March 26, 2021 | 10:00 AM ET
As organizations utilize the cloud to innovate, compete and grow, security teams are the key in ensuring that those business initiatives and missions are successful. The security program that supports that success, needs to be an iterative and continuous cycle of Strategy and Risk, Build and Move, and Threat Management.
In Phase 1 we discussed the development of a risk based cloud strategy. That strategy in turn provides a critical foundation for building workloads for the cloud, the selection and integration of appropriate controls, and day to day orchestration and management. This approach has been proven to help in the smooth migration of workloads to, and even between, clouds, while eliminating many failed or insecure deployments, inefficiencies, and rework.
Join us and a group of your peers, to discuss where you may have succeeded or struggled with these tasks and hear what IBM Security has learned from thousands of customer engagements across clouds from all vendors, in critical areas such as: