Security for the Cloud: Can’t Miss Sessions at RSA 2018

By Adi Bar-Lev, VP Marketing, Luminate
Published on April 9, 2018

RSA Conference, which will be held from April 16-20 in the Moscone Center, San Francisco, is one of the biggest information security events on the calendar. And this year, Luminate Security will be there, as part of the Israel Cyber Alliance. We are
looking forward to meeting with security experts that are ready to divulge some
industry know-how, and to sharing some of our own experiences.

Read More

The Cloud security market - expected to be worth $12.7 billion by 2022 -  is now facing an opportunity to solve a once-in-a-generation security problem and unleash digital transformation. New solutions to security challenges posed by Cloud computing are flooding the market and this is where Luminate comes in, with our integrated, API-driven security platform. We have taken the BeyondCorp philosophy as a starting point - shifting from network based to application based security to minimize the network attack surface. This mode of operation allows only point-to-point, ad-hoc user access to specific corporate resources (wherever they are hosted), while the corporate network never gets exposed.

RSA 2018 will deliver solutions and ideas at the cutting edge of Cloud security. We’ve listed some of the sessions not to miss for best insights in various aspects of enterprise Cloud security:

Can’t Miss Sessions

The Impact of Multi and Hybrid Clouds to Cybersecurity Priorities, April 19, 3pm-3:45pm, Moscone South Esplanade 157
Doug Cahill, Senior Analyst, Enterprise Strategy Group

Doug tweets: “Very excited to be presenting at @RSAConference this year on how hybrid and multi-clouds are impacting #CyberSecurity priorities, processes, and technology decisions! #cloudsecurity”

Doug Cahill’s session focuses on automating security controls for hybrid cloud environments, a challenge faced by many organizations in 2018. And that is exactly what we are here to solve: Luminate’s unique approach operates on the application level, granting and securing access to applications hosted on-premises, or on the Cloud - both private and public.

(ISC)2 CCSP® Cloud Security Professional Two Day Crash Course, April 15, 9am-5pm and April 16, 9am-5pm,
Instructor: Kevin Jackson, CEO/Founder, GovCloud Network

This two-day course is designed to get you ready for the security certification exam, Certified Cloud Security Professional (CCSP). The course focuses on all security-related matters of Cloud computing and operations, including architecture and design of Cloud platforms. This is a great opportunity to learn about how to build cloud-native security approach in your organization. We at Luminate believe that new challenges require new approaches and completely agree that cloud security is a profession that should be studied.

CSA Summit: Cloud 2018: Enterprise Grade Security, April 16, 9am-4pm
Welcome address: Jim Reavis, CEO Cloud Security Alliance

The Cloud Security Alliance Summit runs seminars at RSA 2018. This seminar includes sessions on “Cloud Migration 2.0: Security for IaaS” and “Cloudy Weather Ahead for Digital Transformation”. Many of our colleagues will be discussing their approach to cloud security challenges and share their experience and best practices. We greatly value working with the Cloud Security Alliance, contributing to the most important IT revolution in decades.

DevOps Connect: DevSecOps, April 16, 9am-5pm
Welcome address: Mark Miller, Alan Shimel

This day-long session is dedicated to the crucial point where DevOps meets Security. The session looks at the journey of integrating modern software and infrastructure delivery pipelines with security controls. We believe that Software-Defined access should be an intrinsic part of any infrastructure/configuration of automation policy, and this session shows the way to achieve this. Mark Miller and Alan Shimel will be giving the welcome address. You won’t get much more experienced in DevOps than with this team!

The Future of Security for SecOps and NetOps (Gigamon), April 17, 11:40am-12pm
Simon Gibson, Former CISO Bloomberg now Fellow Security Architect, Gigamon

This session will cover the importance of simplifying security architectures to improve flexibility and overall management. At Luminate Security we know this is achievable without the need for an expensive network overhaul. We are excited to hear Simon Gibson’s suggestion for handling this challenge.

How Cloud, Mobility and Shifting App Architectures Will Transform Security, April 17, 1pm-1:45pm
Thomas Corn Senior Vice President and General Manager, Security Products, VMware

Thomas tweets: “Machine Learning has huge implications for #Cyber.”

Thomas drives VMWare’s security strategy, and we agree that mobility and Cloud are enabling robust security models. It is no longer a question of “if” the security will be transformed, but “how.” This session will look at the new tools and technologies available to support this transformation.

Confessions of a Cloud Security Convert, April 17, 3:30pm-4:15pm
Michael Farnum, Solution Architect Manager, Set Solutions

Michael is a well-rounded security professional currently working as a Solution Architect Manager. This session focuses on his personal journey from network security to the Cloud including Michael’s ‘Cloud conversion.’ Coming from the VPN world and now evangelizing the software-defined perimeter and Zero Trust architecture with our cloud-based security platform, we are always thrilled to hear about the experiences of our industry colleagues.

Can SOC Overcome the Complexity of Cloud? April 18, 1:45pm-2:30pm
Wayne Anderson, Enterprise Security Architect, McAfee

Wayne Anderson applies a multidisciplinary approach to security. He will facilitate this session looking at a classical approach to managing security events across the enterprise network with how it can be mapped to the Cloud. We expect this session to address burning questions like: Are we looking to build smarter systems to reduce the amounts of events that require handling? Can we democratize some of the events?; How will SOC operations enter the cloud age?

Google on BeyondCorp: Empowering Employees with Security for the Cloud Era, April 20, 10:15am-11am
Jennifer Lin, Director, Security, Google Cloud

With Google’s Jennifer Lin, this session is particularly exciting for us because of Lin’s expertise in Cloud automation and the security and privacy challenges of Cloud computing. Google’s work with the Zero Trust Networks concept and their BeyondCorp project has also been an inspiration for us, and we are eager to hear about the experience Google gained in converting their corporate network. At Luminate we provide Security-as-a-Service approach for organizations that would like to benefit from BeyondCorp-like values without revolutionizing their current network first.

If you make it over to RSA 2018, come on over and see Luminate Security at RSA Booth #735, South Hall, to see first-hand how we provide secure access to your corporate resources on any datacenter and from any device; or request a meeting.

Application level visibility vs. network level visibility

By Leonid Belkind, co-founder and CTO, Luminate
Published on March 8, 2018

Visibility is an essential ingredient in security. Whether it's examining "forensic" evidence and audit trails after the fact or limiting access in real-time, any security system needs visibility to understand what is going on within the applications and networks that it is trying to defend. Defending without visibility is like shooting in the dark. As we will see in this post, a few recent developments have made it possible to increase visibility, improving the system's ability to defend against unauthorized access.

Read More

Is this really Cloud Computing? (Lessons learned from a recent Cisco SSL VPN Vulnerability)

By Leonid Belkind, co-founder and CTO, Luminate
Published on February 1, 2018

As some of you have heard, on January 29th, Cisco has disclosed information about a Remote Code Execution and Denial of Service vulnerability that affects a number of their security product lines. The vulnerability is pretty bad. In fact, its CVSS (Common Vulnerability Scoring System) score is 10, the highest possible score.

Read More
Terms of usePrivacy policySupport