sponsored by SearchSecurity.com
Posted:  03 Apr 2013
Premiered:  01 Apr 2013
Format:  Multimedia
Type:  Virtual Environment
Language:  English

Your organization wants to exploit the flexibility and cost-saving associated with cloud computing, and your job is to secure the applications and data the will be leaving your network to a cloud provider’s infrastructure. Your traditional IT security investments won’t always be the most effective security solution for your needs. This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.    


Joseph Granneman

Joseph Granneman has over 20 years of technology experience in both health care and financial services.  He holds multiple vendor certifications, a CISSP, and a Masters in Business Administration from Northern Illinois University.  He is often consulted for opinions in the information security fields and has written articles for Information Security Magazine, CSO and CIO magazine, SC magazine, and Advance for Health Information Executives. 

Cloud Computing | Cloud Security | Firewall Management | Identity Management | Intrusion Detection | Intrusion Prevention | Managed Security Services | Risk Management | Security | Security Management | Security Managers | Security Systems | Security Threats | Software as a Service

View All Resources sponsored by SearchSecurity.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement