<We_can_help/>

What are you looking for?

Multi-Cloud Data Security made Real

Multi-Cloud Data Security made Real

Data has the ability to both transform your business and ruin your day. As the most critical asset of any organization, securing data is paramount. Organizations everywhere have been on a drive to innovate and compete on the global stage, resulting in data being spread between on-premises environments, public clouds, and SaaS applications. In order for IT and Security teams to regain control over these islands of data, a new and modern approach is needed. Enter Data Security Posture Management. By using DSPM, you can discover your cloud data assets, prevent data exposure, enforce security policies, secure data handling, and data sovereignty, and meet GRC requirements. Join this workshop to see how you can avoid a security incident from turning into a data breach.

speaker_info

About The Speaker

Filip Verloy

Filip Verloy serves as Field CTO EMEA & APJ for Rubrik X. In that role, Filip engages and advises customers, partners and the security industry at large, sharing his experience, insights, and strategies on data security. Prior to joining Rubrik, Verloy was the Global Field CTO at API security start-up Noname Security, and has previously served at various IT vendors including Citrix, Dell, Riverbed, and VMware in roles ranging from Staff Architect to Solutions Executive supporting some of the largest and most complex customer environments. He has been in the IT industry for over 20 years, spanning the customer-, consulting-, and vendor-side.
Position:
Field CTO EMEA & APJ Rx at Rubrik

Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

event_info

Event will take place at

16:00-16:45