Cyber Security & Cloud Congress North America Begins in Just a Few Days

Cybersecurity & Cloud Congress North America

[SANTA CLARA, CA, May 10, 2023] – The Cyber Security & Cloud Congress North America (part of TechEx) is scheduled to take place on May 17-18 at the prestigious Santa Clara Convention Centre in California.

This technology event brings together industry experts, thought leaders and innovative companies to explore the latest advancements, challenges, and opportunities in the realm of cybersecurity and cloud computing. As the digital landscape continues to evolve rapidly,...

James Todd, KPMG: On automation and machine learning as the future of security 

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

“It’s at that intersection of the cloud environment, being very much aligned to deploying everything as code,” says Todd. “A lot of automation is a big part of that. Being able to take dynamic action within a cloud environment is much easier and well-versed than within a...

Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks

Cloud Tech caught up with Andrew Egoroff, Senior Cybersecurity Specialist at ProcessUnity, to discuss the increased threat around the Russia-Ukraine crisis and how to mitigate risks from third parties.

A business can implement excellent internal cybersecurity measures, but a slip-up from a third-party vendor can have devastating consequences. ProcessUnity specialises in helping businesses determine what vendors carry the lowest risk.

“We try and evangelise the...

Ben Jenkins, ThreatLocker: Dealing with the scourge of ransomware

A padlock on a shed.

Threatlocker was founded in 2017. What was it set up to do?

Endpoint security, and we do that by following zero trust. Now, the problem is zero trust is not the best name to describe things. And it's kind of this industry buzzword or buzz term that's come out that we kind of had to stick to using because it’s what people know. But we don't like to describe things as zero trust. 

Essentially, we do it through four main pillars. So we have our application...