Five Steps to Securing Cloud Servers

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Many organizations are facing a Catch-22 when it comes to migrating applications to the cloud. They get the biggest ROI by migrating business-critical apps that need to scale rapidly and on-demand. But these are precisely the applications that need the tightest security controls. Executive management is pressing for progress on cost savings, but sorting through the variety of security issues unique to cloud environments can be dauntingly complex.

The solution is to break the process of securing cloud servers into a set of well defined, achievable steps that enable IT organizations to securely extend their existing enterprise infrastructure out into their cloud environment.

In this free webinar, Ryan Holland of the Cloud Security Alliance (CSA) will initially discuss the key requirements for securing cloud systems. David McNeely, senior director of product management at Centrify, will then present a five-step process, using Amazon EC2 as an example, for automating provisioning of security policies, centralizing account and privilege management, hardening network access, auditing systems, and implementing enterprise-centric single sign-on. Uri Budnik, ISV Program Director at RightScale, will describe how RightScale’s ServerTemplate and RightScripts can be used to achieve the automated provisioning and system lockdown.


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Uri Budnik

Uri Budnik ISV Program Director, RightScale

    Ryan Holland

    Ryan Holland, Cloud Security Alliance

      David McNeely

      David McNeely Director of Product Management, Centrify Corporati