Critical Criteria for Security Visibility in the Cloud


Our sponsor CloudPassage will be raffling off an Amazon Dot for registered attendees! Food & beverages will also be provided.


Modern elastic cloud infrastructure is fundamentally breaking traditional security approaches. Public cloud has no natural perimeter and network segmentation leaving individual cloud servers exposed. In private cloud, malicious East-West traffic inside the network is a serious threat. As new workloads are added and retired dynamically, change control is difficult, and updating granular firewall rules and security policies becomes a risky, manual process. Join us and learn the 6 Critical Criteria to secure your public, private or hybrid cloud – on-demand, anywhere, at any scale.

About Sam Herath (

Sam has over 20+ years of technical and solution experience in IT security, enterprise compliance, data protection, identity management and related technologies at multiple global organizations. Most recent areas of expertise and focus include: Cloud Security, SIEM, Threat Analysis, Enterprise Data Protection and Identity Management. Sam has held multiple senior systems engineering and solution specialist roles at McAfee, ArcSight/HP Enterprise Security, Oracle, Credant Technologies and Sun Microsystems. Prior to that Sam was a consulting Technology Manager at E&Ys Advanced Technologies practice.

About Evolve Security Academy (

Evolve is a 17-week Cyber Security Bootcamp that provides in-person and immersive training, giving students the concrete and practical skills they will actually need on the job. Students gain real work experience through the live security assessment work they perform on not-for-profit companies. With over 238,000 unfilled cyber security jobs in the U.S. and 1,000,000 globally, our primary focus is on creating top-tier cyber security talent and placing them into a high-paying job through professional staffing and direct hire services.

About Cloud Passage (

CloudPassage® Halo® is the world’s leading agile security platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is delivered as a service, so it deploys in minutes and scales on-demand. Halo uses minimal system resources; so layered security can be deployed where it counts, right at every workload – servers, instances and containers. Leading enterprises like Citrix, and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

About WeWork (

WeWork provides WeWork small businesses, startups, freelancers, large enterprises, and everyone in between with the workspace, community, and services they need to make a life, not just a living. With weekly events, personalized support, month-to-month flexibility, and access to over 90,000 like-minded creators around the world, WeWork is the perfect place to grow your business. Book your tour here (!