Presenter: Gregor Petri, Advisor on Lean IT and Cloud Computing, CA Technologies
The economies of cloud computing promise great rewards. But these rewards will only become reality if the associated risks of cloud computing are addressed. And preferably these risks should be addressed early on, ideally during the design of these services. In this session you will learn about a ground breaking new way to design, build and run new, reliable and secure cloud services. In the age of cloud computing, leveraging virtualization, abstraction and sourcing are key to delivering greater returns. See how this can be achieved in a simple and repeatable way.
Presenter: Glyn Bowden, SNIA & Storage Infrastructure Architect
The introduction of computing and data services in a virtualized and service provider context exposes the customer's information to a new set of threats and vulnerabilities. This session provides an introduction to those threats and what techniques are available to mitigate the threats.
Presenters: Michael Sutton, VP of Research, Zscaler; Eran Feigenbaum, Director of Security, Google Apps; and Matt Broda, Security Strategist, Microsoft
Cloud vendors promise powerful resources at an attractive price and this has led many enterprises to consider migrating data and applications to cloud based architectures. Vendors also promise increased overall security thanks to the economies of scale which allow them to employ staff and technologies that offer greater security than a typical enterprise could justify. Yet many remain skeptical of the cloud when it comes to trusting a third party with precious data. At the same time, multi-tenant architectures housing data from multiple sources make clouds attractive targets for attackers.
This session will focus on the value of internal tokenization in reducing scope and potential audit costs at the datacenter, with a specific focus on post-payment applications, databases, loyalty tracking systems, data warehousing, and business applications.
Recorded: April 27 | 2011
For many organizations, Sarbanes-Oxley compliance is mandatory; both on the financial side and on the IT side managing the process can be an arduous an unwitting waste of time. Walkthroughs that need to be reviewed by numerous individuals, tens of controls that need to be sampled and tested in detail can come with time lags that makes an already detailed task more cumbersome.
The widespread private use by employees is embraced by many businesses in their communications. The policies and procedures on the proper business use of social media should address the protection of intellectual property, but also consider and respect the interest of preserving the public domain and fair use/dealing, of stimulating fair competition and innovation.
Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.
In this panel discussion we will address the challenges IT teams face as a result of siloed, inefficient point tool approaches to administering and enforcing security and compliance policy across hybrid IT infrastructures.
Integrating IT Risk Management systems is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.
Presenting: Chris Noell, EVP of Product Management at TruArx
For many organizations, Sarbanes-Oxley compliance is mandatory, but automation of the self-assessment process can make it less painful. There are many advantages to using an IT GRC tool to automate assessments such as speed, efficiency, data integrity, and improved analysis.
Recorded: Sept 23 2010
Presenting: Brian Zawada, Avalution Consulting & John DiMaria, eFortresses
There has been much debate regarding which guidelines or standards are best suited for organizational business continuity and management.
Recorded: 25 August 2010
Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.
Recorded: Wednesday, July 21st @ 2pm EST
Presented By: Michael Rasmussen, Corporate Integrity, and Chris Noel, TruArx.
In today's economic climate, many organizations outsource parts of their business to take advantage of cost savings and solution-expertise. However, as vendor relationships increase, it becomes more difficult to manage them. The risks assumed by outsourcing can be significant without a vendor management program.
When: Jan 13 2011
Presenting: Dave Bartoletti; Taneja Group, Senior Analyst
In this presentation, Taneja Group analyst Dave Bartoletti will share his insights, strategies and outlook on the rapidly emerging field of cloud-based data protection, including backup, recovery, replication and DR.
When: Jan 13 2011
Presenting: Javier Carrillo, Lead Business Continuity Planner
Individuals are sometimes thrust into the world of Oz (Business Continuity) with little or no background in the area. Through their journey in Oz, they stumble upon resources and find frequent barriers to success.
When: Jan 13 2011
Presenting: Vicki Gavin, Head of Business Continuity, The Economist Group
Join Vicki Gavin, Head of Business Continuity as she explores the emerging challenges in 2011 for business resilience in the supply and industry chain.
When: Jan 13 2011
Presenting: Paul Rivett, Operations Director, CNet Training
What is the perception of BCDR & cloud backup - are they useless you test them?
When: Jan 13 2011
Presenting: Ibrahim Hasan, CEO, Act Now Training
Ibrahim Hasan is a recognised expert on data protection, freedom of information and surveillance law. He was previously Principal Solicitor at Calderdale Council and has worked for Bradford Council and Nottinghamshire County Council.
When: Jan 13 2011
Presenting: Shankar Swaroop, Director of BCDR, NEXCOM
An organization's resiliency is directly related to the effectiveness of its continuity capability. An organization's continuity capability—its ability to perform its essential functions continuously—rests upon key components and pillars, which are in turn built on the foundation of continuity planning and program management.
When: Jan 13 2011
Presenting: Ashar Baig; Chairman of Cloud Backup & Recovery, SIG, SNIA
Most companies are so focused on data backup that they often forget "why" they are backing up their data in the first place. Data protection (backup, snapshots, replication, CDP, etc.) is just a means to an end.
When: Dec 07 2010
Presenting: Ward Spangenberg, Director, Zynga Game Network; Dave Asprey, Trend Micro; Becky Pinkard, The SANS Institute
Join Ward Spangenberg, Director of Security at Zynga Game Network; Becky Pinkard of SANS Institute and Dave Asprey of VP Cloud Security, Trend Micro as they critically evaluate if vendors are doing enough to prevent the threats from hackers in the cloud.
When: Dec 07 2010
Presenting: Bob Tarzey, Analyst & Director, Quocirca
In IT the term end point is broad, covering everything from servers at a fixed location inside the firewall to smartphones that may move from one side of the globe to another in a matter of hours.
When: Dec 07 2010
Presenting: Derek Brink, Vice President & Research Fellow, Aberdeen Group
Worries of 2011 – What to look out for and how to tackle them.
When: Dec 07 2010
Presenting: Alwyn Nash, Endpoint Technical Director Check Point Software Technologies; Meint Dijkstra, Computerlinks
Alwyn is an experienced professional with 15 years of experience in the IT business. He has held previous positions with Pointsec Mobile Technologies, Royal London Insurance, EDS and the UK Armed Forces.