Greg Pepper, Security Architect, Check Point Evangelist, Check Point Software Technologies
Organizations are rapidly moving to the cloud and are migrating their most critical workloads. At the same time, new cloud native applications are being built to replace legacy application portfolios. Whether it’s lift-and-shift or building cloud native applications, the need for security permeates all layers of today’s cloud infrastructure. Join us to learn best practices and security design philosophies you can use to develop, deploy and maintain cloud workloads with additive security controls at each layer of your applications.