Training

Events

Security Transformed

Security Transformed
Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as infrastructure design. This was certainly also true for government. Initiatives like Cloud First and the Cloud Smart, along with Trusted Internet Connections (TIC) 3.0, seek to "fully actualize the promise and potential of cloud-based technologies" in a secure way. (Source: "FEDERAL CLOUD COMPUTING STRATEGY," Suzette Kent, U.S. Federal Chief Information Officer, June 24, 2019) The effort to transform information technologies, like all changes, introduces new considerations, especially in the areas of cyber, information and network security. This session will highlight some of the most significant security implications of cloud transformation. The session will also suggest key security technologies and processes that government agencies and private enterprise should consider when embarking on a transformation program.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.