How to get the most out of your cloud provider's security solutions

Cloud providers often offer many cloud-native security features and services. Actually knowing how to use them, and in what circumstances to supplement them with third-party solutions can greatly improve your organisation’s security posture.
Join Check Point and mnemonic on Tuesday 6th of June at Hotel Continental in Oslo to learn more about how to complement the solutions available to you, in order to protect your organisation against breaches, data leaks, and targeted attacks in your cloud environment.
08:00 – 09:00 | Registration and breakfast |
09:00 - 09:05 | Welcome and introduction |
09:05 - 09:35 |
Extended Threat Intelligence briefing: Threat actors disabling EDR solutions (Endpoint Detection and Response) Technical level: 2/5 |
09:35 – 10:05 |
CloudOPS: Secure operations for Azure In the constantly evolving cloud environment, it’s challenging to keep track of security and network components. For 20 years, mnemonic has been integrating, managing and troubleshooting some of the region’s most complex and critical security solution deployments. As we observe more and more organisations move their critical infrastructure into Azure, managing the infrastructure in a traditional manner is no longer feasible, and obtaining the same level of access is far from straight forward. We’ve had to think differently to administer and support these environments. During this presentation, Kristoffer will explain how our approach to cloud, and especially Azure environments, is designed to provide with more granularity, more control and ease of access in an otherwise clouded area. Language: Norwegian |
10:05 - 10:25 | Break |
10:25 - 11:10 |
Complementing your cloud provider’s security solutions Most cloud providers deliver security solutions embedded into their cloud services. But in which circumstances would it make most sense to complement these solutions with services from their partners, and how do you choose the right solution for your organisation? In this presentation, Pål talks about the importance of third-party security validation in the cloud, and will provide real-world examples of why things sometimes go wrong, what can be done and how to optimise security for your cloud solution. Language: Norwegian |
11:10 |
Closing remarks |