#cybersecurity | #comptia | #info | Cloud Security Alliance Opens Registration for CloudBytes Connect: From the SOC to the Boardroom


Attendees can earn up to seven CPE credits while learning about C-Level cloud priorities, current threats, and state-of-the-art best practices

SEATTLE – Nov. 19, 2020 –The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that registration has opened for its upcoming CloudBytes Connect virtual symposium, From the SOC to the Boardroom, taking place Feb. 2-4, 2021. This next symposium will address the most critical cloud priorities for CISOs, their CxO peers, and the Board of Directors. The event will also explore security threats, innovations, best practices, and the global cyber governance approaches needed to traverse and thrive in the new frontiers of cloud security with the industry’s top security experts. Attendees of this free event will have the chance to earn up to seven CPE credits.

As organizations around the globe continue adapting to the changing economic impacts of COVID-19, security will remain a top priority for CISOs in 2021. CSA is honored to have Ann Johnson, Corporate Vice President of Security, Compliance, and Identity Business Development at Microsoft, as a featured keynote speaker. Johnson will provide her perspective on critical cloud issues facing C-Level executives.

“COVID-19 has exposed many organizations that failed to keep pace with modern technologies supporting digital transformation goals, which at its foundation is a secure, virtualized strategy based upon cloud. As companies play catch up, we are observing several challenges, ranging from degraded data security postures to fast-moving threats to defining appropriate executive engagement. To support this acceleration into a secure cloud-based enterprise, we have carefully curated a roster of leading experts to provide guidance across this broad set of challenges,” said Jim Reavis, co-founder and CEO, Cloud Security Alliance.

“With 42 percent of organizations saying their workforce will continue to be remote even a year from now, future proofing your security posture leveraging the intelligent cloud will mean the difference between success and struggle,” said Ann Johnson, Corporate Vice President, Security, Compliance, and Identity Business Development, Microsoft. “I’m excited to share the insights Microsoft has helped drive that lead to the success of a more secure cloud ecosystem at this virtual symposium.”

Speakers will be available on Circle for follow-up discussions in the Inner Circle community group immediately after the session. Circle is a global community of CSA members and partners that facilitates the sharing of resources and discussion.

The full agenda will be released in the coming weeks, so reserve your seat today.

About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.





Click here to go to the original author and source to this story.

______________________________________________________________________________________________

Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.

.  .  .  .  .  .  . .  .  .  .  .  .  .  .  .  .   .   .   .    .    .   .   .   .   .   .  .   .   .   .  .  .   .  .

Leave a Reply