CSO Executive Seminar on Securing the Cloud
 
New Registration
Agenda
May 19, 2011
7:30 am - 8:30 amRegistration and Networking Breakfast
8:30 am - 8:45 amOpening Remarks
Derek Slater, Editor in Chief, CSO magazine and CSOonline.com
8:45 am - 9:45 amAssessing Risks in the Cloud
Jason Witty, SVP, International Information Security Executive, Global Information Security, Bank of America Corporation
Security ranks as one of the top worries (if not the top concern) of organizations considering cloud implementations. In this session, a key member of the Cloud Security Alliance will delve into the range of risks when using cloud-based platforms -- from data protection to performance and more -- and will offer critical strategies to mitigate them.
 
 
9:45 am - 10:15 amMitigating Risks with Cloud Computing
Dan Reis, Director of U.S. Product Marketing, Trend Micro
Cloud computing presents opportunities for companies that want to change or add to their computing needs while reducing costs and increasing flexibility. With these benefits, however, come some unique risks. In this session, we’ll discuss the risks, how companies can best take advantage of the cloud, and how they can do so while maintaining the security of their data. We’ll also discuss the kinds of systems that can reduce and eliminate risks.
 
 
10:15 am - 10:45 amNetworking Break
10:45 am - 11:30 amWhat Should You Move to the Cloud, and How Do You Protect It?
Dan Lohrmann, CTO, State of Michigan
For many organizations compelled to find efficiencies with the cloud, the first question is, what portions of our IT footprint should we put there? Similarly, what technologies and policies should we implement to mitigate risks? In this session, get some foundational and top-level advice from a CIO well-seasoned with cloud experience.
 
 
 

11:35 am - 12:05 pmTrust in the Cloud (RSA and Deloitte)
Luiza Aguiar, Senior Product Marketing Manager, Virtualization and Cloud Solutions, RSA
Sharon Chand, Director, Security & Privacy, Deloitte & Touche LLP
Robert Polansky, Senior Technologist, RSA
Organizations around the world have high hopes for the cloud’s ability to transform IT infrastructures, applications, and information management. With that ability come challenges – and it’s not just about the challenge of determining the right cloud vendors and implementation strategies. Security, risk and compliance can be significantly affected by cloud adoption. But if control plus visibility is the formula for trust in the cloud, how do we solve for it? In this session we’ll explore key security controls and methods for protecting identities, information and infrastructure that enable organizations to leverage hybrid and public clouds -- while ensuring compliance requirements are met.
 
 
Protecting Your Data in the Cloud
Ulf Mattsson, CTO, Protegrity
Cloud computing is the new frontier for data security, and companies are adopting cloud services faster than security solutions can protect them. A survey conducted at DEFCON 2010, the premier annual hacker conference, revealed that 96 percent of the participants believed the cloud would open up more hacking opportunities. Given that hackers are now widening their scope to target data that includes personally identifiable information as well as financial information, cloud security has become the biggest concern in the data security industry. In this session, Ulf Mattsson will address best practices for how companies should secure data in the cloud.
 
 
12:05 pm - 1:05 pmLunch with Discussion Topics
Security and Trust in the Cloud
Join us as we discuss the issues and challenges organizations face when securing their cloud initiatives.
Hosted by Michael Whalen, Product Manager, CSC

Maintaining Security and Compliance in the Face of Challenges
New Internet threats and attack techniques are emerging every day. Networks, websites, databases, applications and end users are under constant attack as cybercriminals relentlessly target information systems to steal data that can be used for financial gain.  At the same time, with limited resources, organizations are under pressure to maintain compliance with growing industry and regulatory mandates, while increasing service levels and delivering strategic projects that will grow the business.  Join us as we discuss how to cope in these conditions.
Hosted by Dell

Managing Web Security Tools and Services in Your Environment
What works and what doesn’t in your environment?  How do you manage all the different tools and services?  Join us as we discuss this and more.
Hosted by Ryan Biel, Sr. Director, WhiteHat Security


1:05 pm - 1:50 pmSecuring the Cloud: What You Should Be Worrying About, and Why
Michael R. Overly Esq., Partner, Foley & Lardner LLP
The first step in securing anything in the cloud is negotiating the right contract terms. Get critical advice from a top legal expert in this session and learn how the federal computer crime statute -- the Computer Fraud and Abuse Act -- can be a valuable tool in securing the cloud.
 
 
1:50 pm - 2:20 pmFear of Flying, And How You Can Overcome It
Joseph Tobolski, Senior Director for Data & Platforms R&D, Accenture Technology Labs
Just like flying is for some people, cloud computing can be a daunting proposition for the enterprise. Many companies worry about theft, loss or legal noncompliance if they put data in the public cloud. But waiting on the sidelines isn’t a good option, because your competitors may already be capitalizing on opportunities afforded by the cloud. As with any technological shift, the risks can be managed if viewed in a pragmatic light. This talk will present five steps for crafting a strong cloud security strategy now.
 
 
2:20 pm - 3:05 pmCreating a Cloud Security Roadmap
Cathie Kozik CISM, Corporate Vice President of IT, Motorola Solutions, Inc.
Jason Witty, SVP, International Information Security Executive, Global Information Security, Bank of America Corporation
Derek Slater, Editor in Chief, CSO magazine and CSOonline.com

As projects to move IT operations and applications to the cloud take shape, IT and security executives must document what is moving where, how it’s being secured, and what additional security layers might be needed. Get key advice on how to build your roadmap in this session.

3:05 pm - 3:20 pmWrap Up and Closing Remarks
Derek Slater, Editor in Chief, CSO magazine and CSOonline.com