Interop is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

2019 Schedule Builder | 2020 Coming Soon

View, browse, and sort the ever-growing list of sessions by pass type, track, and format. With this Schedule Builder, you can build your schedule in advance and access it during the show via export or with the mobile app, once live. For your schedule to sync properly with the mobile app, be sure to login to Schedule Builder with the same email address you used to register for Interop 2019.

Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.

Using Cloud Access Security Brokers to Stop SaaS Data Leaks

Robert LaMagna-Reiter (Chief Information Security Officer, First National Technology Solutions)

Location: Grand Ballroom G

Date: Wednesday, May 22

Time: 1:30pm - 2:20pm

Pass type: All Access, Conference - Get your pass now!

Track/Topic: Security, Cloud

Format: Conference Session

Vault Recording: TBD

As the cloud-first model continues to accelerate, organizations are turning to software-as-a-service applications for flexibility and agility. Unfortunately, the majority of SaaS application usage occurs outside of organizational processes and control. How do we regain assurance, evaluate risk mitigation, and enable the business without disruption?

Enter the CASB. A cloud access security broker (CASB) is much more than a tool that discovers unsanctioned apps and other "shadow IT." It's a means to control SaaS usage, detect sensitive data exposure, prevent malware propagation, and enable security and compliance controls while allowing the organization to operate nimbly.

In this session, learn about the various features and benefits of CASB tools; learn the differences between CASB deployment methods; determine which method is most appropriate for your business; determine how a CASB can augment your information security program; and learn how to enable more secure SaaS usage and prevent data leakage.

Presentation File