6th annual Cloud Slam 2014 Cloud Computing Conference, San Francisco CA, June 4, 2014. Cloud Computing Events 2014 - Compliance http://cloudslam.org/taxonomy/term/229 en Panel: Cloud Security and Compliance for the Enterprise http://cloudslam.org/cloudcomputingconference/panel-cloud-security-and-compliance-enterprise <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>There is still much speculation around the security and privacy implications of applications in the cloud. With speculation comes fear, and with fear come misinformation and myths. This panel session will address many of these myths and uncertainties about apps in the cloud. It will provide guidance for how businesses can evaluate cloud vendors from a security and privacy perspective, and will offer a glimpse into best practices to protects the data and the privacy of your users.<br /> Core topics to be addressed:<br /> - Centralized cloud governance model;<br /> - Achieving service availability with higher security at a lower cost level;<br /> - How security is built-in in cloud services;<br /> - Enabling data integrity, privacy and security for integrations;<br /> - Adopting cloud standards<br /> - Security and protection of IP and sensitive data in the cloud;<br /> - Enforcing data constraints on residency and privacy;<br /> - Making data available in reliable and secure way;<br /> - Getting high performance, while preserving security<br /> - Using big data to mitigate advanced persistent threats;<br /> - Solutions for cross firewall collaboration.</p> <h2 class="pane-title">Speakers:</h2> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/Jacob-West.png" width="172" height="234" alt="" /></div> <p><b>Jacob West</b> is chief technology officer for Enterprise Security Products (ESP) at HP. In this role, West helps to architect the security roadmap for the ESP portfolio and leads HP Security Research (HPSR), which drives innovation with research publications, threat briefings, and actionable security intelligence.<br /> Prior to this role, West served as chief technology officer for Fortify products and leader of Software Security Research within HP ESP. West has spent more than a decade developing, delivering, and monetizing innovative security solutions, beginning with static analysis research at the University of California, Berkeley and as an early security researcher at Fortify prior to its acquisition by HP.<br /> A world-recognized expert on software security, West co-authored the book, “Secure Programming with Static Analysis” with colleague and Fortify founder, Brian Chess, in 2007. Today, the book remains the only comprehensive guide to how developers can use static analysis to avoid the most prevalent and dangerous vulnerabilities in code.<br /> West is co-author of the Building Security in Maturity Model and is a frequent speaker at industry events, including RSA Conference, Black Hat, Defcon and OWASP. A graduate of the University of California, Berkeley, West holds dual-degrees in Computer Science and French and resides in San Francisco, California.</p> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/eran-feigenbaum-headshot.png" width="172" height="215" alt="" /></div> <p><b>Eran Feigenbaum</b>, Director of Security, Google Apps<br /> As Director of Security for Google Enterprise, Eran defines and implements security strategy for Google Apps. Prior to joining Google in 2007, </p> <p>Eran was the U.S. Chief Information Security Officer for PricewaterhouseCoopers (PwC). </p> <p>Earlier, Eran spent several years designing and implementing high-performance cryptosystems for electronic commerce solutions for Fortune 1000 clients and government agencies. </p> <p>He holds a bachelor’s degree in electrical and computer engineering from the University of California at Irvine, and an MBA from Pepperdine University. </p> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/erictan2.png" width="172" height="116" alt="" /></div> <p><b>Eric Tan</b>, PwC Director, Assurance Technology Center of Excellence, Silicon Valley Eric is an assurance director based out of PwC's Silicon Valley Technology Center of Excellence. He has significant experience successfully helping technology compliance organizations manage risk and compliance over their technology projects and information governance, risk and compliance solutions. Eric is a lead director within PwC's Cloud Assurance practice. His responsibilities includes assisting companies with compliance, security and privacy issues related to cloud services and performing attestation services to cloud service providers. He is a key contributor to the firm's strategy, point of view and thought leadership on cloud computing. Eric's experience includes developing IT strategic plans, leading large-scale system implementation assessments, performing risk and security diagnostics; and implementation of compliance and control solutions. His experience specific to cloud computing includes developing internal controls for a cloud ERP company, leading a Salesforce.com CRM assessment, conducting cloud vendor assessments and helping a financial services firm determine their Infrastructure as a Service (IaaS ) strategy. Google, eBay, LinkedIn, Tibco, Akamai, Novell, Genzyme, Biogen, Thermo Fisher Scientific are among the many clients he has served. He is a regular speaker at ISACA events and served as a keynote speaker and panelist on various conferences including the recent He is a regular keynote speaker and panelist at topical events and conferences, including the recent 2013 Global Institute of Internal Audit Conference, 2012 Edison Electric Institute Conference, Cloud Connect 2011 and UP 2011 Cloud Computing Conference in Silicon Valley.