addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

Cloud Focus: Cloud Security Alliance, Seattle Chapter

Please join us at the next Chapter Meeting on Thursday June 27th 2013, from 6-8pm at the Mercer Island Community Center (MICC), for an evening of Networking, Presentations by Industry Leaders, and Pizza and Soda.
Featured Speakers:
Robert Block, Managing Director, Identity & Access Management, Fish Net discussing: “Cloud Computing: Managing the Hybrid Reality”

Gavin Hill, Director Product Marketing, Venafi, discussing: “Control over TRUST in the New World of Cloud and BYOD: It is possible!”

Additional Details:
Presentation #1 Title:
Control over TRUST in the New World of Cloud and BYOD: It is possible!

Short Abstract:
At an ever increasing pace, organizations are moving applications into the cloud to reduce IT costs. The BYOD movement has won, most enterprise IT groups have to support these devices, and have little to no control. The critical part of the equation is the control over TRUST—who has access to my data, where is my data, how is my data being consumed? So how do you gain control when you own nothing? The common approach to controlling trust is to encrypt the data and ensure all communication with applications is encrypted. The challenge, what happens when trust breaks down? Using current recommended encryption technologies will provide you with the assurance that your data is safe. However, all too often we see systems compromised from trust exploits that take advantage of the methodologies put in place to manage the trust assets—encryption keys and digital certificates.

Learning objectives:
• Learn about the shared responsibility when moving an application into the cloud
• Gain insight into the current trust exploits
• Find out some of the top threats and concerns that global 2000 organizations are facing today
• Learn what steps you need to take in order to gain control over trust

Speaker: Gavin Hill

Over the past decade, Gavin Hill has held a variety of product development and product management positions for IT security companies. In each of these positions, Hill has focused on identifying where enterprises are at risk and anticipating how bad actors might exploit these weaknesses—before they actually launch attacks. For example at Trend Micro, Hill identified that data stored on virtual machines in the cloud are at risk of exploitation. Under his direction, Trend Micro developed a product to encrypt data in the cloud while storing the encryption keys separate from the cloud provider.

Hill has focused on identifying exploits against cryptographic keys and digital certificates, the foundational technologies for maintaining trust in cloud solutions. Hill sees his largest contribution in addressing the real-world, human factors that leave companies vulnerable to well-known exploits. For example, SSH keys that use MD5 encryption are known risks, yet many companies lack the processes for identifying, removing and updating such keys. Recognizing that true security relies on best practices, Hill has joined with Venafi, the Gartner-recognized leader in enterprise key and certificate management (EKCM), to formulate such practices for key and certificate management. Currently, he helps companies to implement these practices and thereby control trust across complex, heterogeneous systems and into the cloud.
Presentation #2 Title:
Cloud Computing: Managing the hybrid reality

Customers for the foreseeable future find themselves managing the current state and the future state together (on-prem and cloud):
• Infrastructure - On-prem & Cloud
• Identity Management – On-prem & Cloud
• Access Control – On-Prem & Cloud

Managing both your traditional infrastructure as well as your increasing cloud presence represents changes to or challenges in the following areas:
o Risk Posture
o Technology Maturity
o Process & Data
o Policy & Privacy

This session will focus on discussing what this hybrid environment may look like for the foreseeable future and activities/strategies customers need to be aware of to make the best use of this hybrid state and minimize risk to information and brand.

Speaker: Robert Block, Managing Director, Identity & Access Management
As a senior Identity and Access Management (IAM) strategist with FishNet Security, Robert Block is responsible for helping define FishNet Security’s strategic vision, client strategy and assessments, infrastructure architecture, and market analysis. Considered a thought leader in IAM with a specialized focus on Access Governance and Identity Management, Robert interacts with leading industry analysts on the state of Identity Management and Governance on a regular basis.
Robert has over 17 years of results-oriented Information Technology experience - of which 13 years have been focused on Identity Management and Access Governance solutions - including strategic sales consulting, providing industry thought leadership, managing large teams, developing and executing IT strategies, and managing projects that drive value in support of an organizations business needs.
Robert has an in-depth understanding of various Information Security and IT challenges and requirements across multiple industries, and has worked with a diverse set of clients ranging from Global Fortune 500s to privately held small businesses.

Join or login to comment.

  • Mark A.

    conflict with OpenStack Meetup

    June 27, 2013

  • Henry P.


    June 27, 2013

  • xiaowu l.

    I'd like to participate this event

    June 26, 2013

  • Robert M.

    Starting to develop technologies for secure communications blind to OS or device

    June 21, 2013

  • Kevin M.

    Looks like a great event.

    June 20, 2013

20 went

Our Sponsors

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy