Agile infrastructure in the cloud requires special security


Using the cloud has many advantages, but it presents companies with new security challenges. In the webcast on January 27th, 2022 at 11:00 a.m. you will learn how you can secure your environment in the cloud through the entire development process.

speaker

Eugene Hinz

Channel Systems Engineer and Subject Matter Expert, Palo Alto Networks

Eugen Hinz has been a Channel Systems Engineer and Subject Matter Expert at Palo Alto Networks since May 2021. Eugen takes on the technical support and advice of partners in the field of Strata, Cortex and Prisma Cloud. For over 15 years he has been supporting companies of all sizes in the areas of consulting, implementation and troubleshooting and specializes in resolving complexities associated with increasing connectivity and inadequate security.

Martin Seiler

Martin Seiler

Heise Business Services

As IT editor at Computerwoche, Martin Seiler dealt with topics such as networks, telecommunications and security for many years. In 2006 he switched to the events division of IDG, for which he developed, organized and moderated specialist events of various kinds such as seminars, conferences, road shows and webcasts. Martin Seiler has been working for Heise Business Services since 2010.

Whether in the corporate environment or in private life, there is hardly a modern application today that can do without the cloud. Agile delivery models lead to faster availability of modern software. Teams from development, quality assurance and operations face new challenges when it comes to adapting the security standard to the new processes.

So many security officers in companies ask themselves:

  • How safe is my data in the cloud?
  • Who has access to this data?
  • Where are dangers and risks lurking?
  • How do I ensure that my cloud environment meets certain compliance guidelines?

In the meantime, not only some of the data is with the cloud providers, but in some cases the entire infrastructure including all data of a company. The exciting question today is therefore: How can I ensure the secure operation of my cloud environment?

Since the classic perimeter in the cloud no longer exists, every service that can be provided in the cloud can be accessed directly from the outside – sometimes even without the teams that created the service being aware of it. This is exactly what an attacker can take advantage of and start an attack in this way.

Eugen Hinz from Palo Alto Networks will show you in the webcast on January 27th how you can secure your environment in the cloud through the entire development process with security checks and thus gain a detailed overview and control over the cloud. He also answers your questions on the topic. The program is moderated by Martin Seiler from Heise Business Services.

Join Now!



Source link -64