Epic Journey of an Enterprise Cloud Transformation While Building Security


Posted on in Presentations

This talk will deliver two different real-life examples of an enterprise cloud transformation with emphasis on security implementation. Attendees will gain insight into security architecture details across three main categories: security and data privacy integration bottom-up, applying security in depth by peeling down the layers of defense, and breaking down the setup of secure cloud operations.

Join the RSAC Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC Conference presentations. Learn more.


Participants
Helen Oakley

Speaker

Sr. Product Security Architect, SAP


Share With Your Community