Securely Building Clouds: Thoughts and Concerns

Manage webcast
Edward Haletky, Cloud Analyst, The Virtualization Practice
Edward Haletky provides Virtualization, Virtualization Security, Network Security, Secure Coding Consulting and Courseware as well as Linux Security and Application Development.

* Author of "VMware Virtual Infrastructure Security: Securing the Virtual Environment" and "VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers", published December 2007, Copyright 2008 Pearson Education.

* Guru and moderator for and participant in the VMware Community Forums.

* Moderator for the Virtualization Security Podcast held every other week on thursday.

* Analyst and Managing Director for The Virtualization Practice, LLC.

* Participant in the VMware VMTN Communities Roundtable Podcast held every wednesday.

* Blogs about Virtualization on his own Blog, Blue Gears, as well as for the Virtualization Practice and TechTarget.

* Writer for various online and physical magazines.

Specialties
* Virtualization Security
* VMware Virtual Infrastructure
* Network Security
* Secure Coding
* Linux Security
* Linux Application Development
May 16 2012
48 mins
Securely Building Clouds: Thoughts and Concerns
More from this community:

IT Security

  • Live and recorded (5997)
  • Upcoming (121)
  • Date
  • Rating
  • Views
  • This webinar is for business leaders who wish to understand vulnerabilities in commercial software and how they can impact organizations:
    Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
    This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
    Key takeaways:
    -What is a software vulnerability
    -How a software vulnerability becomes a threat
    -A glimpse of how threats multiply
    -How closing vulnerabilities impacts risk reduction
  • In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant? Are you really sure they are not inadvertently creating holes in your network and exposing your organization to cyber criminals? The Target breach – and many others like it – should at least make you double check your practices.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will cover best practices for managing external connectivity lifecycle to and from your network, including:

    • Defining the right infrastructure, network segmentation, security controls and additional security protections
    • Managing changes to connectivity for third party applications or data feeds
    • Routing partner traffic through your network
    • Auditing and compliance challenges for both you and your partner
    • Technical considerations for managing the business and ownership aspects of third party connectivity
  • In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • Tom Bowers, vCISO for ePlus and their clients, will cover what he sees as the looming threats for 2016, including Threat Intelligence and Sharing, State Sponsored Code and Commercial Malware, Security of Big Data, Embedded Systems, and the Physical and Cyber Convergence.
  • Customer data is complicated. It lives everywhere and changes frequently. Creating a holistic view of the customer journey can be a challenge, even as the opportunities are obvious. Join Larry Drebes, Founder and CEO of Janrain for lessons learned from thousands of enterprises, challenges with different approaches to customer data management, and the benefits of managing customer identity in the cloud.
  • Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Channel
  • Channel profile
  • Calculating the cost of critical system downtime Aug 12 2015 1:00 pm UTC 45 mins
    Mark Scanlon, UKI Regional Director, Vision Solutions
    How long can you afford to be without data?

    45% of businesses surveyed said that they had experienced a data loss in 2014. Downtime can come from any direction, in any form, at any time. Astonishingly, three-quarters of IT professionals say that they have never calculated the hourly cost of downtime.

    Join Mark Scanlon as he explores how you can reduce the impact of downtime on your business to near zero, whilst making it easier for you to manage your systems.
  • Should the modern enterprise build, buy or configure their IT systems? Aug 12 2015 12:00 pm UTC 45 mins
    Stephen O'Donnell, CEO, CTO, Tech Analyst and Author
    The CIO is faced with reconciling the, apparently, irreconcilable. How does he build a cost effective technology platform that provides business agility, and manages risk?

    In this session, Steve O’Donnell explains the critical success factors in achieving that desired outcome, the considered compromises, the strategies and tactical approaches that the CIO will need to adopt to deliver business benefits and keep his stakeholders onside. He will look at the different types of application and how they need to be managed and hosted. Where do we build, where do we buy and where is configuration the right answer? How do we choose between in-house infrastructure, managed cloud services and engineered systems?

