More than half of sensitive data has moved to the cloud, and there is a furious battle between the cloud providers to win over the remaining enterprise data. In order to overcome objections and concerns about data security and compliance, the cloud providers have added a multitude of encryption, key management, and hardware security module (HSM) services and APIs to the cloud offerings. These solutions are proprietary and typically have unique names, differentiating capabilities, limitations, and abbreviations! Where does an IT and compliance professional begin to understand the options available to them? A good start is learning from the panel of experts we have assembled to decipher the cloud providers' acronyms and services.

The takeaways for this training include:

•  Trends that created the broad need for cloud security options
•  Definition and architecture of leading cloud provider offerings
•  Status of standardization for cloud key management
•  Demonstration of multi-cloud key life cycle management
•  Questions answered live with panel of experts

Generously Supported By:

supported by logo
speaker photo
Charles Goldberg
VP, Product Marketing, Thales
speaker photo
Mike Gardiner
Solutions Architect, Thales
speaker photo
Gorav Arora
Director of Technology, Data Protection, CTO, Thales
speaker photo
Tom Bechtold
Digital Event Director, SecureWorld