CSI-WEB
Cloud Security Governance
for Businesses
Virtual Summit
A ZHH Exclusive
Date: 8th April 2021 | 2PM EDT (New York)
EN-AIM
Security professionals continue to face a number of major challenges as more organizations move legacy IT operations to cloud infrastructure and applications and traditional security tools often fall short according to a 2020 Cloud Security Report.
Unauthorized access through misuse of employee credentials and improper access controls takes the number one spot in the surveys as the single biggest perceived vulnerability to cloud security, tied with insecure interfaces and APIs. This is followed by cloud misconfigurations. Most respondents say cloud environments are at higher risk of security breaches than traditional on-premises environments.
With ever changing workloads, increased attack surface, lack of visibility and tracking. The Cloud Security Governance for the Businesses, Virtual Summit offers an exclusive global coverage, provides an opportunity to connect and engage with the Industry leaders, IT and security decision makers. Aiming to improve our perception with respect to security in cloud, improvements and efforts required to realize higher rates of adaptation in the enterprise scale.
Our Speakers

Gregory Rasner
Senior Vice President, Cybersecurity Third Party Risk
Truist Financial

George Kavvalakis
Windows System Security Architect
BNP Paribas

Raj Mallempati
Chief Operating Officer
CloudKnox Security

Pratik Lotia
Board Member
Cloud Security Alliance

Navendu Pottekkat
Software Engineer
Layer5

Paul Lanois
Director, Global Cybersecurity and Data Privacy
Fieldfisher

Deepak Daswani
Cybersecurity Influencer & Chief Security Ambassador
Telefonica
Industries
Banking
Financial Services
Retail
Insurance
Fintechs
Who would be Attending?

Key Takeaways
Understanding Security Implications based on Deployment and Delivery Models.
Understanding Security Implications based on Deployment and Delivery Models.
Advantages and Challenges of Realizing Cloud Security from an Enterprise Perspective.
Advantages and Challenges of Realizing Cloud Security from an Enterprise Perspective.
Advanced Vulnerabilities, Threats, and Attacks in Cloud
Advanced Vulnerabilities, Threats, and Attacks in Cloud
Cloud Intelligence and Threat Hunting.
Cloud Intelligence and Threat Hunting.
Countermeasures & Controls to combat high end cloud security threats.
Countermeasures & Controls to combat high end cloud security threats.
Cloud Compliance, Governance and Management
Cloud Compliance, Governance and Management
You are Signing-up for
6+ Virtual Keynote Sessions
6+ Virtual Keynote Sessions
4+ Digital Panel Discussions.
4+ Digital Panel Discussions.
250+ Key Industry Personnel
250+ Key Industry Personnel
10+ Key Virtual Exhibition Experiences
10+ Key Virtual Exhibition Experiences
AI Powered Online One-on-One Meeting Experience
AI Powered Online One-on-One Meeting Experience
Blockchain powered Attendance Certification
Blockchain powered Attendance Certification
Seamless Virtual Event Technology
Previous Sponsors


















Testimonials

“Presenters/(vendors) keyed in precisely on matters of concern during these times as well as in the future, regarding identity authentication and client/customer onboarding. Products and services presented were impressive and hit the mark for the audience.”