Cloud Service Provider Transformation Strategies – Leading With Security
Date / Time: Tuesday, November 5, 2019, 11:00 a.m. New York/ 4:00 p.m. London
sponsored by
Jim Hodges, Chief Analyst – Cloud and Security, Heavy Reading

Bill Thrash, Go To Market Program Executive, North America, Radware

Today’s network and application threat landscape is a complex, multifaceted and often intimidating environment. Threat actors continue to evolve their tools, tactics and procedures to evade detection and cause harm to hosted applications and network availability. As the threat landscape evolves, attacks are growing in complexity and persistency, and zero-day attacks exploit newly discovered vulnerabilities. These concerns are magnified as applications migrate to the cloud, the traditional enterprise IT perimeter dissolves, and organizations face a distributed data center that spans cloud providers and the organization's private network.

Enterprise innovation continues to evolve at a rapid pace. Data and applications now live in multiple cloud environments across both public and private clouds, spanning colocated and internally hosted infrastructure, platform-as a-service and software-as-a-service offerings with little emphasis placed on the security and compliance of these managed environments. Learn how cloud and hosting providers can leverage the Radware suite of security products and defend their customer-hosted assets with industry-leading Web Application Firewall, Bot Management, DDoS and Cloud Workload Protection.

Join us to discuss how clouds providers and managed service providers can institute a full-stack security suite into cloud transformation strategies for the enterprise. Bring a security suite to market that is backed by Radware Enterprise Threat Response team, providing CSP and MSP customers with 24x7x365 security team support.


Jim Hodges, Chief Analyst – Cloud and Security, Heavy Reading
Jim leads Heavy Reading’s research on the impact of NFV on the control plane and application layers at the core and edge. This includes the evolution path of SIP applications, unified communications (UC), IP Multimedia Subsystem (IMS), session border controllers (SBCs), Diameter signaling controllers (DSCs), policy controllers and WebRTC. Jim is also focused on the network and subscriber impact of Big Data and Analytics. He authors Heavy Reading's NFV and SDN Market Trackers. Other areas of research coverage include Subscriber Data Management (SDM) and fixed-line TDM replacement. Jim joined Heavy Reading from Nortel Networks, where he tracked the VoIP and application server market landscape and was a key contributor to the development of Wireless Intelligent Network (WIN) standards. Additional technical experience was gained with Bell Canada, where he performed IN and SS7 network planning, numbering administration, technical model forecast creation and definition of regulatory-based interconnection models. Jim is based in Ottawa, Canada.

close this window

Bill Thrash, Go To Market Program Executive, North America, Radware
As the GTM Program Executive for Radware, Bill helps execute the company's go to market strategy for Cloud Service Providers, Managed Service Providers and Managed Security Service Providers in North America. Bill brings nearly two decades of experience in many aspects of Cloud Security, Compliance, Managed Services and Client Services. Bill is primarly focused on creating new revenue streams with CSP/MSP clients and bringing to market Radware's suite of security products under the CSP/MSP branding.

close this window

Pascal Geenens, EMEA Security Evangelist, Radware
As the EMEA Cyber Security Evangelist for Radware, Pascal helps execute the company's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels, specialized in electronics and parallel computing. As part of the Radware Security Research team Pascal actively researches IoT malware. Pascal discovered the BrickerBot, JenX and Demonbot botnets, did extensive research on Hajime, the Hadoop YARN attack surface, and follows closely new developments and threats in the IoT space as well as applications of AI in cyber security and hacking.

close this window

Webinar Archive Registration

To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
Email Address *
Username *
Create a Password
Re-enter Password
First Name *
Last Name *
Job Title *
Company *
Address *
City *
State / Province *
ZIP / Postal Code *
Country *
Phone Number *
What is your area of business? *
Company Annual Revenues *
Employees in entire organization *
What is your job function? *
If you selected "Other" above, please clarify your answer.
Please indicate your agreement to the Terms of Use for this web site. *
I agree to abide by the Terms of Use.
By registering for our site, your email will be added to our promotions list. We will send you information about upcoming webinars and events. You may unsubscribe at any time. If you unsubscribe, you will continue to receive any newsletters to which you subscribed. *
I agree
Occasionally our trusted partners may want to send you information about exciting new products and services - please note that we will never share your information with our partners when doing so. If you would like to receive these emails, please check this box.
Please indicate your agreement to Light Reading's Webinar Agreement for this webinar. *
I agree to abide by the Light Reading Webinar Agreement (printed in the box below).
[For EU / Canadian Residents] I agree to allow the information collected to be shared with the sponsors of this event. In doing so, I may be contacted by the sponsors via the information submitted.
Sign In