The CIO’s journey to a cloud-first strategy. The endgame is one where applications are hosted in the cloud and visible only to authorized users. Real-world examples of success provided. The cloud becomes the data center. The Internet becomes the corporate network. With some dire consequences for traditional network security appliance vendors who lag behind the curve.
Learning Objectives: 1: Learn how cloud transformation is now an imperative 2: Learn how cloud security is disrupting traditional hardware appliance markets. 3: Gain new understandings through the experience of 16 different organisations.