Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Protecting Data Across Cloud Applications: the Hidden Challenge

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The rise of cloud applications in the workplace is driving the need for companies to extend existing security policies to all devices and manage access to cloud applications.

At the same time, more employees are using personally-owned devices to access, process and store corporate data.

And the ease of deploying cloud applications has increased the incidence of employees using unauthorised applications to process corporate data.

This webinar will discuss:

  • The increased adoption of cloud applications;
  • The need to deliver solutions with detailed analytics around cloud application usage;
  • How to provide robust security solutions;
  • How to protect against web-borne threats.

Speakers

Alea Fairchild

Research Fellow, The Constantia Institute

    Alex Kurz

    Director of Sales Engineering, CensorNet

      Matt Lovell

      CTO, Pulsant

        Stephen Pritchard

        Moderator, Infosecurity Magazine

          Kai Roer

          Senior Partner, The Roer Group

            Brought to You by