CloudTweaks Media Partner For The Cloud Security Alliance Congress November 16-17

The Cloud Security Alliance Congress

CloudTweaks is pleased to be a Media Partner with the MIS Training Institute and The Cloud Security Alliance Congress.

The Cloud Security Alliance, the world’s leading organization on cloud security and MIS Training Institute are assembling top experts and industry stakeholders to discuss the state of cloud security and best practice for cloud computing. This two day event will consist of four tracks consisting of Legal and Compliance Issues, Federal, Management and Security and Securing the Cloud.

Cloud computing represents the next major generation of computing, as information technology takes on the characteristics of an on-demand utility. The ability to innovate without the constraint of significant capital investments is unleashing a wave of new opportunities that promises to remake every business sector.

While the massive changes underway are unstoppable, our collective responsibility to good governance, compliance, managing risks and serving our customers must remain. Security is consistently cited as the biggest inhibitor to more aggressive cloud adoption. With this in mind, we have created our first annual Cloud Security Alliance Congress, the industry’s only conference devoted to the topic of cloud security. Our speakers’ roster and confirmed attendees represent the key thought leaders and stakeholders shaping the future of cloud security, which is the future of the cloud itself. On November 16-17, 2010, Orlando will be the epicenter of the movement to secure the cloud. Please join us.

Among the Topics to be Presented
+ Enabling Secure and Compliant Information Services in Hybrid Clouds
+ Audit Trail Protection: Preventing a False Sense of Security
+ Practical Ways to Measure Data Privacy in the Cloud
+ Bringing Cloud Operational Benefits to Security
+ Security in a Hybrid Environment
+ Top Threats and Risks to Cloud Computing
+ Disruptive Innovation and Cloud Computing Security
+ Latest CSA Research Findings
+ Cloud Identity and Access Management
+ Objectivity and Transparency in the Decision-Making Process
+ Security in a Hybrid Environment
+ Disruptive Innovation and Cloud Computing Security
+ Latest CSA Research Findings
+ Gain insight into how to streamline enterprise provisioning and access control
+ Find out how to use the CSA Controls Matrix to assess cloud security providers
+ Understand federal specific compliance requirements related to cloud computing
+ Learn from case studies detailing attacks against cloud computing infrastructures
+ Discover a framework for identifying customer governance and internal control requirements

Keynotes:

Creating a Safer, More Trusted Internet
Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft

Building a Secure Future in the Cloud
John W. Thompson, Chairman of the Board, Symantec Corporation

The Cloud Computing Forecast From a Former Regulator
Pamela Jones Harbour, former Commissioner, Federal Trade Commission 2003-2010; Partner, Fulbright & Jaworski, L.L.P.

The CSA Perspective: A Review of Cloud Security in 2010 and Our Roadmap for 2011
Dave Cullinane, CPP, CISSP, Chief Information Security Officer & Vice President, eBay MP Global Information Security; Chairman of the Board, Cloud Security Alliance

The Cloud Security Alliance
was formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Now in our second year, the Cloud Security Alliance has over 10,000 members around the globe, and is leading many key research projects to secure the cloud.

Board of Directors
Jerry Archer, Sallie Mae
Alan Boehme, ING
Dave Cullinane, eBay
Paul Kurtz, Good Harbor
Nils Puhlmann, Zynga
Jim Reavis, CSA

Thank you to the 2010 Program Planning Committee for all your hard work to put together this important event.
Glenn Brunette, Senior Director, Enterprise Security, Oracle Corporation
Ron Hale, CISM, Chief Relations Officer, ISACA
Chris Hoff, Director, Cloud and Virtualization Solutions, Data Center Solutions, Cisco Systems, Inc.
John Howie, Senior Director, Microsoft Corporation
Dan Hubbard, Chief Technology Officer, WebSense, Inc.
Scott Matsumoto, Principal Consultant, Cigital, Inc.
Rich Mogull, Analyst/CEO, Securosis, LLC
Michael Sutton, Vice President, Security Research, Zscaler
Becky Swain, CIPP/IT, CISSP, CISA, Program Manager, IT Risk Management, Cisco Systems, Inc.
Lynn Terwoerds, Vice President, Business Development, SafeMashups
Todd Thiemann, Senior Director, Data Center Security, Trend Micro

Interested in exhibiting or sponsoring?
Contact: Paul Moschella, Sponsorship & Exhibit Sales, 508-532-3652 or pmoschella@misti.com

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

THE FUTURE OF BIG DATA AND DNS ANALYTICS

THE FUTURE OF BIG DATA AND DNS ANALYTICS

Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation Changing with the times is frequently overlooked when it comes to data center security. The technology powering today’s networks has become increasingly dynamic, but most data center admins still employ archaic security measures to protect their network. These traditional security methods just don’t stand a chance against today’s sophisticated attacks. That hasn’t stopped organizations…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…