Managing Security In a Hybrid Cloud Environment

The enterprise cloud environment is not homogenous – enterprises spread their workloads across private data centers and different public cloud providers. How do you manage security when the tools are all different? How do you enforce security controls consistently across different clouds? In this webinar, experts look at the challenges of managing security in hybrid clouds and share techniques and strategies to create a cohesive security strategy that accounts for different vendors and platforms. You’ll get advice on ways to make security work seamless across clouds.

On Demand
1h 00min

Attend this webinar and you'll:

  • Learn best practices for identifying attack surfaces.
  • Get expert advice on managing multiple clouds and vendors.
  • Find out which security controls must be the top priority for any enterprise.

Featured Speakers

  • Jake Williams
    Jake Williams
    Executive Director of Cyber Threat Intelligence

    Jake Williams is a cybersecurity expert has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. He has worked with many government agencies in information security at federal, state, and local levels. Williams is an IANS Faculty Member and also works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

  • Qixuan Chai
    Qixuan Chai
    Senior Enterprise Security Architect

    Qixuan has over 7 years of experience in Cybersecurity and data protection. He previously worked for the government to protect the electrical grid by creating and leading a security operations center. He then went to L4, an autonomous driving start-up to design and implement a self-sufficient security architecture. Later, he joined Dataguise, which was then purchased by PKware to help customers to understand and implement a better Data Security.

  • Becky Bracken
    Becky Bracken
    Dark Reading

    Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.

Sponsored By