Back to Home
 

Archive for the 'Risk Management and Security' Category

 
Published by

Steve Wylie

Last week Cloud Connect hosted a “Tweet Chat” – a preplanned virtual discussion which takes place via Twitter.  The topic for our chat was “Management, application performance & security in a Hybrid Cloud world” which proved to be a fruitful topic of conversation.

We asked a series of questions to our faithful Cloud Connect Twitter followers and anyone else interested in joining the discussion.  The responses started coming in right away and it was interesting to see the variety of perspectives and responses.

Our first question dealt with whether data security concerns would stifle or spur hybrid cloud adoption.  Here’s a snapshot of the discussion:

Continue Reading »

 
Published by

Among the many challenges facing IT management is the need to provide robust web security while at the same time delivering flawless user experiences on any device, anywhere. To better understand how you can survive and thrive in the cloud while proactively addressing today’s security challenges, join a guest speaker from Forrester Research, Inc., and Akamai Technologies at the upcoming live web panel “Strategies for Securing, Optimizing and Controlling the Cloud.” In this interactive webcast sponsored by Akamai Technologies, you’ll learn about:

* Today’s changing threat landscape

* Web security that won’t slow you down

* Tips for optimizing your cloud deployment

* Solutions available to ensure protection and performance

Register now for this free webcast to learn how to maximize the benefits of cloud computing for your enterprise and for your bottom line.

Date: Wednesday, July 17, 2013 | Time: 10:00 am PT/1:00 pm ET | Duration: 60 minutes

================================

SPEAKERS:

  • Rick Holland, Chief Analyst, Forrester Research, Inc.
  • Gary Ballabio, Executive Director of Cloud Products, Akamai Technologies
  • Martin McKeay, Security Evangelist, Akamai Technologies
  • Steve Wylie, General Manager, Cloud Connect

================================

REGISTER NOW >>

================================

Sponsored by: Akamai

 

 
Published by

Andrew Wild has more than 20 years of experience leading teams to design, implement and operate secure networks and computer systems. As Qualys’ chief security officer, Andrew oversees the security, risk management and compliance of its enterprise and SaaS environments. Prior to joining Qualys, he managed a team of information security engineers responsible for the design, implementation and operation of security solutions for EMC’s SaaS offerings, with heavy emphasis on cloud and virtualization technologies. Prior to EMC, he was the chief security officer at Transaction Network Services. He has also held a variety of network engineering leadership roles with large network service providers including BT and Sprint. Andrew has a master’s degree in electrical engineering from George Washington University and a bachelor’s degree in electrical engineering from the United States Military Academy. He is a veteran of the United States Army and served in Operations Desert Shield and Desert Storm.

Here is an inside peek at his sessions at Cloud Connect:

  • An Opportunity for Continuous Security with Cloud Computing
    • It is clear that companies need to re-evaluate their security strategy with cyber attacks on the rise – even against large corporations with advanced IT security programs in place. Network perimeters are changing all the time with mobile devices and cloud services, and the problem grows more complex. The goal we all must strive for is to effectively protect information at the data level itself and streamline patching and mitigation processes. With cloud computing, we have an opportunity to automate key processes and provide continuous, better and invisible protection, while reducing the cost of securing such an infrastructure and applications as the costs can be distributed across thousands, even millions, of users. This session will discuss ways to proactively protect against cyberthreats leveraging a newer, more scalable security model that builds security into the fabric of cloud computing, while providing a continuous view of the security and compliance posture of current infrastructures and applications.

Register with priority code SMCCBlog and save up to $300* on your Cloud Connect All Access or Conference Pass.

 

*Discount calculated based on the on-site price and not combinable with other offers. Offer good on new registrations only. Prices after discount applied: All Access: $2,099.00 Conference: $1,699.00, Workshop: 799.00, Expo Plus: $150.00, Expo Only: Free

 
Published by

A post by John Pironti, Risk Management and Security Track Chair.

Cloud computing is no longer an interesting idea or concept to be investigated by most organizations but reality that is now part of their normal business activities. It is well understood through numerous studies and analysis that security is currently the primary roadblock that prevents organizations from widely adopting cloud computing capabilities for their core and critical business activities. This situation creates an interesting scenario that is similar to the theory of the unstoppable object (Cloud Computing) and the Immovable Object (Security) and what happens when they must coexist and thrive. The capability that will ultimately help organizations to solve this challenge is the use of information risk management. Continue Reading »

 

 
  • LinkedIn
  • Photos
  • Blog