This session delivers two different real-life examples of an enterprise cloud transformation with emphasis on security implementation. You will get an insight into security architecture details across three main categories: security and data privacy integration bottom-up, applying security in depth by peeling down the layers of defense, and breaking down the setup of secure cloud operations.