The Lighter Side Of The Cloud –  Size Matters
The Lighter Side Of The Cloud – The Fog
The Lighter Side Of The Cloud – Disaster Recovery Plan
The Lighter Side Of The Cloud – Telecommuting
The Lighter Side Of The Cloud – PRISM

Second Annual Cloud Computing Security Alliance Congress – November 16-17, 2011

Second Annual Cloud Computing Security Alliance Congress – November 16-17, 2011

In 2010, cloud computing began the shift from a ‘nice to have’ to a ‘need to understand’ technology, as the promises of cost efficiencies and agility have begun to bear fruit.

The Second Annual Cloud Security Alliance Congress, the industry’s only conference devoted to the topic of cloud security, will provide practical solutions for managing the transition to the cloud, and implementing security as a key component rather than an afterthought of this transition. It will provide insight on the models and architectures, the controls and real ‘nuts and bolts’ of what must be done to secure cloud computing.

Our speakers’ roster and confirmed attendees represent the key thought leaders and stakeholders shaping cloud security.

On November 16 & 17, 2011 Orlando will be the epicenter of the very real movement to secure the cloud. Please join us.

Sessions Confirmed to Date:

Architecting and Building a Secure Virtual Infrastructure and Private Cloud
Rob Randell, CISSP, Staff Systems Engineer, Security and Compliance Specialist
VMware

e-Discovery 2.0 In the Cloud
Steve Markey, PMP, CISSP, CIPP, CISM, CISA, CCSK, Founder/Principal, nControl

Crytopgraphic Enforcement of Multi-Tenancy in Cloud Environments
Rob Johnson, Distinguished Engineer, Cloud Engineering, Unisys Corp.

The Cloud is in the Details – Security Policy and Privacy Requirements in the Era of Cloud Computing
Ben Rothke, CISSP, Senior Security Consultant, British Telecom

Hedged Transition Strategies
Brian V. Moran, CEO, GovernmentCIO

Implementation of the CloudAudit Protocol and Integration into a Compliance Management Solution Case Study
Robert Polansky; Senior Technologist, RSA, The Security Division of EMC

Virtual Environment Evaluation
Rade Radosevich, CISM, Principal, Technology Security, AT&T Services, Inc.

Enterprise Security Controls: Integrating and Enhancing Existing Security Controls for a Cloud Environment
Joe Knape, Principal, Technology Security, AT&T Services, Inc.

Using a CPA’s SOC to Address Tenants’ Needs to Understand Internal Control of a Cloud Provider
Chris K. Halterman, Executive Director, Advisory Services, Ernst & Young LLP

Microsoft’s Cloud Infrastructure Compliance Framework
Mark Estberg, Senior Director of Information Security Risk and Compliance Management, Microsoft Global Foundation Services

PANEL DISCUSSION: A Global View of Cloud Computing Security
Moderator: Jim Reavis, Executive Director, CSA

About MISTI

Founded in 1978, MIS Training Institute is the international leader in audit and information security training, with offices in the USA, UK, and Asia. MIS’ expertise draws on experience gained in training more than 200,000 delegates across five continents.

Helping audit and infosecurity professionals stay at the top of their game has always been at the core of MIS’ mission. To that end, MIS has developed and focused its seminars, conferences, and symposia on the wide-ranging needs of internal and IT auditors and information security practitioners who are charged with controlling complex systems and business environments. MIS’ unparalleled course curriculum covers the most up-to-the-minute topics, provides proven audit and security practices, and delivers the information needed to be successful in today’s organizations.

All MIS programs are led by industry experts…hands-on pros who have been in the field and who practice what they teach. Attendees of MIS Training Institute events benefit from unbiased practices, proven strategies, and lessons learned in the real-world.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Recent

Technologies That Work Nicely With The Cloud

Technologies That Work Nicely With The Cloud

New Technologies And The Cloud Asides from all the security concerns that has been in the news over the past while, there are still some very exciting and ambitious opportunities available for those who stick it out. Lets take a look at some of the more exciting emerging technologies that can be used in conjunction…

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Popular Archives

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

Top 10 Myths Of Cloud Computing

Top 10 Myths Of Cloud Computing

Myths Of Cloud Computing Myth 1: You still don’t know what the cloud is Yes, you do, most likely. Some of the cloud technologies that the majority of businesses have used at some stage include Dropbox, Office 365 and Facebook and LinkedIn. And if you have had experience of using these systems and their storage…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising