Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as infrastructure design. This was certainly also true for government. Initiatives like Cloud First and the Cloud Smart, along with Trusted Internet Connections (TIC) 3.0, seek to "fully actualize the promise and potential of cloud-based technologies" in a secure way. (Source: "FEDERAL CLOUD COMPUTING STRATEGY," Suzette Kent, U.S. Federal Chief Information Officer, June 24, 2019) The effort to transform information technologies, like all changes, introduces new considerations, especially in the areas of cyber, information and network security. This session will highlight some of the most significant security implications of cloud transformation. The session will also suggest key security technologies and processes that government agencies and private enterprise should consider when embarking on a transformation program.
Webinar Registration
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Vice President of Security Solutions, Check Point Software Technologies
Avi Rembaum currently serves as Vice President of Security Solutions for Check Point. In this role, he is responsible for the company's solution center, incident response team, strategic alliance program and security architecture function. Previously, Rembaum was responsible for the company's business relationships with the Tier-1 Telcos in North America. Rembaum first began working in the information and network security industry in 1997, when he joined RADGUARD's marketing team. He also held product management positions at RedCreek and SonicWALL and practice manager roles at RedCreek and Getronics, now CompuCom.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.