</p> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/DavidLinthicum.png" width="172" height="137" alt="" /></div> <p><b>David Linthicum</b>, Research Analyst, Gigaom Research<br /> David (Dave) S. Linthicum is an internationally recognized industry expert and thought leader, and the author and coauthor of 13 books on computing, including the best-selling “Enterprise Application Integration” (Addison Wesley). Dave keynotes at many leading technology conferences on cloud computing, SOA, Enterprise Application Integration, and enterprise architecture, and has appeared on a number of TV and radio shows as a computing expert. Dave’s latest book is “Cloud Computing and SOA Convergence in Your Enterprise, a Step-by-Step Approach.”Dave is an internationally recognized industry expert and thought leader, and the author and coauthor of 13 books on computing, including the best-selling “Enterprise Application Integration” (Addison Wesley). Dave keynotes at many leading technology conferences on cloud computing, SOA, Enterprise Application Integration, and enterprise architecture, and has appeared on a number of TV and radio shows as a computing expert. Dave’s latest book is “Cloud Computing and SOA Convergence in Your Enterprise, a Step-by-Step Approach.” </p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/4" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud</a></div><div class="field-item odd"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item even"><a href="/taxonomy/term/229" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Compliance</a></div><div class="field-item odd"><a href="/tags/enterprise-cloud" typeof="skos:Concept" property="rdfs:label skos:prefLabel">enterprise cloud</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">(Moderator) Eric</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Tan</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">Director </div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">PwC LLP</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">*</div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">*</div></div></div><div class="field field-name-field-room field-type-list-text field-label-hidden"><div class="field-items"><div class="field-item even">Emerald Ballroom</div></div></div><div class="field field-name-field-timeslot field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2014-06-04T13:50:00-07:00">Wednesday, June 4, 2014 - 13:50</span></div></div></div> Wed, 21 May 2014 23:18:29 +0000 815 at http://cloudslam.org What cloud is your data in? http://cloudslam.org/cloudcomputingconference/what-cloud-your-data <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>New global research conducted in January 2013 measured where end users are seeing challenges with IT, the usability of solutions, and security. Results show more than half of 674 respondents are compelled by slow or overly restrictive IT, or solutions or security that lack usability, to use workarounds either every day or sometimes. Such workarounds are out of compliance with policy and bring additional privacy and security risk. Many types of workarounds, such as apps on personal devices, texting, or social media, drive sensitive data into clouds other than those where the sensitive data is supposed to be. This in turn can drive confidentiality, integrity and trans-border data flow risks. Join this session to hear about this research, how end user behavior with personal, corporate or thin client mobile devices can drive sensitive data into other clouds and add risk. Explore practical strategies and best practices to effectively mitigate these risks and secure data in the collective cloud.</p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/tags/healthcare-it" typeof="skos:Concept" property="rdfs:label skos:prefLabel">healthcare it</a></div><div class="field-item odd"><a href="/taxonomy/term/4" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud</a></div><div class="field-item even"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item odd"><a href="/taxonomy/term/229" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Compliance</a></div><div class="field-item even"><a href="/tags/hipaa" typeof="skos:Concept" property="rdfs:label skos:prefLabel">HIPAA</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">David</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Houlding</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">Healthcare Privacy &amp; Security Lead</div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">Intel Healthcare IT</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">David Houlding is the Healthcare Privacy &amp; Security Lead at Intel, with more than 20 years of experience in healthcare, enterprise architecture and privacy &amp; security. David is responsible for tracking healthcare trends, privacy &amp; security risks they drive, and best practices for managing risks globally. As the former Lead Architect for the Intel Health Guide System, and prior to that the Chief Architect of Perot Systems Healthcare Payer Systems, David has extensive experience in healthcare (provider and payer) and privacy &amp; security. With several patents granted by the USPTO, David has a proven track record for innovation. David is a CISSP (Certified Information Systems Security Professional), a CIPP (Certified Information Privacy Professional), and has a Master of Applied Science in Data Compression and Digital Signal Processing from Simon Fraser University, British Columbia, Canada. David has presented keynotes and sessions, and participated in panel discussions at numerous major industry conferences including HIMSS, mHealth Summit, Strata Rx, HealthTech NextGeneration, InfoSec, NIST HIPAA Security Conference, iHT2 Health IT Summit, NIST Security Automation Conference, Enterprise Architecture Practitioners Conferences, Innovation Insights, and several other conferences. He has published and contributed to numerous articles in major trade journals including Healthcare Technology Online and Dr. Dobb’s Journal. David has also made contributions to book publications including XML Unleashed, and has been interviewed for newspaper and other articles.</div></div></div><div class="field field-name-field-company-logo field-type-image field-label-above"><div class="field-label">Speaker&#039;s Company Logo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_70/public/intel_4c_180x136.png?itok=_-tn8j13" width="72" height="72" alt="" /></div></div></div><div class="field field-name-field-headshot field-type-image field-label-above"><div class="field-label">Speaker&#039;s Headshot Photo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_180/public/P1%20-%2010%20percent.jpg?itok=vNRVjfLd" width="172" height="172" alt="" /></div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">n/a</div></div></div><div class="field field-name-field-room field-type-list-text field-label-hidden"><div class="field-items"><div class="field-item even">Oregon Room</div></div></div><div class="field field-name-field-timeslot field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2013-06-18T10:10:00-07:00">Tuesday, June 18, 2013 - 10:10</span></div></div></div> Tue, 09 Apr 2013 15:56:16 +0000 admin 511 at http://cloudslam.org Fast Tracking Your Cloud Risk Strategy http://cloudslam.org/cloudcomputingconference/fast-tracking-your-cloud-risk-strategy <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Will your Cloud fail the next audit? Do you have a handle on your risk strategy for the Cloud? Is this level of maturity only suited for Enterprises with large budgets? Can smaller organizations effectively manage risk as they consume Cloud services? They can!