Recorded: December 17 | 2020 Watch Now
Working From Home (WFH) is rapidly becoming the new norm, and cyber criminals across the globe are leveraging the panic induced by this pandemic to launch disruptive cyber-attacks. In the new WFH normal, you will have to secure every aspect of the architecture, whether it’s on premise hardware, cloud infrastructure or your employee’s endpoint devices. Any weakness in this entire chain will expose your IT infrastructure to security risks.
Recorded: February 1 | 2012
Cloud Computing has been hailed as the long sought after answer of low cost computing , where users can remotely store their data into the cloud and enjoy the on-demand high quality applications and services from a shared platform of computing resources. By outsourcing their data storage, users can be relieved from the burden of local data storage and maintenance, in some cases eliminating IT departments all together.
Recorded: December 5 | 2013 View
New initiatives such as cloud computing are imposing significant security risks on the corporation, network, IT and the day to day activities of the business. How do businesses maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.
Presenters: Michael Sutton, VP of Research, Zscaler; Eran Feigenbaum, Director of Security, Google Apps; and Matt Broda, Security Strategist, Microsoft
Cloud vendors promise powerful resources at an attractive price and this has led many enterprises to consider migrating data and applications to cloud based architectures. Vendors also promise increased overall security thanks to the economies of scale which allow them to employ staff and technologies that offer greater security than a typical enterprise could justify. Yet many remain skeptical of the cloud when it comes to trusting a third party with precious data. At the same time, multi-tenant architectures housing data from multiple sources make clouds attractive targets for attackers.
Presenter: Glyn Bowden, SNIA & Storage Infrastructure Architect
The introduction of computing and data services in a virtualized and service provider context exposes the customer's information to a new set of threats and vulnerabilities. This session provides an introduction to those threats and what techniques are available to mitigate the threats.
Presenter: Gregor Petri, Advisor on Lean IT and Cloud Computing, CA Technologies
The economies of cloud computing promise great rewards. But these rewards will only become reality if the associated risks of cloud computing are addressed. And preferably these risks should be addressed early on, ideally during the design of these services. In this session you will learn about a ground breaking new way to design, build and run new, reliable and secure cloud services. In the age of cloud computing, leveraging virtualization, abstraction and sourcing are key to delivering greater returns. See how this can be achieved in a simple and repeatable way.
Presenter: Emma Webb-Hobson, Information Assurance Consultant, QinetiQ
Examining the issues facing small to medium enterprises when choosing a cloud service provider. This presentation will give an overview of what areas and questions the SME procurer should consider to make an informed decision about adopting new cloud services.
Presenter: Jonathan Armstrong, Technology Lawyer Partner, Duane Morris LLP
All you ever wanted to know about the legal risks of cloud computing, but were too afraid to ask. In this webcast acclaimed technology lawyer Jonathan Armstrong gives a quick rundown of the legal issues of cloud computing including the latest news on regulatory developments in Europe and the Americas. Jonathan also discusses the UK regulator's checklist for cloud vendors and purchasers, data privacy issues and the need for flexibility and portability in legal agreements.