Cloud and Virtualization SIG: Securing Your Cloud - The Most Common Vulnerabilities



  • Topic: "Securing Your Cloud - The Most Common Vulnerabilities"

    Since its inception, cloud migration and security have been the biggest inhibitors to enterprise-class Cloud Computing adoption. For most companies, the know-how is acheivable through IT & product training. But cloud security is different because the attack vectors are always changing and you can never say 'done'. But you can limit your risk through best practices.
    This month we invite two experts to share their suggestions for Cloud Security Best Practices.
    Presentation #1: "Identity is the New Security Perimeter" by Pamela Dingle of Ping Identity (Pam's Blog)
    In a world where every function of an organization operates in a different corner of the cloud, how can any organization retain control?  There is only one common factor in all of the activities that are relevant:  the user.         Protection of user authentication to cloud resources gives organizations a single critical point of leverage, a place to gain visibility into user interactions with the cloud, a place to apply consistent policy in a distributed system, and most importantly, a chance to control critical business events such as termination of employees, reducing risk to the organization.
    Presentation #2: TBD



    6:30 - 7:00 p.m. Registration / Networking / Refreshments / Pizza
    7:00 - 8:20 p.m. Presentations
    8:20 - 8:30 p.m. Discussion
    8:30 - 9:00 p.m. Wrap-up Discussions and Close