- EMA's research results on the evolution of data driven security
- Value of Security Analytics over SIEM
- Effectiveness and value of security analytics tools as perceived by the business
- Impact of security tools in incident response
Now, more than ever, organizations around the world see the clear need for scalable, cloud-native apps and services to support business productivity during rapidly changing times. As a result, security teams are on the hook to adjust their security posture as the attack surface grows and their organization’s systems are increasingly migrated to the cloud. Join Sumo Logic Director of Product Marketing Dana Torgersen as he demonstrates the many features of Sumo Logic's cloud-native Security Intelligence, including the ability to analyze AWS logs for threats and monitor data access by users, devices & locations.
It's no secret that continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. While this is all fine and well for the DevOps teams, for the folks managing security, these innovations bring up new challenges. Modern applications must be architected and managed with security in mind from the get-go, and building a SaaS offering that has security baked in is a whole new game. DevSecOps is the name of the game, but there isn't always a clear path to implementation and adoption. Between protecting against major attacks that arrive on a daily basis to maintaining compliance with strict regulations, leaving the boundaries of traditional IT can leave some security professionals quaking in their boots. Fear not, friends! There is a way to be secure and compliant in the cloud with the right approach. In this webinar, George Gerchow, VP of Security and Compliance at Sumo Logic, will do a deep dive into the steps it takes to successfully implement and maintain DevSecOps in your organization at scale. He will be discussing: What it took to build a world-class data analytics service on AWS from the ground up Technologies used to gain necessary operational and security visibility Tips and tricks to maintain optimal levels of performance, integrity and availability of the data How to best approach regulatory compliance in the cloud in pursuing certifications like PCI DSS, ISO 27001, CSA STAR, TRUSTe, SOC 2, Type 2, etc. Challenges encountered in the journey and how they were addressed
With the rise of AWS and the public cloud, more and more security teams are feeling the pressure to move to the cloud. Although the benefits are many, teams continue to wonder - does cloud equal better security and compliance? We're sure you've asked yourself this at least once in the last week...or maybe more. #TheStruggleIsReal Agile development, speed, application-uptime, modern apps – the list of needs and wants from teams supported by security goes on and on. To help enable these teams meet these challenges quickly and efficiently, the cloud seems like the perfect fit. Yet, the thought of moving to the cloud makes some people a little uncomfortable – kind of like online dating. This is where we come in! In this webinar, we bring together together two security industry experts and a leading security professional to talk about the pros and cons of moving to the cloud. Listen in on this unconventional webcast to: Learn how to bake security in from the beginning of the application lifecycle Focus on securing the data and ease storage location concerns Realize your compliance checklist doesn't equal security Learn how the Director of Information Security from Teladoc, Inc., made the decision to secure his PCI compliant data in the cloud with Sumo Logic