    Join Stephen for a structured approach to providing a cohesive strategy for IT investment that makes sense, and optimises business outcomes whilst being simple enough to gain business stakeholder buy in and approval.
  • Transforming Enterprise IT – What do you need to consider? Aug 12 2015 10:00 am UTC 45 mins
    Ian Wales, Cloud, Automation and Application Delivery Management
    Running Enterprise IT is probably more complicated now than it has ever been. Many organisations are embarking on transformation projects to take advantage of the modern hybrid world. But with all that complexity how do you make sure your transformation is a success? Join HP to take a look at some of the areas you need to be considering when transforming your environment to achieve the better service levels and efficiencies you are striving for. We’ll talk about everything from discovering interdependencies through automation and changing the way you manage your new environment.
  • Does Your Organisation Really Know Its True or Total IT Cost Aug 12 2015 9:00 am UTC 75 mins
    Jerry Wertelecky, CPA, Fellow HKloD & Managing Director
    IT spend has become one of the largest budget line items in companies today. IT organizations worldwide spent over $4 trillion dollars in 2013 alone. Despite the growth in IT spend, many IT organizations do not have the capability to clearly and easily articulate where that spend is going, how it correlates to the services they are delivering or what value the business is realizing from the services.

    In order to stay competitive, businesses are seeking ways to optimize and align future IT investment decisions with the strategic direction of the company. By making all of the costs of running IT transparent, IT can change the way business units consume IT resources, drive down total enterprise IT costs and focus on IT spending that delivers real business value.

    Join Jerry Wertelecky as he discusses:

    • Facilitate collaboration between IT and Finance to increase visibility into the costs, utilization and operations of all IT Services

    • Leverage a deep understanding of what drives IT costs and performance to improve scenario planning capabilities and make better IT decisions

    • Provide IT cost and consumption data to business owners in the form of a “Bill of IT” to more effectively communicate the value of IT to the business.
  • The Trustworthy Cloud Aug 11 2015 5:00 pm UTC 15 mins
    Michael Quinn, General Manager, Cybersecurity & Data Protection, Microsoft
    Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.
  • SD-WAN for Public and Private Clouds Aug 11 2015 5:00 pm UTC 45 mins
    Parag Thakore, Director, Product Management
    The enterprise WAN is adapting to address the pervasive availability of broadband Internet, the shift of applications to the cloud and the increasing demands for real-time, online and critical applications in the branch office. At the same time enterprises have made significant investments in their existing WAN architecture infrastructure network equipment and WAN services. Many enterprises are evaluating an SD-WAN solution as a way to address the changing enterprise landscape without decommissioning their existing WAN any time soon.

    VeloCloud will guide you through various flexible architectures and transition steps for SD-WAN that target maximum return while minimizing disruption and risk. Examples of how a cloud-delivered SD-WAN enables flexible transition and deployment in both hybrid and Internet only branches will be shared.
  • Expert Panel: Cloud Storage Initiatives – An SDC Preview Recorded: Aug 4 2015 55 mins
    David Slik, CoChair SNIA Cloud Stor TWG; Mark Carlson, CoChair Cloud Stor TWG; Yong Chen, Tex Tech Univ; Alex McDonald, Chair
    This year’s Storage Developer Conference (SDC) is expected to draw over 400 storage developers and professionals. Get a sneak preview of key cloud topics that will be covered at SDC in this live Webcast where an expert panel will discuss:

    · Mobile and Secure - Cloud Encrypted Objects using CDMI
    · Object Drives: A new Architectural Partitioning
    · Unistore: A Unified Storage Architecture for Cloud Computing
    · Using CDMI to Manage Swift, S3, and Ceph Object Repositories

