Security and Cloud Computing: Can They Really Co-Exist?

Download Security and Cloud Computing: Can They Really Co-Exist?

Post on 30-Oct-2014

667 views

Category:

Business

0 download

Embed Size (px)

DESCRIPTION

Respected thought leaders on the topic of cloud computing come together to debate the realities of securing the cloud-computing platform. This panel of experts and IT executives discuss how businesses can truly achieve a level of security that will satisfy the skeptics in the organization and also protect sensitive corporate, customer and business partner data in a distributed environment. They also discuss their own success building cloud computing environments in this live Smart Enterprise Exchange Web Cast.Brian Gillooly, Editor-in-Chief, Events, Smart Enterprise Exchange and InformationWeek leads this forward-looking panel of industry experts who offer real-world insights and practices.

TRANSCRIPT

<p> 1. Security and Cloud Computing: Can They Truly Co-Exist? An Online Videocast brought to you by Smart Enterprise , CA Technologies and UBM Techweb 2. Featured Speakers Elizabeth Butwin Mann Chief Information Security Officer, Mycroft Inc. Joseph Puglisi Executive Council, Cloud Computing Consortium, former Vice President and CIO, EMCOR Group Lina Liberti Vice President, Security Management, CA Technologies Brian Gillooly Editor-in-Chief, Events, Smart Enterprise Exchange and InformationWeek 3. Videocast Logistics Follow us on Twitter @SmartEnterprise using the liveTwitter feed widget. 4. Smart Enterprise Exchange Members &amp; industry experts share best practices and insights on topics that are important for IT executives. Groups provide an ongoing forum to continue the discussion following live events and meetings. Become a member at: join-see.com 5. Security and Cloud Computing: Can They Truly Co-Exist? May 10, 2011 6. Primary Concerns 7. Growth in Use of Cloud 8. Cloud Computing Solves Problems 9. Featured Speakers Elizabeth Butwin Mann Chief Information Security Officer, Mycroft Inc. Joseph Puglisi Executive Council, Cloud Computing Consortium, former Vice President and CIO, EMCOR Group Lina Liberti Vice President, Security Management, CA Technologies Brian Gillooly Editor-in-Chief, Events, Smart Enterprise Exchange and InformationWeek 10. Polling Question 1 Who is most responsible for ensuring the security of cloud providers? Cloud User Cloud Provider Shared Responsibility 11. Ponemon Institute and CA Technologies Study * Security of Cloud Computing Providers April, 2011 12. Featured Speakers Elizabeth Butwin Mann Chief Information Security Officer, Mycroft Inc. Joseph Puglisi Executive Council, Cloud Computing Consortium, former Vice President and CIO, EMCOR Group Lina Liberti Vice President, Security Management, CA Technologies Brian Gillooly Editor-in-Chief, Events, Smart Enterprise Exchange and InformationWeek 13. Polling Question 2 What types of information are too risky for the cloud? Non-financial Business Information Credit Card Information Employee records Intellectual properties Financial Information 14. Ponemon Institute and CA Technologies Study * Security of Cloud Computing Providers April, 2011 15. Featured Speakers Elizabeth Butwin Mann Chief Information Security Officer, Mycroft Inc. Joseph Puglisi Executive Council, Cloud Computing Consortium, former Vice President and CIO, EMCOR Group Lina Liberti Vice President, Security Management, CA Technologies Brian Gillooly Editor-in-Chief, Events, Smart Enterprise Exchange and InformationWeek 16. Questions &amp; Answers Please Submit Your Questions Now 17. Smart Enterprise Exchange Members &amp; industry experts share best practices and insights on topics that are important for IT executives. Groups provide an ongoing forum to continue the discussion following live events and meetings. Become a member at: join-see.com </p>

Recommended

View more >