Evolving Your Security Infrastructure for the Cloud

Presented by

Shirief Nosseir, Director, Security Management, CA Technologies

About this talk

While the benefits of cloud computing are indeed compelling, there still remain real concerns, particularly in the areas of security, privacy and compliance. IT professionals must diligently weigh the risks against the rewards in assessing their cloud computing strategies and implementations. This presentation explores the impact of cloud computing on security strategies and how it is reshaping the evolution of identity management, information protection, and compliance-related technologies and architectures. In particular, it helps in understanding the various available approaches to cloud security – security to the cloud, for the cloud and from the cloud – and the key challenges facing them. The presentation also touches on the growing trend towards content-aware identity and access management and the key role it plays in bridging the traditionally separate identity management and information protection silos, how cloud computing is enforcing the link between security management and IT/service management disciplines, and a quick look at cloud security use cases already implemented by some of the early adopters. Shirief Nosseir is a director of security management solutions at CA Technologies. With 25 years in the software industry, Shirief’s experience ranges across the fields of security management, service and infrastructure management, application lifecycle management and business intelligence. This allows him to have insightful understanding of how to assist enterprises in developing business-oriented architectures, while melding traditionally disparate technology disciplines into whole solutions. Shirief is a regular speaker at conferences and educational events and presents frequently at the CA Cloud Academy security sessions.

Related topics:

More from this channel

Upcoming talks (21)
On-demand talks (3501)
Subscribers (180316)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.