Hi [[ session.user.profile.firstName ]]

Hey You! Get Off of My Cloud! – Identity and Access Issues in the Cloud

With the explosion of connected mobile devices and cloud computing, both internal and external users are trying to access information stored beyond your perimeter. How does an organization authenticate such a large and diverse pool of users on a continuing basis as well as keeping the “bad guys” out? What about ongoing privacy concerns? Join (ISC)2 and RSA Security on May 24, 2012 at 1pm Eastern time for a roundtable webinar discussion about IAM, the Cloud, protection strategies and compliance requirements.
Recorded May 24 2012 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brandon Dunlap, Brightfly (Moderator); Jeff Northrop, IT Director, IAPP, Pam Fusco, CSA; Greg Dicovitsky, RSA
Presentation preview: Hey You! Get Off of My Cloud! – Identity and Access Issues in the Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Threats - The Wolf that Never Leaves the Door Dec 20 2016 6:00 pm UTC 75 mins
    Michael Rodriguez, Digital Forensics/IR Consultant, Foundstone Consulting Services, McAfee
    Insiders. Targeted attacks. Bad actors. Malware. Organized crime. Ransomware. The threats to your IT infrastructure and organization are many and come from multiple vectors. Detecting, assessing and managing these threats are paramount to the well being of the organization. If the worse does happen and there is an incident, quick and efficient response is critical. Join Intel Security and (ISC)2 on December 20, 2016 at 1:00PM Eastern for our final ThinkTank roundtable of the year where we will discuss threats, threat management and incident response.
  • Your Money or Your Data - Ransomware is Here Nov 10 2016 6:00 pm UTC 75 mins
    Deepak Patel, Director of Product Marketing, Imperva John Carnes, Anthem & Brandon Dunlap, Moderator (ISC)2
    If it bleeds, it leads and the headlines these days indicate that more and more companies are succumbing to ransomware. A user clicks the wrong link and the next thing you know, you’re your data is being held hostage...for a price. It leads to nonproductive downtime, tests the limits of your back-up strategy, and saps your bottom line. How do you combat a threat like ransomware? Do you pay up? Join Imperva and (ISC)2 on November 10, 2016 at 1:00PM Eastern for a discussion on ransomware, its impact and how organizations should respond.
  • Hiring, Building, and Retaining Top Security Talent Recorded: Oct 13 2016 72 mins
    David Shearer, (ISC)2; Kevin Flanagan, RSA, Deidre Diamond, Cyber Security Network; Anne Saita (Moderator)
    The shortage of information security professionals and high turnover can derail even the best security programs. This session will cover proven strategies for recruiting, retaining and building a team of top security professionals.
  • 2016 (ISC)2 Security Congress – Member Town Hall – Part 2 Recorded: Oct 13 2016 69 mins
    David Shearer, Steven Hernandez, Patrick Craven, Dan Waddell, Mirtha Collin, Dr. Casey Marks
    Hear from your association membership from a panel made up of (ISC)2 executive management, senior staff and board members addressing members inquires at the 2016 Security Congress Town Hall session. This was originally held on September 11, 2016.
  • 2016 (ISC)2 Security Congress – Member Town Hall – Part 1 Recorded: Oct 13 2016 30 mins
    David Shearer CISSP, (ISC)2 CEO; Patrick Craven, Director, Center for Cyber Safety& Education; Dan Waddell, CISSP,
    Meet the newest members of your association membership management team as David Shearer, (ISC)2 CEO interviews Patrick Craven the new Director for the Center for Cyber Safety and Education (formally (ISC)2 Foundation and Dan Waddell the newest (ISC)2 Managing Director for the North America region. This was originally held on September 11, 2016.
  • SOC Operations: Orchestrating for Optimization Recorded: Sep 29 2016 61 mins
    Victor Lee, CISSP, Intel Security; Mat Gangwer, Rook Security; Brandon Dunlap, Brightfly; Tim O'Brien
    As a wise person once said, a man with one watch knows what time it is, a man with two isn't so sure. Despite the myriad of tools at our disposal in the SOC, how do you accurately identify and triage security Events, escalate those that need it to the status of Incident, and mange them through remediation or response effectively? Join Intel and (ISC)2 on September 29, 2016 at 1:00PM Eastern as we bring a panel of SOC operational experts to discuss strategies and opportunities to orchestrate SOC operations for peak performance.
