Find out what's inside the October 2021 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?
Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT.
In this session, we’ll cover:
- The state of cloud usage in organizations
- Security risks and practices to secure the cloud
- Cloud compromises and the end user risk
- The cost of compromised cloud accounts
Kip Schroeder – Sr. Solutions Architect, Softchoice
Kip Schroeder is a Sr. Solutions Architect with Softchoice and lives with his wife in San Diego, California. He specializes in Cisco solutions though feels most at home assisting customers with their network security challenges. Kip has been with Softchoice since 2020 and prior to that twice worked for Cisco as a Sr. Systems Engineer for a total of 16 years. In between Cisco stints Kip traveled the world for a year and spent another two working for a manufacturer with a global footprint. In addition to his daily employment you can find Kip teaching network security principles as an adjunct instructor for a local community college. Throughout his career progression he has consistently gravitated toward security technologies earning his CISSP in 2005 along with a host of Cisco network and security certs along the way.
Itir Clarke – Sr. Product Marketing Manager for CASB, Proofpoint
Itir Clarke is a Senior Product Marketing Manager for Proofpoint's Cloud App Security solutions. Before coming to Proofpoint, Itir worked with server products at Cisco and was at Brocade before that. Itir has over 19 years of information technology experience in Product Marketing and Management roles.
Larry Ponemon – Chairman and Founder, CIPP
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy, data protection and information security practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework. Security Magazine named him one of the “Most Influential People for Security.”
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, health care, pharmaceutical, telecom and Internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access and Security for the United States Federal Trade Commission. The White House appointed him to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also appointed to two California State task forces on privacy and data security laws.
Lee Neely – Senior Security Professional, LLNL
Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.