Epic Journey of an Enterprise Cloud Transformation While Building Security

Posted on in Presentations

This talk will deliver two different real-life examples of an enterprise cloud transformation with emphasis on security implementation. Attendees will gain insight into security architecture details across three main categories: security and data privacy integration bottom-up, applying security in depth by peeling down the layers of defense, and breaking down the setup of secure cloud operations.

Helen Oakley


Sr. Product Security Architect, SAP

Share With Your Community