    You’ll learn how encrypted objects can be stored, retrieved, and transferred between clouds, how Object Drives allow storage to scale up and down by single drive increments, end-user and vendor use cases of the Cloud Data Management Interface (CDMI), and we’ll introduce Unistore - an innovative unified storage architecture that efficiently integrates heterogeneous HDD and SCM devices for Cloud storage systems.
    This Webcast is live so please bring your questions for our esteemed panel of experts.
  • How U.S. Government Clients are Leveraging HP ALM Solutions in a "CLOUD" Recorded: Jul 30 2015 58 mins
    Robert Linton, Cortechs Inc.
    See how HP ALM software was deployed to support Agile development and test efforts in a private secure cloud environment for government agencies. Learn about their need and our resulting solution. Find out how HP ALM software is provisioned in a virtual data center cloud development and test environment. See how our on-demand offering, with flexible pricing, allows agencies to leverage their investment in HP Software, greatly increasing ROI and reducing risk.
  • Transitioning to Cloud Communications: An Overview of Key Questions and Consider Recorded: Jul 30 2015 15 mins
    Josh Davis- SE, Matt McGinnis- Sr Director, Product Marketing, Jose Pastor- VP Product Management, Curtis Peterson- VP Ops
    The worldwide adoption of cloud technology includes business communications. This video is a compilation of sessions exploring vital transition topics including: why cloud is the right solution for a growing business; the cost analysis of old technologies versus the cloud; how cloud communications works at uniting multiple office locations; and ways to make a smooth transition to a cloud phone solution.
  • Does more tech equal better team collaboration? Recorded: Jul 29 2015 33 mins
    Niel Levonius, Director, Product Marketing; David Van Der Steen, Product Marketing; Jim Payne, Product Marketing, RingCentral
    In this increasingly distributed work world, close collaboration among employees can't be taken for granted. But what does it take to keep your employees engaged and motivated? In this interactive webinar, our panelists discuss the foundations of effective team dynamics, what workstream conversation and collaboration means today, and how collaboration tools can impact employee productivity.
  • Accelerate Your OpenStack Deployment Recorded: Jul 28 2015 60 mins
    Jeramiah Dooley, Cloud Architect, SolidFire
    Enterprises around the world have embraced OpenStack as their cloud management platform because of its ability to simply and effectively manage shared infrastructure. To quickly realize OpenStack's benefits, rapid deployment of a production cloud that delivers mixed workload capabilities on a solid and dependable foundation is critical.

    Join this webinar to learn how agile infrastructure for OpenStack enables you to quickly stand up a dynamic self-service cloud infrastructure so you can easily take advantage of the flexibility, scalability, and efficiency of OpenStack.

    Attendees will leave with a better understanding of how Agile Infrastructure:

    - Extends the core values of cloud: scale, guaranteed performance, automation, high availability and efficiency
    - Ensures you deploy OpenStack using a process that's repeatable and error free
    - Allows you to run production and test/dev workloads on one storage platform
    - Provides higher utilization, better performance and more operational efficiency than legacy solutions
  • Number porting 101: The What and When of Porting to a Cloud VoIP Phone System Recorded: Jul 23 2015 36 mins
    Troy Hess, Number Transfer Service Delivery Manager, RingCentral Inc
    Number porting is a meticulous process. You want to do the right thing at the right time, or you could throw off your transition schedule. We’ll take you through the timeline and point out the pitfalls so that you can transition to your new cloud phone system without a hitch.
  • Does Your DR Replication Strategy Match Your Business Needs Recorded: Jul 23 2015 49 mins
    Gianluca Mariani, SNIA Europe Italy Committee (HP)
    Data unavailability results in lost revenue, customers or business failure. Of the companies experiencing disasters, 43 percent never reopen and 29 percent close within two years.

    Join Gianluca Mariani and other members of the SNIA Italy committee as they discuss the best disaster recovery replication strategies, focusing on defining SLAs, choosing the right architecture, choosing the ingredients, and how cloud can play a part in DR.
  • Preventing Chaos: Start Orchestrating Resiliency Recorded: Jul 23 2015 34 mins
    Fernando Tavares, Solutions Marketing Manager EMEA at Symantec
    How confident are you that your business will bounce back and be resilient in case of a major outage? This can be even more challenging today with dispersed data centers that are a mix of physical, virtual, and cloud based.

    Join Fernando as he explains how you can confidently meet IT business continuity compliance requirements, ensure business agility while maintaining existing IT investment, and predictably meet service level agreements (SLAs) at all times.
  • DRaaS and Cloud Backup: Can you secure your company's assets with Hybrid Cloud? Recorded: Jul 23 2015 48 mins
    Eric Sansonny, General Manager, Aruba.IT
    Ensuring Business continuity and managing risks is becoming more and more crucial for companies heavily relying on technical infrastructure to run their business such as CRM, ERP, CMS, accounting, big data and more.

