DIGITAL THINK TANK

Mitigating Risk & Driving Innovation

June 17th | 3PM-4:30PM BST

Security operations teams desperately need a simple way to successfully shift to the cloud

Security operations teams desperately need a simple way to successfully shift to the cloud. Limited visibility—due to shortcomings of legacy monitoring and security analytics technologies—handcuffs teams from making this crucial transition. Security professionals know the value of digital and cloud transformation, but the fear, complexity and mysteries of migrating critical infrastructure and tools make them understandably reluctant to start the journey. In striking a balance between risk mitigation and driving innovation, security leaders recognize that moving away from legacy solutions and to the cloud brings an array of benefits and opportunities, including improving cost efficiency, simplifying operational processes, and reducing staff burnout.

So, how do cloud-native technologies improve visibility for security teams? What are the challenges organizations face in their shift to the cloud? And why are business leaders reluctant to change?

Discussion Topics

What are the primary drivers of limited security visibility and how do cloud technologies remediate visibility challenges?

In this digital age, what are the benefits of moving to the cloud, and what are the associated challenges?

How can we equip our security Lieutenants with the correct technology and tools in order to reduce burnout and attrition, and keep critical talent in the business?

How do you prioritize your technology investments and what drives these decisions?

Jason Mical – SUBJECT MATTER EXPERT
Jason Mical – SUBJECT MATTER EXPERT

Cyber Security Evangelist, Devo

Jason Mical is probably best known as the “Father of the SilentRunner® technology”, the industry’s first full packet capture, network forensics solution of its kind, developed by the NSA and Raytheon. He is also the co-creator of the Resolution1/Fidelis Endpoint Platform, the industry’s first EDR solution. He assists clients in such areas as electronic intercepts, intrusion analysis, malware eradication, forensic investigations, incident response, security standards and guidelines. Jason also offers his expertise and consulting services to clients and other audiences on issues of both cyber and physical security investigations.

About Devo

TBC

Register to attend