What's Your Cloud Adoption Strategy?

Cloud technologies are now mature and ubiquitous. Many organisations have intentionally chosen to move workloads to the cloud, while others may still be unaware that their users are sending sensitive corporate information to cloud service providers of unknown quality.

Whatever the stance of your organisation it’s almost certain that unless a desired cloud service is offered formally, users will seek out their own.

In this 30 minutes webinar, you'll learn how  :

  • Combining encryption, network, and visibility security controls into your cloud adoption strategy 
  • These strategies will help lower the risk of unauthorised cloud usage and mitigate the impact of a cloud-based breach

Date: Thursday, 20th September 2018
Time: 11:00am AEDT

Signup for webinar

Speakers

Time Event Plan
11:00am
Introduction
11:05am
Presentation by Ken Pang
11:40am
Q&A Session