Hi [[ session.user.profile.firstName ]]

Cloud Serenity: Controlling What We Can and Accepting What We Cannot

As the demand for cloud computing continues to grow, security remains the largest barrier to greater cloud adoption. We’re making some headway – with cloud providers offering better processes for managing security and the industry developing better methods for assessing them. Yet there are some rea
As the demand for cloud computing continues to grow, security remains the largest barrier to greater cloud adoption. We’re making some headway – with cloud providers offering better processes for managing security and the industry developing better methods for assessing them. Yet there are some real limitations presented by cloud computing on our ability to implement and manage controls. To be able to trust the cloud(s), IT security professionals have to understand the differences between what they can control and what they can’t.

This webinar will explore these questions and also begin to turn the conversation toward how we can position IT to harness the cloud itself to exercise greater control.
Recorded May 24 2012 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Josh Corman, Director, Information Security, Akamai Technologies; David Etue, VP Corporate Development Strategy, SafeNet, Inc
Presentation preview: Cloud Serenity: Controlling What We Can and Accepting What We Cannot
Recommended for you:
  • Date
  • Rating
  • Views
  • A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.
  • Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.

    Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:

    - Which frameworks and methodologies can help get you started
    - Vital questions you should be asking your vendors
    - Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • NRF 16 attracted over 33,000 attendees and focused on retail technology, trends, and areas of focus for the coming fiscal year. Hortonworks and Microsoft were visible booth presences, hosting large volumes of visitors. Together, the partnership is uniquely qualified to accelerate retail data collection and management.

    Join Hortonworks VP of Industry Solutions, Eric Thorsen, and Microsoft’s Retail Industry Solutions Director, Shish Shridhar, to learn how Data-Centric Retail Trends can impact your business and how Hadoop can help you gain actionable insight from your data. Understand how your peers are using data to drive new levels of customer centricity, real-time inventory predictions, and personalized marketing. Learn about how consumer goods companies are using Hadoop to gain insight from demand signals and analyze data flow.
  • See how you can get ahead of the new wave of mobile access and security challenges with the newly released Secure Mobile Access 11.3 firmware in this webcast.

    You’ll learn about some of the new features:

    •Dell EMM/DMM integration: SSO with Dell Mobile Workspace container (supports IOS and Android)
    •New Console Management System (CMS)
    •Kerberos Constrained Delegation
    •Clientless access to SharePoint
    •Chrome OS support
    •More HTML 5 clients supported
    •Better control over SSL protocols and Ciphers
  • In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.

    Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.

    Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.

    In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
  • The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2016 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Serenity: Controlling What We Can and Accepting What We Cannot
  • Live at: May 24 2012 7:00 pm
  • Presented by: Josh Corman, Director, Information Security, Akamai Technologies; David Etue, VP Corporate Development Strategy, SafeNet, Inc
  • From:
Your email has been sent.
or close
You must be logged in to email this