In Cloud We Trust: Ensuring Trust and Security in Enterprise IT and the Cloud


  • TierPoint
  • Axis Security
  • KnowBe4
  • Hewlett Packard Enterprise
  • Veeam
  • Rubrik
  • Zerto

About This MegaCast

The adoption of cloud technologies is transforming the way enterprises do business, but one stumbling block to further progress is trust and security in the cloud. Addressing these issues is imperative for organizations adopting or maintaining cloud services.

Failure to adequately manage these challenges can result in security incidents, data breaches, and erosion of trust, potentially hindering broader cloud adoption efforts. Attend this MegaCast to learn about proactive risk management, ongoing user education, and security best practices that are essential for organizations navigating the complexities of cloud trust and security.

You’ll hear about emerging threats, supply chain security, incident response and visibility, cloud configuration and security misconfigurations, the shared responsibility model, data encryption, identity and access management, data privacy, compliance, and much, much more.

  1. Ned Bellevance

    Guest Speaker Ned Bellevance

  2. Derek Townsend

    Featuring Derek Townsend Cloud Solutions Architect TierPoint

  3. Jaye Tillson

    Featuring Jaye Tillson Director of Strategy (Field CTO) Axis Security

  4. John Spiegel

    Featuring John Spiegel Director of Strategy and Field CTO Axis Security

  5. Roger A. Grimes

    Featuring Roger A. Grimes Data-Driven Defense Evangelist KnowBe4

  6. John Vitiello

    Featuring John Vitiello Solution Business Manager Alletra 4000, MP File Hewlett Packard Enterprise

  7. Kirsten Stoner

    Featuring Kirsten Stoner Product Strategy Technologist Veeam

  8. To Be Announced

    Featuring To Be Announced Rubrik

  9. Chris Rogers

    Featuring Chris Rogers Technical Evangelist Zerto

What You'll Learn

  1. Deepen your understanding of cloud security trends
  2. Discover innovative tools to protect your data in the cloud
  3. Stay abreast of best practices and proactive security measures