With Shared Responsibility models being the tip of the iceberg, what are you doing to prepare for what’s lurking beneath?
As a consumer of cloud services, you are faced with numerous challenges. Whether you’re just dipping your toe in cloud or are all in, the complexity of the security landscape is ever changing.
Join R2, Orca Security, Palo Alto and our Keynote speaker from NSU, on May 24th as we delve into identity and access management, secure delivery, posture assessments and much more.
- Asset & Network Management
- Governance, Risk, Compliance
- SIEM
- AV/NGAV
- Firewalls
- DNS Filtering
- IAM/MFA
- Email Filtering
- User Training
- Encryption
- Network IDS/IPS
- SIEM
- Endpoint Detection & Response (EDR)
- Network Behavior Analysis
- Honeypots
- Sandbox Analysis
- SIEM
- Endpoint Detection & Response (EDR)
- Network Behavior Analysis
- GRC Tools
- Global Threat Feed Tools
- Security Operations
- Data Replication & Backup
- DR COOP Sites
- Disaster Recovery Plans
- Incident Response Plans