Thursday, March 26
7:45 AM – 8:45 AM Continental Breakfast
8:45 AM – 9:00 AM Opening Remarks from the Chair
Pete Lindstrom, Research Director, IDC
9:00 AM – 10:00 AM Lessons Learned from Implementing Cloud-Based
Web Access Protection
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
•
What drove our need to look at cloud based secure web gateways
•
What benefits are cloud based secure web gateways providing their Customers
•
What to consider when looking at cloud based protections for web access
•
How to leverage cloud based protections when integrating acquired companies
•
Lessons learned from implementing a hybrid solution
10:00 AM – 11:00 AM Building Trusted Clouds
Steve Orrin, Chief Technologist, Intel Federal
•
Evaluate the trust/security properties that can be provided by a CSP or in their Private Cloud
•
How to use emerging cloud and virtualization technologies to provide workload policy controls and Data Protection
•
Leverage trust based technologies and solutions in their cloud usage to help achieve compliance and policy requirements
•
Audit and report on Cloud Trust and Security
•
Better define policies for cloud based workloads and transactions
11:00 AM – 11: 15 AM Refreshment Break
11:15 AM – 12:30 PM Legal Developments in the Cloud
Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
•
How regulations like HIPAA, Gramm-Leach-Bliley and the FTC are impacting and limiting service adoption
•
How tools like encryption and other offerings are helping companies manage compliance and enterprise risk
•
Practical concerns to deploying enterprise-wide solutions where users or data subjects may reside in the EU or other heavily regulated countries
•
How to develop an enterprise-specific checklist to address legal and business risks during the cloud contracting process
12:30 PM – 1:30 PM Networking Luncheon
1:30 PM – 2:30 PM Your Cloud Security Gateway - Visibility and Control for Cloud Architectures
Pete Lindstrom, Research Director, IDC
This session will describe the new product category that aims to provide:
•
Policy enforcement
•
Activity monitoring
•
Content monitoring (dlp)
•
And encryption to enterprise cloud apps
2:30 PM – 2:45 PM Refreshment Break
2:45 PM – 3:45 PM How Secure is the Cloud?
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources
•
Learn the top 4 things everyone needs to know about the cloud before jumping in
•
Learn why the current cloud environment is a tumultuous storm waiting to happen
•
Find out why the big companies are slow to adopt the cloud
•
3 things to consider before you find yourself in the cloud of regulatory hell
•
Learn what future technologies will have a major impact on cloud security, and why the cloud will become the safest storage platform in history
3:45 PM – 5:00 PM Panel Discussion
Moderator: Pete Lindstrom, Principal, VP of Research, Spire Security, LLC
Panelists: Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
Steve Orrin, Senior Security Architect and Principal Engineer, Intel Corporation
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources
5:00 PM – 6:00 PM Cocktail Reception