A Virtual Event
Wednesday, June 24
9 AM PDT
Thursday, 25 June
10 AM GMT
Thursday, 25 June
10 AM SGT
Palo Alto Networks, AWS and Accenture recently surveyed 3,000 cloud architecture, InfoSec and DevOps professionals to uncover today’s security trends around moving to the cloud and securing cloud native architectures and methodologies.
In this virtual summit, cloud security leaders from Palo Alto Networks, The New Stack, AWS and Accenture will reveal the results from The State of Cloud Native Security 2020 Report.
From there, our ecosystem partners, customers and cloud native security leaders will host a series of sessions on solving critical security issues in the age of cloud native applications.
Hear from our customers as they share insights into securing their own cloud journeys.
Learn how the rapid release cycles employed by today’s development and DevOps teams impact cloud adoption and infrastructure.
Learn how to shift security left and integrate visibility and protection across the entire cloud native technology stack.
Find out how organizations apply data protection methods within the cloud.
Get your questions answered in real time during each session.
See how the ecosystem secures networks, enforces microsegmentation and detects anomalies.
In this panel, thought leaders from Palo Alto Networks, Amazon Web Services, Accenture and The New Stack will unpack some initial findings from The State of Cloud Native Security Report (2020).
The panelists will apply their own experiences within their organizations to the major report themes, including findings on the tools and technologies that companies are using to meet and deal with the challenges of securing cloud native architectures and methodologies.
VP of Product,
Multi-Cloud Security Lead,
Partner Solutions Architect,
The New Stack (moderator)
Enterprises embrace cloud computing as an enabler for frequent value delivery, requiring increased agility and pace of innovation. In this session, Miriam McLemore, Enterprise Strategist at Amazon Web Services, will explore the potential for transformation that comes with cloud adoption and discuss how some of the world’s leading enterprises were able to transform and quickly deliver business value outcomes.
Enterprise Strategist, AWS
Enterprises often struggle to adapt to new management paradigms as they migrate their workloads to cloud. When on-premises, they are solely responsible for everything (hardware, operating system, middleware, software, security, etc.), but once they migrate to the cloud, cloud service providers take over varying responsibilities depending on the service model (e.g., IaaS, PaaS or SaaS). Google Cloud, specifically, provides some cloud-native security controls but It isn’t always clear where their security responsibilities begin and end. In this session, Jennifer will talk about how emerging use cases are evolving Google Cloud and Anthos platform requirements, as well as the implications for security and privacy.
VP of Product, Google Cloud
A predominantly AWS shop, BankUnited’s cloud journey brought a slew of different use cases to the fold. Tune in to this discussion to learn how Prisma Cloud by Palo Alto Networks allowed BankUnited to secure their end to end cloud journey from a single, consolidated platform, along with best practices and recommendations to consider along your journey.
Cloud Architecture and Operations Manager
VP, IT Security Operations – InfoSec Engineering
Learn how Refinitiv built a custom cloud security reporting application - on top of Prisma Cloud, the Cloud Native Security Platform. Security Architect, Risk Technology at Refinitiv, Darian Jenik, will share some of the initial security challenges that drove Refinitiv to consider a third party solution like Prisma Cloud, plus what drove the need for the innovative new custom app. Walk away with key insights and learnings and actionable next steps to implement a similar innovation and approach within your own organization.
Risk Technology at Refinitiv
Organizations are rapidly adopting containers and Kubernetes to more easily develop and manage the applications that deliver business value. However, in order to use Kubernetes in a production environment, you need to build security in your DevOps pipeline with both proactive and reactive security measures. In this session, we explore OpenShift’s secure-by-design platform, Built-in security features, and Red Hat’s new Advanced Cluster Management for Kubernetes Product.
Principal Solution Architect
Red Hat Global Partner Security ISV
To unlock the fastest path to value of the cloud, enterprises must consider how to industrialize the application delivery process across each layer of the cloud. This means embracing the cloud operating model and tuning people, process, and tools to it. Learn how to simplify operations for a multi-cloud reality, where security can be applied consistently regardless of target cloud environment, and what success looks like for organizations in terms of provisioning, securing, connecting and running cloud native environments.
Field CTO at HashiCorp, Inc.
Compete in our Cloud Native Security challenge during the event. The winner will receive a $500 digital Amazon gift card!
This offer is valid only in the U.S. and Canada except the province of Quebec. Read the terms and conditions.
Can’t make it? Register anyway to view the session recordings on demand!