Security and Privacy in the Cloud - Security and Privacy in the Cloud
Date: | 10-Jan-14 to 10-Jan-14 |
Location: | Online Event / Fremont / California / United States |
Category: | Technology Conferences & Trade Fairs |
Overview: Many organizations today are feeling pressure to reduce IT costs and optimize IT operations. Cloud computing is rapidly emerging as a viable means to create dynamic, rapidly provisioned resources for operating platforms, applications, development environments, storage and backup capabilities, and many more IT functions.
A staggering number of security considerations exist that information security professionals need to consider when evaluating the risks of cloud computing. Serious discussion of cloud security starts with a detailed introduction to the various delivery models of cloud computing ranging from Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between.
Each of these delivery models represents an entirely separate set of security conditions to consider, especially when coupled with various cloud types including: public, private, and hybrid. Managers, auditors, and systems and network administrators will benefit from a discussion into the technologies available for securing cloud-based assets while covering all the policies, processes, and compliance considerations that go along with this major technology shift.
Why Should You Attend: The cloud is everywhere! Well, that's what the marketing folks would have us believe, anyway. For security professionals, migrating systems, applications, and data to the cloud presents a new set of challenges to tackle. What kind of policies do we need, and how can we work with legal teams to incorporate language into contracts? How can we protect sensitive data with encryption, intrusion detection and prevention, and host and network access controls? Can we extend identity and access management tools and processes into the cloud? Senior Fellow and Chief Strategist, Melvin Greer provides clarity around cloud security and details the issues associated with data privacy.
Areas Covered in the Session:
Cloud Computing Overview
Cloud security issues and opportunities
Security vs. Privacy
Risk Mitigation Strategies
Data Privacy: A Legal Framework
Strategic Recommendations: What Should I do Now?
A staggering number of security considerations exist that information security professionals need to consider when evaluating the risks of cloud computing. Serious discussion of cloud security starts with a detailed introduction to the various delivery models of cloud computing ranging from Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between.
Each of these delivery models represents an entirely separate set of security conditions to consider, especially when coupled with various cloud types including: public, private, and hybrid. Managers, auditors, and systems and network administrators will benefit from a discussion into the technologies available for securing cloud-based assets while covering all the policies, processes, and compliance considerations that go along with this major technology shift.
Why Should You Attend: The cloud is everywhere! Well, that's what the marketing folks would have us believe, anyway. For security professionals, migrating systems, applications, and data to the cloud presents a new set of challenges to tackle. What kind of policies do we need, and how can we work with legal teams to incorporate language into contracts? How can we protect sensitive data with encryption, intrusion detection and prevention, and host and network access controls? Can we extend identity and access management tools and processes into the cloud? Senior Fellow and Chief Strategist, Melvin Greer provides clarity around cloud security and details the issues associated with data privacy.
Areas Covered in the Session:
Cloud Computing Overview
Cloud security issues and opportunities
Security vs. Privacy
Risk Mitigation Strategies
Data Privacy: A Legal Framework
Strategic Recommendations: What Should I do Now?
Visitors
Who Will Benefit:
Chief Security Officers
CIO's
IT Architects
Security Executives
Web Content Developers
Mobility Executives
Cloud Computing Staff
Social Media Staff
Auditors, and Systems and Network administrators
Chief Security Officers
CIO's
IT Architects
Security Executives
Web Content Developers
Mobility Executives
Cloud Computing Staff
Social Media Staff
Auditors, and Systems and Network administrators
Exhibitors
We are EITAGlobal, a continuing professional education provider with a difference. We believe that coming from a responsible and professional continuing professional education provider in the IT industry space; our trainings have to carry a premier value.
We have devised a strategy of making trainings extremely effective and relevant by bringing Experts and participants across the table. In line with this philosophy, we ensure that a high proportion of our trainings are in the form of live, in-person seminars and Consulting.
We have devised a strategy of making trainings extremely effective and relevant by bringing Experts and participants across the table. In line with this philosophy, we ensure that a high proportion of our trainings are in the form of live, in-person seminars and Consulting.
EIN News
provides powerful, real-time media monitoring, news aggregation & syndication services. Read the latest news about this topic. See:
- 3D Printing News Today
- Apple Samsung Patent War News
- Biotechnology News Today
- CeBIT News Today
- Conferences & Trade Shows Today
- Consumer Electronics Show News Today
- EMS News Today
- Game Developers Conference News Today
- Nanotechnology News Today
- Satellites News Today
- Semiconductor Industry Today
- Smartwatch News Today
- Technology Today
- Web 2.0 News Today