Cloud Security Virtual Conference
sponsored by SearchCIO.com and SearchSecurity.com

While in the early phases of cloud adoption IT departments had a certain shoulder-shrugging, Amazon's- security-is-probably-better-than-mine, let's-insist-on-a-tight-SLA approach to security, now that IT departments are reaching a higher degree of maturity in their cloud adoption, security is ripe for re-examination.

Whatever your organization may be doing in the cloud, it needs to fit into the overall framework you are using to shape and monitor your organization's security efforts.

Join ISACA, SearchCompliance.com, SearchSecurity.com, and thousands of your peers online for this unique full-day examination of cloud security as it enters its latest phase, with expert insight into strategy, policy and pragmatics. We'll move beyond phase one and gear up for the projects you'll deploy in 2014.

Enter the convenient, online environment of this virtual event on December 4th for expert answers to questions like:

- What kinds of metrics can you use for cloud deployments?
- What about identity?
- What role does IAM take on as organizations split more and more critical business applications between premise and cloud
- What about data?

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from SearchCIO.com and SearchSecurity.com
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement