Influential People for Security.”

Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, health care, pharmaceutical, telecom and Internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access and Security for the United States Federal Trade Commission. The White House appointed him to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also appointed to two California State task forces on privacy and data security laws.

See Larry Ponemon‘s full profile.

Lee Neely – Information Assurance APL, LLNL

Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely

See Lee Neely‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top