Presenter: Tim Dunn, Vice President of Strategy, CA Technologies Security Europe
Traditional Identity and Access Management (IAM) platforms were built with one primary scenario in mind, to run on an enterprise's premises for their tightly scoped user community. The business and technology world has moved on, businesses want to be more innovative and agile. Gaining a competitive edge means exploiting technologies such as cloud, virtualisation, worker mobility enablement, personal device adoption, and business collaboration tools. IAM has become pivotal in enabling business innovation.
Presenter: Iddo Kadim, Director of Data Center Virtualization Technologies, Intel
Security is a key concern in cloud today. Security solutions are often sold on the basis of fear—how to stop malicious hackers. And there is value in this, for the threats are often real. But in today's competitive world, one must also focus on how technology allows growth and innovation while also meeting security requirements. Attendees will learn how Intel is enhancing platforms with new security capabilities and enabling a broad ecosystem of solutions that allow companies to embrace virtualization and cloud without compromising security, thus gaining more efficiency, control and functional compliance.
Presenter: Dean Ocampo, CISSP, Dir. of Product Marketing & Tom Stickle, Sr. Solution Architect, Amazon Web Services
Organizations who have locked down PCI in the traditional Data Center are now struggling with how to transform to a cloud-oriented world with their compliance-impacted data intact. Plainly put, PCI compliance is enabled through a combination of certified infrastructures, and protection and control of PAN data – and the same principles apply whether you're in the Data Center and in the Cloud. In this webcast, we'll show you what you need to know about PCI in the Cloud – selecting the right infrastructure, understanding audit scope, and a checklist for enforcing and enabling controls that will ensure critical protection and compliance of your data no matter where it goes.
Presenter: Jason Wood, Assistant Professor, Jack Welch, President of WoodCPA Plus P.C.
The presentation will discuss audit considerations in a cloud computing environment. Technology professionals can learn what to expect from their auditors, and auditors can learn what areas to review in a cloud environment.
Presenter: Alan Priestly, Director, Cloud Marketing EMEA, Intel
Today, cloud access security requires more than a simplistic secure VPN tunnel or single sign on from tightly controlled corporate applications. Users are demanding access to the cloud from a wider range of clients and directly on the cloud platform itself. From a compliance standpoint it is a growing nightmare involving orphaned accounts, infected clients, and un-auditable silos of user activity data left outside enterprise control. In this session, Intel showcases key technologies that are being used in the market today to build a trusted client to cloud connection.
When: Sept 09 2010
Presenting: Eve Maler, PayPal, Identity Evangelist
Digital identities started to "move into the cloud" in the last decade, delivering on use cases such as cross-domain single sign-on and attribute-based authorization. With the rise of consumer identity providers and cloud-based software development, we face new opportunities and threats.
When: Sept 09 2010
Presenting: Jonathan Penn; Forrester Research, Vice President
Underpinned by both technology and economic disruptions, cloud computing is a sustainable, long-term IT paradigm that will fundamentally change the way business customers and individual users engage with technology providers. At the moment, most customers are confused by the overused "cloud" term and are concerned over the risks of cloud computing.
When: Sept 09 2010
Presenting: Patrick Sweeney; SonicWALL, VP of Product Management
The ease-of-use, high scalability and low maintenance of cloud computing are just some of the benefits that are driving adoption of this new trend within the enterprise. Gartner confirms this in a recent report* that revealed that cloud computing rates as the second highest technology priority in 2010, behind only virtualization.