Steve Riley

Steve Riley

Sr Director Analyst
Steve Riley researches and writes about various aspects of public cloud security. Mr. Riley researches how to design and deploy secure workloads in public infrastructure-as-a-service (IaaS) clouds and how best to secure the use of software-as-a-service (SaaS) offerings. He tracks the security and compliance capabilities of cloud service providers and monitors the threat and vulnerability landscape present in public cloud services. Related areas of research include cloud security access brokers (CASB), zero-trust network access (ZTNA), cloud data loss prevention (DLP), and container security in run-time.
Read More Read Less
Monday, 27 July, 2020 11:00 AM|Monday, 27 July, 2020 11:45 AM
The VPN Is Dead: Long Live Zero-Trust Network Access

Zero-trust network access (ZTNA), sometimes called software-defined perimeters (SDP), replaces traditional technologies and eliminates the need to extend excessive trust. Instead, it provides adaptive, identity-aware, precision access that improves flexibility, agility and scalability, while offering a consistent experience regardless of who the user is or where they are.
. What is ZTNA, exactly, and why is it suddenly so popular?
. What are the benefits and the common emerging use cases?
. What can we expect it to evolve into as it matures?

Monday, 27 July, 2020 03:45 PM|Monday, 27 July, 2020 04:30 PM
Outlook for Cloud Security 2020

Cloud security remains a top priority. This presentation summarizes the problems, recommended processes, and new product types to address three key issues:
. What are the unique risks associated with public cloud service providers, and how can they be controlled?
. What are the unique security challenges of IaaS and how can they be mitigated?
. What are the unique control challenges of SaaS, and how can they be addressed?

Tuesday, 28 July, 2020 01:15 PM|Tuesday, 28 July, 2020 02:00 PM
Protecting Data and Securely Collaborating with Office 365

Securing Office 365 can be daunting — perhaps even overwhelming. Microsoft continues to add new security features at a blistering pace, and inquiry trends show that while some customers enjoy this, others struggle with finding the most relevant controls to meet security requirements. Come to this session to receive answers to your most pressing questions about Office 365 security.

* What are the most important controls to implement, and what is a reasonable sequence?
* Is it OK to go all-in with Microsoft, or are third-party products still necessary?
* What is Microsoft's overall direction for Office 365 security, and what does that mean for customers?

Tuesday, 28 July, 2020 01:15 PM|Tuesday, 28 July, 2020 02:00 PM
Sovereignty, Shadows and Spies: How Can You Trust the Cloud?

Is your cloud solutions provider facilitating or resisting government surveillance? How can you know? You can't avoid the cloud by building a digital wall around your organization. Can any technology or law save you from the cloud? Will local providers come to your rescue? This provocative session will cut through the myths, so that your organization can stop wasting time solving problems that can't be fixed.

Meet the experts face to face.