CloudTweaks Media Partner For The Cloud Security Alliance Congress November 16-17

The Cloud Security Alliance Congress

CloudTweaks is pleased to be a Media Partner with the MIS Training Institute and The Cloud Security Alliance Congress.

The Cloud Security Alliance, the world’s leading organization on cloud security and MIS Training Institute are assembling top experts and industry stakeholders to discuss the state of cloud security and best practice for cloud computing. This two day event will consist of four tracks consisting of Legal and Compliance Issues, Federal, Management and Security and Securing the Cloud.

Cloud computing represents the next major generation of computing, as information technology takes on the characteristics of an on-demand utility. The ability to innovate without the constraint of significant capital investments is unleashing a wave of new opportunities that promises to remake every business sector.

While the massive changes underway are unstoppable, our collective responsibility to good governance, compliance, managing risks and serving our customers must remain. Security is consistently cited as the biggest inhibitor to more aggressive cloud adoption. With this in mind, we have created our first annual Cloud Security Alliance Congress, the industry’s only conference devoted to the topic of cloud security. Our speakers’ roster and confirmed attendees represent the key thought leaders and stakeholders shaping the future of cloud security, which is the future of the cloud itself. On November 16-17, 2010, Orlando will be the epicenter of the movement to secure the cloud. Please join us.

Among the Topics to be Presented
+ Enabling Secure and Compliant Information Services in Hybrid Clouds
+ Audit Trail Protection: Preventing a False Sense of Security
+ Practical Ways to Measure Data Privacy in the Cloud
+ Bringing Cloud Operational Benefits to Security
+ Security in a Hybrid Environment
+ Top Threats and Risks to Cloud Computing
+ Disruptive Innovation and Cloud Computing Security
+ Latest CSA Research Findings
+ Cloud Identity and Access Management
+ Objectivity and Transparency in the Decision-Making Process
+ Security in a Hybrid Environment
+ Disruptive Innovation and Cloud Computing Security
+ Latest CSA Research Findings
+ Gain insight into how to streamline enterprise provisioning and access control
+ Find out how to use the CSA Controls Matrix to assess cloud security providers
+ Understand federal specific compliance requirements related to cloud computing
+ Learn from case studies detailing attacks against cloud computing infrastructures
+ Discover a framework for identifying customer governance and internal control requirements

Keynotes:

Creating a Safer, More Trusted Internet
Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft

Building a Secure Future in the Cloud
John W. Thompson, Chairman of the Board, Symantec Corporation

The Cloud Computing Forecast From a Former Regulator
Pamela Jones Harbour, former Commissioner, Federal Trade Commission 2003-2010; Partner, Fulbright & Jaworski, L.L.P.

The CSA Perspective: A Review of Cloud Security in 2010 and Our Roadmap for 2011
Dave Cullinane, CPP, CISSP, Chief Information Security Officer & Vice President, eBay MP Global Information Security; Chairman of the Board, Cloud Security Alliance

The Cloud Security Alliance
was formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Now in our second year, the Cloud Security Alliance has over 10,000 members around the globe, and is leading many key research projects to secure the cloud.

Board of Directors
Jerry Archer, Sallie Mae
Alan Boehme, ING
Dave Cullinane, eBay
Paul Kurtz, Good Harbor
Nils Puhlmann, Zynga
Jim Reavis, CSA

Thank you to the 2010 Program Planning Committee for all your hard work to put together this important event.
Glenn Brunette, Senior Director, Enterprise Security, Oracle Corporation
Ron Hale, CISM, Chief Relations Officer, ISACA
Chris Hoff, Director, Cloud and Virtualization Solutions, Data Center Solutions, Cisco Systems, Inc.
John Howie, Senior Director, Microsoft Corporation
Dan Hubbard, Chief Technology Officer, WebSense, Inc.
Scott Matsumoto, Principal Consultant, Cigital, Inc.
Rich Mogull, Analyst/CEO, Securosis, LLC
Michael Sutton, Vice President, Security Research, Zscaler
Becky Swain, CIPP/IT, CISSP, CISA, Program Manager, IT Risk Management, Cisco Systems, Inc.
Lynn Terwoerds, Vice President, Business Development, SafeMashups
Todd Thiemann, Senior Director, Data Center Security, Trend Micro

Interested in exhibiting or sponsoring?
Contact: Paul Moschella, Sponsorship & Exhibit Sales, 508-532-3652 or pmoschella@misti.com

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…