Presenter: Dean Ocampo, CISSP, Dir. of Product Marketing & Tom Stickle, Sr. Solution Architect, Amazon Web Services
Organizations who have locked down PCI in the traditional Data Center are now struggling with how to transform to a cloud-oriented world with their compliance-impacted data intact. Plainly put, PCI compliance is enabled through a combination of certified infrastructures, and protection and control of PAN data – and the same principles apply whether you're in the Data Center and in the Cloud. In this webcast, we'll show you what you need to know about PCI in the Cloud – selecting the right infrastructure, understanding audit scope, and a checklist for enforcing and enabling controls that will ensure critical protection and compliance of your data no matter where it goes.
Presenter: Iddo Kadim, Director of Data Center Virtualization Technologies, Intel
Security is a key concern in cloud today. Security solutions are often sold on the basis of fear—how to stop malicious hackers. And there is value in this, for the threats are often real. But in today's competitive world, one must also focus on how technology allows growth and innovation while also meeting security requirements. Attendees will learn how Intel is enhancing platforms with new security capabilities and enabling a broad ecosystem of solutions that allow companies to embrace virtualization and cloud without compromising security, thus gaining more efficiency, control and functional compliance.
Presenter: Jonathan Armstrong, Technology Lawyer Partner, Duane Morris LLP
All you ever wanted to know about the legal risks of cloud computing, but were too afraid to ask. In this webcast acclaimed technology lawyer Jonathan Armstrong gives a quick rundown of the legal issues of cloud computing including the latest news on regulatory developments in Europe and the Americas. Jonathan also discusses the UK regulator's checklist for cloud vendors and purchasers, data privacy issues and the need for flexibility and portability in legal agreements.
Presenter: Emma Webb-Hobson, Information Assurance Consultant, QinetiQ
Examining the issues facing small to medium enterprises when choosing a cloud service provider. This presentation will give an overview of what areas and questions the SME procurer should consider to make an informed decision about adopting new cloud services.
Presenter: Gregor Petri, Advisor on Lean IT and Cloud Computing, CA Technologies
The economies of cloud computing promise great rewards. But these rewards will only become reality if the associated risks of cloud computing are addressed. And preferably these risks should be addressed early on, ideally during the design of these services. In this session you will learn about a ground breaking new way to design, build and run new, reliable and secure cloud services. In the age of cloud computing, leveraging virtualization, abstraction and sourcing are key to delivering greater returns. See how this can be achieved in a simple and repeatable way.
Presenter: Glyn Bowden, SNIA & Storage Infrastructure Architect
The introduction of computing and data services in a virtualized and service provider context exposes the customer's information to a new set of threats and vulnerabilities. This session provides an introduction to those threats and what techniques are available to mitigate the threats.
Presenters: Michael Sutton, VP of Research, Zscaler; Eran Feigenbaum, Director of Security, Google Apps; and Matt Broda, Security Strategist, Microsoft
Cloud vendors promise powerful resources at an attractive price and this has led many enterprises to consider migrating data and applications to cloud based architectures. Vendors also promise increased overall security thanks to the economies of scale which allow them to employ staff and technologies that offer greater security than a typical enterprise could justify. Yet many remain skeptical of the cloud when it comes to trusting a third party with precious data. At the same time, multi-tenant architectures housing data from multiple sources make clouds attractive targets for attackers.
When: May 11 | 2011 View Webinar
This session will focus on the value of internal tokenization in reducing scope and potential audit costs at the datacenter, with a specific focus on post-payment applications, databases, loyalty tracking systems, data warehousing, and business applications.