Developing effective end-to-end security in the cloud

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Everyone talks about the economic imperative of cloud computing, but the issue of security in the brave new cloud-enabled world is the biggest inhibitor to the adoption of the public cloud model.

The security – and governance risk and compliance concerns – need to be addressed early in the strategic planning phase of cloud computing initiatives.

If they are not, then organisations stand a good chance of wiping out the cost benefits by having to build costly private cloud alternatives to public cloud offerings or by having to secure insecure platforms later in the project lifecycle.

Join us for an entertaining and informative webinar in which we'll explain how to develop a strategy for creating and maintaining a secure cloud environment from the outset.

Along the way, you'll learn about...

  • How measuring and auditing security on a Software-as-a-Service platform can help lay the foundations of an effective cloud computing best practice and compliance strategy.
  • Why understanding the audit process in a cloud environment can be so helpful when developing a long-term cloud security model
  • The reasons why public cloud providers are reluctant to allow customers wide and deep access to their facilities, processes and people, to enable thorough audits - and how to counter this problem.

This webinar is for:

  • IT professionals wanting to enter the new decade with a deeper understanding of cloud security issues
  • IT managers looking to get a better ROI from their cloud security resources
  • Business managers who want to develop an effective strategy to meet the compliance and security needs of a cloud computing platform
  • Consultants looking for concise and effective information on what promises to be a key security topic for 2011

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.


Steve Gold

Steve Gold, Infosecurity Magazine

    Fran Howarth

    Snr Analyst, Security, Bloor Research

      Richard Walters

      CTO of CensorNet