    Todays's economy cannot be conceived without the use of such systems, more and more connected and presumably accessible from everywhere.

    Data is now the key asset of any company, and needs to be protected the same way as everyone protects their assets.

    But the reality is far from this. So many companies are "saving" money by using non-redundant infrastructures, networks or servers, and often have to experience the worst scenario to start digging into Disaster Recovery, but it's already too late.

    So join Eric Sansonny as he looks at Disaster Recovery as a Service and Cloud Backups to see if the solution lies there.
  • Hyper-converged BCDR: Using local, remote & cloud-based backups for resiliency Recorded: Jul 23 2015 29 mins
    Wim Vandebroeck, Director of Service, Nutanix
    The vast majority of applications today are under protected – or completely unprotected – making enterprises vulnerable to data loss or downtime during disasters. Legacy data protection and DR solutions, while still relevant to certain classes of workloads, have failed to adapt to the needs of modern virtualized applications and infrastructure.

    Join Wim Vandebroeck as he explains how to use local, remote, and cloud-based backups to achieve high-levels of availability and resiliency in the event of component failure, node failure, rack failure, or an entire datacenter outage.
  • OpenShift on OpenStack at Cisco Recorded: Jul 22 2015 43 mins
    Daneyon Hansen
    OpenShift Commons Briefings allow you to have access to trainings you might have missed on DevOps, operations and application development. Join this presentation to learn how to use OpenShift on OpenStack to deploy apps at rocket speed.

    For more interactive sessions, join OpenShift Commons: http://commons.openshift.org/index.html#join
  • Windows 10 Demo Recorded: Jul 22 2015 36 mins
    Stephen Rose, Senior Product Marketing Manager, Windows & Devices – US, Microsoft
    The new Microsoft Windows 10 platform is an exciting step forward from both a functionality and a security perspective. Senior Product Marketing Manager, Stephen Rose covers the new features of this operating system and what they mean to you as a way of adding additional security to your organization.
  • Minimizing Risk with One, Automated Disaster Recovery Solution Recorded: Jul 22 2015 45 mins
    Mike Gelhar, Systems Engineer, Long Term Care Group
    Many organizations have complex BC/DR plans consisting of several products, requiring multiple people to be present to execute the recovery, should disaster strike. This was the case at Long Term Care Group. They were using an orchestration tool with storage-based replication. Executing a DR test was becoming more and more difficult and confidence in their plan was fading.

    Zerto Virtual Replication provides continuous block-level replication and fully automated and orchestrated failover, recovery, failback and DR testing. Mike Gelhar, Systems Engineer at Long Term Care Group knew they had found the solution they needed to deliver robust BC/DR while greatly reducing risk.

    - Reduce risk with an automated solution that anyone can execute
    - DR Testing ensures recovery through reports and provides the opportunity to make adjustments in the plan
    - Maximize the investment with a solution that can simplify migrations and maintenance of the environment
    - Installation is complete in one hour with no configuration changes so the carefully architected production environment is not changed, further reducing risk
  • Defining The Role of Cloud in Your Data Protection Business Continuity Plan Recorded: Jul 21 2015 58 mins
    Jon Toigo
    Join us and business continuity expert, Jon Toigo for a practical discussion on effectively leveraging cloud services for your data protection and backup strategies. Toigo, the prolific author of thousands of articles and 17 tech-related books, emphasizes local storage of critical data combined with a low cost, off-site storage option that includes cloud storage.

    You’ll also see ways to easily connect your data protection efforts to leading cloud services, such as Amazon Web Services’ Storage Gateway and low-cost S3 services.
All you need to know, what it means and why it matters
Cloud computing is a general concept that incorporates software-as-a-service (SaaS), platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS) and other recent well-known technology trends in which the common theme is reliance on the Internet for satisfying the computing needs of the users.

This channel features presentations by thought leaders who cover the key topic areas in this increasingly important field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securely Building Clouds: Thoughts and Concerns
  • Live at: May 16 2012 12:00 pm
  • Presented by: Edward Haletky, Cloud Analyst, The Virtualization Practice
  • From:
Your email has been sent.
or close
You must be logged in to email this