Secure your Public IaaS: Do you have an IaaS securitization strategy?

This webinar occured on June 19, 2014

About This Webinar

Organizations looking to take advantage of any of the public IaaS benefits must secure their new environment. Control, visibility, data security, management, and compliance must be achieved to ensure data protection and secure operations from creation to decommission.

During this webinar we discussed:

  • What are the main risks associated with a new IaaS environment?
  • What security controls can consumers expect their vendors to provide?
  • How can a consumer evaluate a vendor's controls?
  • What technologies can be deployed across cloud and internal environments?
  • How can security collaborate with the IaaS project team?

This is an On-Demand webinar:

This webinar was previously recorded. To view our upcoming live sessions visit our Webinars page.

Featured Speakers

Gabriel Lourenco
Senior consultant
Read Bio

Alan Tang
Director of Research, Security & Risk
Read Bio

Help lead your peers

Help make our research the best it can be. Sign-up for a phone interview with our analyst and share your experience with this project.

Research Interview

Exclusive workshops for the early bird

We are offering upcoming workshops to qualified companies to help us “road-test” our research. Sign-up to see if this valuable offer is right for you.

Exclusive Workshop
GET HELP Contact Us
VL Methodology