Safe at Any Speed!

Presented by

Kevin Rowney, Senior Director, Breach Response and MegaTrends, Symantec Corporation

About this talk

Critics have likened cloud computing to flying in an airplane, in that loss of service could be catastrophic to an organization that trusts its data in the cloud. For those who have chosen the cloud computing route for their business, this session will liken cloud implementation to buying a car. Just as a new car purchase requires research and preparation to get the highest quality product at the best price, organizations should do their homework to ensure effective cloud service that delivers high availability and good performance. The session will start by examining the most common concerns expressed by enterprises when making decisions around cloud computing, including possible downtime and loss of data control. With the risks carefully delineated, we will then outline the steps to the most effective cloud solution possible such as prioritizing services by tiers, establishing recovery time objectives (RTOs) and recovery point objectives (RPOs), and the important questions to ask regarding data handling and how to negotiate favorable SLAs. Speaker Bio: Kevin Rowney is a data loss prevention visionary who joined Symantec in 2007 as part of the Vontu acquisition, a company which he founded. He currently oversees MegaTrends and Breach Response at Symantec and is focused on helping customers address breach incidents and identifying risks of future breaches. He also drives MegaTrends thought leadership at Symantec, covering Moblity, Cloud and Virtualization. For the past 14 years, Rowney served in a variety of security roles at software startups in Silicon Valley. At Vontu, Rowney conceived the original value proposition, designed the system architecture and wrote the patent-pending search algorithms used in their award-winning product.

Related topics:

More from this channel

Upcoming talks (19)
On-demand talks (3501)
Subscribers (180251)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.