About the Webinar
Cloud computing undoubtedly delivers flexibility, efficiency and cost reduction – but as it continues to rapidly transform the way we use, store and access data, it also continues to introduce a host of new threats and security challenges.
Outsourcing data does not mean outsourcing responsibility. As a Security Leader, you are now faced with the challenge of managing shared responsibility with your cloud provider and translating your existing security controls and processes to the cloud.
What you’ll learn
Join us for expert insights into the critical activities and controls you need to put in place to reduce risk and utilise cloud computing with confidence.
You will learn about:
- Your responsibility, as a CEO, CIO or CISO, to protect your data
- The processes, plans and controls you can put in place to reduce risk
- The key questions to ask your cloud provider, before signing on the dotted line
- Actionable tips you can implement, right away, to improve your cloud security posture
Speakers
Damian Fawkner
General Manager of Consulting at Shearwater Solutions
Damian has nearly 29 years’ experience in IT and for the last 6 years he has specialised in Information Security, delivering on his passion for pragmatic security – that is, ensuring security adds value to a business. He has helped many customers with their security strategy development, risk management, cloud product security, application development security and compliance. Prior to Shearwater, Damian was the Chief Information Security Officer for Objective Corporation – an Australian owned publicly listed company. Damian is passionate about information security, his family and mountain biking – but not necessarily in that order!
John Danassis
Principal Security Consultant at Shearwater Solutions
John has worked in the Information Technology Security field for over 10 years and has previously worked with the Australian Taxation Office and Lockheed Martin Australia. He has a breadth of experience across these organisations; ranging from implementing and configuring security technologies, to evaluating tenders, shorting and contract negotiations. He also has experience in the Incident Response field; performing security hardening reviews of technologies and implementing frameworks to help organisations to lift their security posture. Outside of his drive to make sure his work makes a tangible difference to the security posture of IT systems, John also likes sports, travel and food.