Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Developing effective end-to-end security in the cloud

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Everyone talks about the economic imperative of cloud computing, but the issue of security in the brave new cloud-enabled world is the biggest inhibitor to the adoption of the public cloud model.

The security – and governance risk and compliance concerns – need to be addressed early in the strategic planning phase of cloud computing initiatives.

If they are not, then organisations stand a good chance of wiping out the cost benefits by having to build costly private cloud alternatives to public cloud offerings or by having to secure insecure platforms later in the project lifecycle.

Join us for an entertaining and informative webinar in which we'll explain how to develop a strategy for creating and maintaining a secure cloud environment from the outset.

Along the way, you'll learn about...

  • How measuring and auditing security on a Software-as-a-Service platform can help lay the foundations of an effective cloud computing best practice and compliance strategy.
  • Why understanding the audit process in a cloud environment can be so helpful when developing a long-term cloud security model
  • The reasons why public cloud providers are reluctant to allow customers wide and deep access to their facilities, processes and people, to enable thorough audits - and how to counter this problem.

This webinar is for:

  • IT professionals wanting to enter the new decade with a deeper understanding of cloud security issues
  • IT managers looking to get a better ROI from their cloud security resources
  • Business managers who want to develop an effective strategy to meet the compliance and security needs of a cloud computing platform
  • Consultants looking for concise and effective information on what promises to be a key security topic for 2011
     

  CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

Speakers

Steve Gold

Steve Gold, Infosecurity Magazine

    Fran Howarth

    Snr Analyst, Security, Bloor Research

      Richard Walters

      Richard Walters GM/VP, Identity and Access Management, Intermedia