• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

From Nonexistent to Gartner’s #1 Security Technology in 2 Yrs: What’s CASB?

Key Learning Points

  1. Understand current state of shadow and sanctioned cloud usage
  2. Learn new security and compliance risks created by the cloud
  3. Compare on-premises security capabilities to those available in the cloud
  4. Framework used to enforce cloud security, compliance, and governance policies
  5. Learn why CASB is Gartner’s #1 security technology for 2015.

Level: Intermediate

The rapid adoption of cloud services has led to a new class of security, compliance, and data governance headaches. Enter the Cloud Access Security Broker or CASB.

The market for CASBs emerged as a result of enterprise IT usage trends brought on from the transition to the cloud and BYOx era. With an on-premise network, IT possesses extensive visibility as well as robust security and policy enforcement controls. The adoption of cloud services and increased access of corporate data from unmanaged devices results in a loss of visibility and control for IT.

We will discuss real-world pain points that drive the need for auditing SaaS usage, securing and monitoring sensitive data in the cloud, and enforcing policies to comply with various internal and external regulatory requirements, and share frameworks enterprises and government agencies have leveraged to gain visibility and control over the cloud.

About Harold Byun

Skyhigh_Logo_FinalHarold Byun is currently Vice President of Product Management at Skyhigh Networks.  Prior to Skyhigh, he worked at MobileIron, Zenprise (acquired by Citrix), and the Vontu/Symantec Data Loss Prevention group.  His work in technology has focused on DLP, cloud and mobile application security, data containerization, and security intelligence.  He is co-inventor on patented security risk visualization and scoring technology and holds an MBA from the Haas School of Business at UC Berkeley and a BA from Tufts.

Follow Harold on Twitter

Primary Sidebar

Details

Wednesday May 13, 2015
3:00 PM - 4:00 PM
Room 1
Focus:

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.