  • The 5 Keys for Boosting Cloud Security Confidence Recorded: Sep 9 2016 52 mins
    Holger Schulze; Javvad Malik, Dan Waddell, Afir Agasi, Rich Campagna, Sami Laine, Patrick Pushor, Alvaro Vitta
    Hear from a panel of experts including Afir Agasi, Rich Campagna, Sami Laine, Javvad Malik, Patrick Pushor, Alvaro Vitta and Dan Waddell as they review the results of the 2016 Cloud Security Spotlight Report. This report highlights cloud security concerns and what security best practices are evolving with the increasing adoption of cloud computing. Get the report here: cert.isc2.org/cloud-security-spotlight-report/
  • Taming Application Apprehension in the Cloud Recorded: Aug 11 2016 61 mins
    Mark Nunnikhoven, Trend Micro; Dave Lewis, Global Security Advocate, Akamai; Chris Nicodemo, Global Dir App Sec & Arch, Time
    Moving and integrating multiple applications across both on-premise and into the cloud is a daunting task. Whether it is the "lift and shift" of existing workloads into IaaS or the federation of identities between your traditional enter isle and SaaS providers, the task is monumental. Join Trend Micro and (ISC)2 on August 11, 2016 at 1:00PM for a spirited roundtable webinar where we'll dig into the important security implications of your cloud strategy and how to ensure that you are considering all of the angles as you make the change.
  • GDPR - Brexit Means More Changes Recorded: Jul 28 2016 59 mins
    Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security
    The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
  • The Need for Speed: Hitting The Afterburners on Detection and Investigation Recorded: Jun 30 2016 61 mins
    John Carnes, Anthem; Terry Olaes; Rob Ayoub, IDC; Brandon Dunlap, Brightfly
    Detecting and investigating malicious or unintentional activity is a time consuming effort and an inefficient use of our limited resources. All too frequently, we discover something is amiss and realize that problem has existed for a long time, yet it's just come to your attention. How can an organization increase the speed of detection of malicious activity? Can detection and investigation processes benefit from "hitting the afterburners"? Join RSA Security and (ISC)2 on June 30, 2016 at 1:00PM Eastern for a discussion on detection and investigation visibility and what to leverage to make threat detection effective.
  • Cloud Omnipotence - The All Seeing Eye for the Cloud Recorded: Jun 16 2016 59 mins
    Scott Montgomery, VP & CTO, Intel Security; Doug Cahill, Sr. Analyst, ESG; John Yeoh, Senior Research Analyst, CSA
    IaaS, PaaS, SasS? Private, Public, Hybrid? Regardless of the deployment model, you likely have some key services and data spread across some combination of all of these, not to mention what is still on premises. How can your security team keep tabs on all of this? There needs to be uniform management, visibility and control of the various clouds or vulnerabilities and errors are going to put data at risk. Join Intel Security and (ISC)2 on June 16, 2016 at 1:00PM Eastern for a Roundtable discussion on this issue and how to manage your clouds.
  • Blinded By the Light - The Need for SSL Inspection in the Age of Enlightenment Recorded: May 26 2016 58 mins
    Greg Mayfield, Director, Product Marketing, Blue Coat; Spencer Wilcox, Excelon; Sammy Basu, Warner Bros. Entertainment Group;
    Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
  • The Only Constant is Change – GDPR and Data Privacy Recorded: Apr 14 2016 59 mins
    Ted Sherrill, Oracle; Graham Jackson, (ISC)2; Harvey Nusz, 4IT Security
    The General Data Protection Regulation (GDPR) is being instituted to improve data protection and privacy for individuals in the European Union (EU). Additionally, it addresses the export of data outside the EU, which will impact all multi-national businesses operating in the EU. Almost 3/4 of US Privacy professional believe that this is the most significate change to privacy regulations in the last 20 years. What should an organization be doing now to prepare for this new regulation to avoid non-compliance, fines and increased spending? Join Oracle and (ISC)2 on April 14, 2016 at 1:00PM Eastern for a discussion on this new regulation and how your organization could be impacted.
