Agenda |
May 19, 2011 | ||
7:30 am - 8:30 am | Registration and Networking Breakfast | |
8:30 am - 8:45 am | Opening Remarks Derek Slater, Editor in Chief, CSO magazine and CSOonline.com | |
8:45 am - 9:45 am | Assessing Risks in the Cloud Jason Witty, SVP, International Information Security Executive, Global Information Security, Bank of America Corporation Security ranks as one of the top worries (if not the top concern) of organizations considering cloud implementations. In this session, a key member of the Cloud Security Alliance will delve into the range of risks when using cloud-based platforms -- from data protection to performance and more -- and will offer critical strategies to mitigate them. | |
9:45 am - 10:15 am | Mitigating Risks with Cloud Computing Dan Reis, Director of U.S. Product Marketing, Trend Micro Cloud computing presents opportunities for companies that want to change or add to their computing needs while reducing costs and increasing flexibility. With these benefits, however, come some unique risks. In this session, we’ll discuss the risks, how companies can best take advantage of the cloud, and how they can do so while maintaining the security of their data. We’ll also discuss the kinds of systems that can reduce and eliminate risks. | |
10:15 am - 10:45 am | Networking Break | |
10:45 am - 11:30 am | What Should You Move to the Cloud, and How Do You Protect It? Dan Lohrmann, CTO, State of Michigan For many organizations compelled to find efficiencies with the cloud, the first question is, what portions of our IT footprint should we put there? Similarly, what technologies and policies should we implement to mitigate risks? In this session, get some foundational and top-level advice from a CIO well-seasoned with cloud experience. | |
11:35 am - 12:05 pm | Trust in the Cloud (RSA and Deloitte) Luiza Aguiar, Senior Product Marketing Manager, Virtualization and Cloud Solutions, RSA Sharon Chand, Director, Security & Privacy, Deloitte & Touche LLP Robert Polansky, Senior Technologist, RSA Organizations around the world have high hopes for the cloud’s ability to transform IT infrastructures, applications, and information management. With that ability come challenges – and it’s not just about the challenge of determining the right cloud vendors and implementation strategies. Security, risk and compliance can be significantly affected by cloud adoption. But if control plus visibility is the formula for trust in the cloud, how do we solve for it? In this session we’ll explore key security controls and methods for protecting identities, information and infrastructure that enable organizations to leverage hybrid and public clouds -- while ensuring compliance requirements are met. | Protecting Your Data in the Cloud Ulf Mattsson, CTO, Protegrity Cloud computing is the new frontier for data security, and companies are adopting cloud services faster than security solutions can protect them. A survey conducted at DEFCON 2010, the premier annual hacker conference, revealed that 96 percent of the participants believed the cloud would open up more hacking opportunities. Given that hackers are now widening their scope to target data that includes personally identifiable information as well as financial information, cloud security has become the biggest concern in the data security industry. In this session, Ulf Mattsson will address best practices for how companies should secure data in the cloud. |
12:05 pm - 1:05 pm | Lunch with Discussion Topics Security and Trust in the Cloud Join us as we discuss the issues and challenges organizations face when securing their cloud initiatives. Hosted by Michael Whalen, Product Manager, CSC Maintaining Security and Compliance in the Face of Challenges New Internet threats and attack techniques are emerging every day. Networks, websites, databases, applications and end users are under constant attack as cybercriminals relentlessly target information systems to steal data that can be used for financial gain. At the same time, with limited resources, organizations are under pressure to maintain compliance with growing industry and regulatory mandates, while increasing service levels and delivering strategic projects that will grow the business. Join us as we discuss how to cope in these conditions. Hosted by Dell Managing Web Security Tools and Services in Your Environment What works and what doesn’t in your environment? How do you manage all the different tools and services? Join us as we discuss this and more. Hosted by Ryan Biel, Sr. Director, WhiteHat Security | |
1:05 pm - 1:50 pm | Securing the Cloud: What You Should Be Worrying About, and Why Michael R. Overly Esq., Partner, Foley & Lardner LLP The first step in securing anything in the cloud is negotiating the right contract terms. Get critical advice from a top legal expert in this session and learn how the federal computer crime statute -- the Computer Fraud and Abuse Act -- can be a valuable tool in securing the cloud. | |
1:50 pm - 2:20 pm | Fear of Flying, And How You Can Overcome It Joseph Tobolski, Senior Director for Data & Platforms R&D, Accenture Technology Labs Just like flying is for some people, cloud computing can be a daunting proposition for the enterprise. Many companies worry about theft, loss or legal noncompliance if they put data in the public cloud. But waiting on the sidelines isn’t a good option, because your competitors may already be capitalizing on opportunities afforded by the cloud. As with any technological shift, the risks can be managed if viewed in a pragmatic light. This talk will present five steps for crafting a strong cloud security strategy now. | |
2:20 pm - 3:05 pm | Creating a Cloud Security Roadmap Cathie Kozik CISM, Corporate Vice President of IT, Motorola Solutions, Inc. Jason Witty, SVP, International Information Security Executive, Global Information Security, Bank of America Corporation Derek Slater, Editor in Chief, CSO magazine and CSOonline.com As projects to move IT operations and applications to the cloud take shape, IT and security executives must document what is moving where, how it’s being secured, and what additional security layers might be needed. Get key advice on how to build your roadmap in this session. | |
3:05 pm - 3:20 pm | Wrap Up and Closing Remarks Derek Slater, Editor in Chief, CSO magazine and CSOonline.com |