Thursday, March 26
7:45 AM – 8:45 AM Continental Breakfast
8:45 AM – 9:00 AM Opening Remarks from the Chair
Pete Lindstrom, Research Director, IDC
9:00 AM – 10:00 AM Lessons Learned from Implementing Cloud-Based
Web Access Protection
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
•What drove our need to look at cloud based secure web gateways
•What benefits are cloud based secure web gateways providing their Customers
•What to consider when looking at cloud based protections for web access
•How to leverage cloud based protections when integrating acquired companies
•Lessons learned from implementing a hybrid solution
10:00 AM – 11:00 AM Building Trusted Clouds
Steve Orrin, Chief Technologist, Intel Federal
•Evaluate the trust/security properties that can be provided by a CSP or in their Private Cloud
•How to use emerging cloud and virtualization technologies to provide workload policy controls and Data Protection
•Leverage trust based technologies and solutions in their cloud usage to help achieve compliance and policy requirements
•Audit and report on Cloud Trust and Security
•Better define policies for cloud based workloads and transactions
11:00 AM – 11: 15 AM Refreshment Break
11:15 AM – 12:30 PM Legal Developments in the Cloud
Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
•How regulations like HIPAA, Gramm-Leach-Bliley and the FTC are impacting and limiting service adoption
•How tools like encryption and other offerings are helping companies manage compliance and enterprise risk
•Practical concerns to deploying enterprise-wide solutions where users or data subjects may reside in the EU or other heavily regulated countries
•How to develop an enterprise-specific checklist to address legal and business risks during the cloud contracting process
12:30 PM – 1:30 PM Networking Luncheon
1:30 PM – 2:30 PM Your Cloud Security Gateway - Visibility and Control for Cloud Architectures
Pete Lindstrom, Research Director, IDC
This session will describe the new product category that aims to provide:
•Policy enforcement
•Activity monitoring
•Content monitoring (dlp)
•And encryption to enterprise cloud apps
2:30 PM – 2:45 PM Refreshment Break
2:45 PM – 3:45 PM How Secure is the Cloud?
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources
•Learn the top 4 things everyone needs to know about the cloud before jumping in
•Learn why the current cloud environment is a tumultuous storm waiting to happen
•Find out why the big companies are slow to adopt the cloud
•3 things to consider before you find yourself in the cloud of regulatory hell
•Learn what future technologies will have a major impact on cloud security, and why the cloud will become the safest storage platform in history
3:45 PM – 5:00 PM Panel Discussion
Moderator: Pete Lindstrom, Principal, VP of Research, Spire Security, LLC
Panelists: Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
Steve Orrin, Senior Security Architect and Principal Engineer, Intel Corporation
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources
5:00 PM – 6:00 PM Cocktail Reception