<br /> Asset Classification, Questionnaires, and Risk Assessment; these tools are essential to manage Cloud Computing related risk. This session will outline how to build a scalable Cloud risk strategy based on ISO 27001, CSA Guidance and 3rd party attestations. This talk will set the tone and enable delegates to come home and fast track a Cloud Risk Strategy in their environment. </p> <p>Cloud Security is only valuable if you have a robust process to identify risk. Managing risk for consuming Cloud is often overlooked. Many organizations feel that only the largest Enterprises can afford to understand and assess the potential or future risks. Instead of security, they focus on the perceived outcome of utilizing the Cloud, the supposed silver lining and use cases. </p> <p>In this session, we will describe how to fast track a Cloud Risk Strategy. We will discuss how MARS built an effective toolkit based on trusted industry tools: ISO 27001, Cloud Security Alliance Guidance, and 3rd party attestations.</p> <p>We will bring to true-to-life examples and case studies how this was done at a $34B enterprise and can scale to your environment. We will explain how CSA and ISO 27001 set the tone for our Cloud risk assessment strategy. We will rationalize how these were complemented by external attestations such as SOC1/2/3, penetration, vulnerability tests. We will expand on area of concerns for organizations of all sizes: SMB to Enterprise.</p> <p>We will discuss how one gets started by providing a checklist driven roadmap to fast-track a Cloud risk strategy. We will start with identifying assets and their overall value to your organization. We will jump into the deep-end on asset classification and explore the particular importance of understanding implementation models and mapping out your data-flow. We will identify how this feeds into a holistic questionnaire that will poke holes through vendor Cloud Security practices. We will educate our delegates on how to ask vendors difficult questions and elicit responses from vendors who don&#039;t want to divulge information.</p> <p>We will illustrate how to paint risk to the c-suite in an effective and compelling format. We will highlight practical recommendations for contractual negotiations, privacy, liability, exit-clauses and overall governance strategies to keep the sun shining through our Clouds. </p> <p>In summary, building a Cloud risk strategy isn’t just suited for the largest Enterprises. By leveraging a pragmatic and scalable framework built on industry standards, we have defined best practices and lessons learned that organizations can leverage to effectively manage risk in their Cloud journey.</p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/4" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud</a></div><div class="field-item odd"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item even"><a href="/taxonomy/term/432" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Risk</a></div><div class="field-item odd"><a href="/taxonomy/term/119" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Strategy</a></div><div class="field-item even"><a href="/taxonomy/term/229" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Compliance</a></div><div class="field-item odd"><a href="/tags/assessment" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Assessment</a></div><div class="field-item even"><a href="/taxonomy/term/150" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Governance</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">Nikita</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Reva</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">Senior Engineer, Global Information Security Engineering</div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">MARS Inc.</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">Nikita Reva brings over 8 years of experience in Network and Information Security. Currently he works for MARS Inc., a Consumer Packed Goods leader with a portfolio of Global Billion dollar brands like Snickers, M&amp;Ms, Pedigree Pet Food and Wrigley Gum. In his current role as Senior Engineer, Global Information Security Engineering, Nikita manages Global Information Security projects involving engineering technical security solutions to manage risk. Prior to MARS, Nikita focused on Auditing Information Security for Credit Unions and Banks. Nikita holds a Masters in Information Security from DePaul University and leading security certifications. Nikita is also an active board member of Cloud Security Alliance Chicago, ISACA Chicago and co-founded a monthly forum for Chicago’s Security professionals. Nikita has spoken at security conferences around the world.</div></div></div><div class="field field-name-field-company-logo field-type-image field-label-above"><div class="field-label">Speaker&#039;s Company Logo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_70/public/MARS%20.jpg?itok=Qff9oKKe" width="72" height="72" alt="" /></div></div></div><div class="field field-name-field-headshot field-type-image field-label-above"><div class="field-label">Speaker&#039;s Headshot Photo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_180/public/nikita_sq.per_.jpg?itok=Y4GtKjcl" width="172" height="172" alt="" /></div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">5445 North Sheridan Chicago, IL 60640</div></div></div><div class="field field-name-field-room field-type-list-text field-label-hidden"><div class="field-items"><div class="field-item even">Nevada Room</div></div></div><div class="field field-name-field-timeslot field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2013-06-18T15:05:00-07:00">Tuesday, June 18, 2013 - 15:05</span></div></div></div> Tue, 02 Apr 2013 21:38:40 +0000 revan 426 at http://cloudslam.org