This resource is no longer available
Cloud Security and Risk Management: Back to Basics
Why do we need to get back to basics? Much time and effort is spent worrying about how to secure the cloud, when, realistically speaking, the security of the cloud is still uncertain. Security is the number one reason why many companies continue to avoid the cloud, but anecdotally and statistically speaking, the cloud is not any greater of a threat than enterprise networks. In fact, they may be more safe.
That said, the approach to cloud security should be founded using the same basic principles that are used by CISOs across the globe: A risk-based approach; layered security; flexibility across many platforms, and with redundancies built in. This virtual conference will take a fresh look at cloud security from these perspectives.
Join us on December 4TH from 7:45 AM to 3:30 PM ET (UTC–4) to:
-- Connect with thousands of your peers from across the globe
-- Have the potential to earn up to 4 CPEs without the cost of travel
-- Ask questions directly to industry experts and speakers
-- Enhance your professional knowledge
SpeakersEric Holmquist Managing Director, Enterprise Risk Management, Accume Partners
Eric has 30 years of experience in the financial service industry having worked in operations, finance, treasury, lending and risk management. He has successfully developed programs for risk and information management both as a practitioner and advisor for clients of all sizes.Jason Novak Senior Manager, Enterprise Risk Management, Accume Partners
Jason has more than 11 years’ experience in IT, including infrastructure and security management, the information systems audit process, protection of information assets, IT service delivery and support, business continuity and disaster recovery. Jason holds the following industry certifications: CRISC, CISSP, CISA, CISM, Certified Ethical Hacker (CEH), Microsoft Certified Systems Engineer (MCSE) and a VMWare Certified Professional (VCP).Char Sample Security Engineer, Carnegie Mellon CERT
Char Sample, CERT security solutions engineer, has close to 20 years of experience in Internet security, and she has been involved with integrating various security technologies in both the public and private sectors. She is presently a doctoral candidate at Capitol College, where her dissertation topic deals with the use of soft markers in attack attribution.Davi Ottenheimer Senior Information Security Professional, President, flyingpenguin
Davi Ottenheimer has more than 17 years of experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is an expert in compliance, a qualified PCI DSS and PA-DSS assessor with K3DES, and former Board Member for the Payment Card Industry Security Alliance and the Silicon Valley chapters of ISACA and OWASP.Benjamin Woo Founder and managing director, Neuralytix Inc.
Benjamin S. Woo is founder and managing director at Neuralytix Inc., a consultancy based in New York, N.Y. He was previously the program vice president at IDC's Worldwide Storage Systems Research.Geoff Webb Director, Solution Strategy, NetIQ
Geoff Webb has over 20 years of experience in the tech industry and is Director, Solution Strategy at NetIQ. He is responsible for the Information Security, Identity and Access and IT Operations Management solutions.
Prior to joining NetIQ, Geoff led marketing initiatives at Credant Technologies around data protection and encryption management.
Webb often provides commentary on security and compliance trends, and has written on related topics for USA Today, CIO Update, Compliance Authority, Dark Reading, among others.