Epic Journey of an Enterprise Cloud Transformation While Building Security


Posted on in Presentations

This talk will deliver two different real-life examples of an enterprise cloud transformation with emphasis on security implementation. Attendees will gain insight into security architecture details across three main categories: security and data privacy integration bottom-up, applying security in depth by peeling down the layers of defense, and breaking down the setup of secure cloud operations.

Participants
Helen Oakley

Speaker

Sr. Product Security Architect, SAP

Cloud Security Security Strategy & Architecture

application security case studies cloud security security architecture security operations


Topic

Subtopic


Share With Your Community