Protecting Data Across Cloud Applications: the Hidden Challenge

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The rise of cloud applications in the workplace is driving the need for companies to extend existing security policies to all devices and manage access to cloud applications.

At the same time, more employees are using personally-owned devices to access, process and store corporate data.

And the ease of deploying cloud applications has increased the incidence of employees using unauthorised applications to process corporate data.

This webinar will discuss:

  • The increased adoption of cloud applications;
  • The need to deliver solutions with detailed analytics around cloud application usage;
  • How to provide robust security solutions;
  • How to protect against web-borne threats.


Alea Fairchild

Research Fellow, The Constantia Institute

    Alex Kurz

    Director of Sales Engineering, CensorNet

      Matt Lovell

      CTO, Pulsant

        Stephen Pritchard

        Moderator, Infosecurity Magazine

          Kai Roer

          Founder and CEO of CLTRe

          Brought to You by

          Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.