View, browse and sort the ever-growing list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App, once live.
Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.
Robert LaMagna-Reiter (Sr. Director, Information Security / CISO, First National Technology Solutions)
Date: Wednesday, May 22
Time: 2:30pm - 3:20pm
Pass type: All Access, Conference - Get your pass now!
Track/Topic: Security, Cloud
Format: Conference Session
Vault Recording: TBD
Audience Level: All
Shadow IT. Sounds scary, right? Unsanctioned apps. What does that even mean? CASB. Tell me more! A Cloud Access Security Broker (CASB) is much more than a tool that discovers shadow IT. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive data exposure and prevent malware propagation. As the cloud-first model continues to accelerate, organizations are turning to SaaS applications for flexibility and agility. Unfortunately, the majority of SaaS application usage occurs outside of organizational processes and control. How do we regain assurance, risk mitigation and enable the business without disruption?
CASB solutions enable Information Security, Risk Management & Audit professionals to gain insight to existing SaaS application usage, enable security & compliance controls, & allow the organization to operate nimbly without establishing roadblocks. Deployment options exist to accommodate multiple operating models – learn the differences and understand how a CASB solution enables the Information Security & Risk Management functions to deliver on their ability to audit, detect, and protect SaaS applications & associated company data.
• Describe the features & benefits of a CASB solution.
• Understand the various CASB deployment methods & determine which is most appropriate for your business.
• Determine how a CASB can benefit your organization and augment the information security & risk management program.
• Control SaaS applications, prevent sensitive data leakage and enable secure SaaS usage.