Hybrid Working Has Accelerated Cloud Application Adoption: What About Security?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The rush to work from home has clearly accelerated the movement of IT workloads to the cloud. This is true across the entire spectrum of IaaS and SaaS-based applications. What better way for most organizations to improve their ‘IT-abilities’ such as reliability, availability and scalability?

However, as is often the case, security architectures are lagging behind. How do we know this? One clear tell of this lag is the growth in VPN usage at many organizations and the need to ‘trombone’ even cloud-destined traffic through the corporate VPN purely for visibility and security control purposes.

This can’t be the ultimate way forward, but the movement of security controls to the cloud is also accelerating. How can organizations make this transition without dropping the security ball?

In this webinar, a panel of security experts will discuss:

  • The security impacts of hybrid working
  • How cyber-criminals have pivoted their attacks
  • How to leverage cloud transition to improve your security abilities
  • What cloud security of the rapidly approaching future looks like


Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Ronald Pool

Ronald Pool

Senior Solutions Engineer, CrowdStrike

Photo of Neil Thacker

Neil Thacker

EMEA and LATAM CISO, Netskope

Photo of Andrew Williams

Andrew Williams

Senior Product Marketing Manager, Mimecast

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Mimecast here: https://www.mimecast.com/company/mimecast-trust-center/gdpr-center/privacy-statement/. Please see the privacy policy for CrowdStrike here: https://www.crowdstrike.com/privacy-notice/. Please see the privacy policy for Netskope here: https://www.netskope.com/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.