Migrating On-Premises Security Controls to the Cloud

As enterprises increasingly move traditional, data center-based applications and storage to the cloud, they face a variety of security challenges.

In this informative webinar, top experts in cloud security discuss the transition of legacy, on-premises security systems to the cloud, and how your organization can protect your data and operations against potential threats while expanding your use of cloud services.

On Demand
1h 00min

When you attend this webinar, you'll:

  • Discover the security strengths and pitfalls of businesses' common cloud migration strategies
  • Identify what gaps in your security coverage might open up during a transition to the cloud
  • Open your eyes to new cloud-based, cloud-native security solutions that could both maintain or even improve the security posture your environment demands

Featured Speakers

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

  • Matthew Gardiner
    Matthew Gardiner
    Senior Product Marketing Manager

    Matthew Gardiner is a Senior Product Marketing Manager at Mimecast and is currently focused on email security, phishing, malware, and cloud security. With more than 15 years focused in security, Matthew’s expertise in various roles includes threat detection & response, network monitoring, SIEM, endpoint threat detection, threat intelligence, identity & access management, Web access management, identity federation, cloud security, and IT compliance at RSA, Netegrity, and CA Technologies. Previously he was President and a member of the board of trustees of the security industry non-profit, the Kantara Initiative. Matthew has a BS in Electrical Engineering from the University of Pennsylvania and an SM in Management from MIT's Sloan School of Management.

  • David Soto
    David Soto
    Executive Director, Executive Advisory, Office of the CISO

    David Soto brings over 20 years of technical and information security management experience to his current role. As an executive director, executive advisory in the Office of the CISO at Optiv, Soto utilizes his past and present experiences to assist executives in aligning their cyber security roadmaps to the business. Using his information security expertise, Soto assists organizations in moving from a tactical to a strategic approach and tackling issues such as incident management, vulnerability management, security operations and application security.
    As a subject matter expert in cyber security solutions and information security programs, Soto’s broad technical and business process knowledge spans multiple disciplines including change management, IT service continuity management, capacity management, availability management, service-level management, service asset and configuration management, information security management, defense in depth, incident management, vulnerability management and policy and standard development. Prior to Optiv, Soto architected, managed and implemented information security programs at Pacific Life, Infonet and as a consultant at SSN. His expertise includes ISO27001, SOX and HIPAA. Soto’s other experiences include roles in consulting, non-profit, local government, financial and higher education. Soto has held many industry certifications including but not limited to ITIL, Check Point Certified Security Expert (CCSE), Certification in Control Self-Assessment (CCSA), HP-UX, Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA) and Certified Ethical Hacker (CEH).

Sponsored By