REGISTER

email 14 48

ca

Presenter: Tim Dunn, Vice President of Strategy, CA Technologies Security Europe

Traditional Identity and Access Management (IAM) platforms were built with one primary scenario in mind, to run on an enterprise's premises for their tightly scoped user community. The business and technology world has moved on, businesses want to be more innovative and agile. Gaining a competitive edge means exploiting technologies such as cloud, virtualisation, worker mobility enablement, personal device adoption, and business collaboration tools. IAM has become pivotal in enabling business innovation.

Intel

Presenter: Iddo Kadim, Director of Data Center Virtualization Technologies, Intel

Security is a key concern in cloud today. Security solutions are often sold on the basis of fear—how to stop malicious hackers. And there is value in this, for the threats are often real. But in today's competitive world, one must also focus on how technology allows growth and innovation while also meeting security requirements. Attendees will learn how Intel is enhancing platforms with new security capabilities and enabling a broad ecosystem of solutions that allow companies to embrace virtualization and cloud without compromising security, thus gaining more efficiency, control and functional compliance.

Amazon

Presenter: Dean Ocampo, CISSP, Dir. of Product Marketing &  Tom Stickle, Sr. Solution Architect, Amazon Web Services

Organizations who have locked down PCI in the traditional Data Center are now struggling with how to transform to a cloud-oriented world with their compliance-impacted data intact. Plainly put, PCI compliance is enabled through a combination of certified infrastructures, and protection and control of PAN data – and the same principles apply whether you're in the Data Center and in the Cloud. In this webcast, we'll show you what you need to know about PCI in the Cloud – selecting the right infrastructure, understanding audit scope, and a checklist for enforcing and enabling controls that will ensure critical protection and compliance of your data no matter where it goes.

Audit Considerations

Presenter: Jason Wood, Assistant Professor, Jack Welch,  President of WoodCPA Plus P.C.

The presentation will discuss audit considerations in a cloud computing environment. Technology professionals can learn what to expect from their auditors, and auditors can learn what areas to review in a cloud environment.

Intel

Presenter: Alan Priestly, Director, Cloud Marketing EMEA, Intel

Today, cloud access security requires more than a simplistic secure VPN tunnel or single sign on from tightly controlled corporate applications. Users are demanding access to the cloud from a wider range of clients and directly on the cloud platform itself. From a compliance standpoint it is a growing nightmare involving orphaned accounts, infected clients, and un-auditable silos of user activity data left outside enterprise control. In this session, Intel showcases key technologies that are being used in the market today to build a trusted client to cloud connection.

PayPal

When: Sept 09 2010

Presenting: Eve Maler, PayPal, Identity Evangelist

Digital identities started to "move into the cloud" in the last decade, delivering on use cases such as cross-domain single sign-on and attribute-based authorization. With the rise of consumer identity providers and cloud-based software development, we face new opportunities and threats.

Forrester

When: Sept 09 2010

Presenting: Jonathan Penn; Forrester Research, Vice President

Underpinned by both technology and economic disruptions, cloud computing is a sustainable, long-term IT paradigm that will fundamentally change the way business customers and individual users engage with technology providers. At the moment, most customers are confused by the overused "cloud" term and are concerned over the risks of cloud computing.

SonicWALL

When: Sept 09 2010

Presenting: Patrick Sweeney; SonicWALL, VP of Product Management

The ease-of-use, high scalability and low maintenance of cloud computing are just some of the benefits that are driving adoption of this new trend within the enterprise. Gartner confirms this in a recent report* that revealed that cloud computing rates as the second highest technology priority in 2010, behind only virtualization.

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top