  • CISSPs: Information Security Isn’t Just Your Responsibility Recorded: Apr 4 2016 66 mins
    Steven Hernandez, CISSP, Vice Chair, (ISC)2 Board of Directors
    In this infosession (ISC)² Board of Directors, Vice Chair, Steven Hernandez, discusses the challenges that CISSPs are seeing in their workforce today and how creating a culture of security within your organization can help fill the cybersecurity workforce shortage.
  • What Vulnerability Assessment Tools Miss Recorded: Mar 22 2016 60 mins
    Mike Pittenger, VP, Product Strategy, Black Duck; John Overbaugh, CISSP, CISO, CyberVista; Brandon Dunlap
    Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How can you ensure that you are protecting your networks and applications from newly disclosed vulnerabilities? Join Black Duck Software and (ISC)2 on March 22nd, 2016 at 1:00PM Eastern for a discussion on VA Tools, Open Source Assets and secure application development.
  • Dude, Where's my Data? - Inside the Intel Security Data Exfiltration Study Recorded: Mar 17 2016 63 mins
    Christian Macdonald, Solutions Architect, Intel Security; Brad Antoniewicz, Principal Consultant, Foundstone; JJ Thompson
    It's an infosecurity department's worst nightmare. There's been a breach and information is missing. After determining what's been compromised, you need to discover how the data was accessed and exfiltrated from your enterprise. Threats vary from system to system and include malicious insiders, organized crime and accidental disclosure. Data involved can include customer and/or employee information, intellectual property and financial records. Join Intel Security and (ISC)2 on March 17, 2016 at 1:00PM Eastern for a look into Intel Security's recent Data Exfiltration Study and discover how data is being stolen, what the bad guys are focusing on and what detection and prevention technologies might be working.
  • The Value of Simulation in Incident Response Recorded: Feb 11 2016 60 mins
    Spencer Wilcox, Constellation Energy; Patrick Miller, EnergySec; Chris Walcutt; Black & Veatch; Brandon Dunlap
    Train like you fight. Fight like you train. We could do well to heed this old military axiom and regularly drill for a variety of incident scenarios in the most realistic means as possible. During this (ISC)2 roundtable, we will explore the role of incident management simulation and testing from the world of critical infrastructure and provide some concrete and immediately actionable methods you begin incorporating into your own preparedness program. As the saying goes, “No plan survives first contact with the enemy,” so please join us On February 11, 2016 at 1:00PM Eastern in learning how to become a more resilient organization in the face of disaster.
  • The First 24 Hours After a Breach Recorded: Feb 9 2016 60 mins
    Ondrej Krehel, CISSP, Founder & CEO/Paul Kluber, CISSP, Digital Forensics Examiner, Lifars, LLC
    A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.
  • Inside (ISC)2 - 2016 Global Outlook with the Regional Directors Recorded: Jan 28 2016 58 mins
    Regional Directors Dan Waddell (NCR), Clayton Jones (APAC); Adrian Davis (EMEA) & Gina Van Dijk (LATAM)
    As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.
  • Using E-Mail Protection Services to Better Protect Office 365 Recorded: Jan 21 2016 62 mins
    Mike Flouton, VP & Global Head of Solutions Marketing, BAE Systems; Robert Westervelt; IDC; Sonny Discini; Brandon Dunlap
    Corporate e-mail. It’s safe to say that no organization can survive without it. Making sure it’s available, compliant and secure can be challenging for any security team. Add Office 365 and the Cloud to the mix and the potential issues multiply significantly. E-Mail protection services can make the tasks much less complicated by providing protection against inside and outside threats, reducing downtime and adding encryption. Join BAE Systems and (ISC)2 on January 21, 2016 at 1:00PM Eastern – our first ThinkTank of the year – where we’ll discuss e-mail protection services, Office 365 and the Cloud and how to keep your e-mail up and running.
Regular roundtable discussion on infosecurity topics
(ISC)2 hosts regular panel discussion on hot button infosecurity topics featuring thought leaders and visionaries from the industry.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hey You! Get Off of My Cloud! – Identity and Access Issues in the Cloud
  • Live at: May 24 2012 5:00 pm
  • Presented by: Brandon Dunlap, Brightfly (Moderator); Jeff Northrop, IT Director, IAPP, Pam Fusco, CSA; Greg Dicovitsky, RSA
  • From:
Your email has been sent.
or close