With RSA right around the corner, we’ve put together a checklist of six “must attend” sessions for those interested in cloud security related topics.

 

Also, we’re giving away a Chromecast every 6 minutes!

Come visit Skyhigh at RSA, Booth #133, watch a two-minute video and enter to win one of 200 Google Chromecasts. Increase your odds to 100% by booking a private meeting and demo and pickup a Chromecast at the meeting. Email RSA@skyhighnetworks.com to schedule a meeting.

P.S. Get a $10 Starbucks card just for viewing the video.

 

Monday, February 24 – CSA Summit

Managing Cloud Risks and Trusting the Cloud Continuously

11:35 AM – 12:35 PM | West | Room: 2014

Whether through IT, business units or individual employees, the decision has been made to move to the cloud. How do we make the determination that we can trust any given cloud application? What types of independent verification are needed, and what trust marks and certification are most appropriate? Panelists will discuss state-of-the-art innovations helping enterprises manage risks and monitor activities in realtime. We will also explore governance and compliance initiatives such as CSA STAR that encourage industry transparency and independent certification. This panel will provide enterprises with practical advice to manage risks with their own cloud adoption strategy and protect their sensitive information from all comers.

  • Erik Peterson, Director of Product Strategy, Veracode
  • Sol Cates, Chief Security Officer, Voremetric
  • John Hawley, VP, Business Unit Strategy, CA Technologies
  • David Miller, Chief Security Officer, Covisint
  • Kaushik Narayan, Co-Founder and Chief Architect, Skyhigh Networks

 

Tuesday, February 25

Now That You’re In, How Do You Get Out? Terminating Cloud Services

1:20 PM – 2:20 PM | West | Room: 2015

Out of the box Cloud contracts don’t allow for easy exit for the customer. In addition, there’s no legal requirement for cloud vendors to provide you with data export or assist you in the migration to another cloud provider. Everything depends on your contractual agreement & technical proficiency. An exit plan is critical to ensuring you don’t get locked-into the vendor or locked-out of your data.

  • Ben Rothke Manager – Information Security, Wyndham Worldwide Corp

 

Storm Advancing: Security Weathermen Forecast the Advanced Threat Landscape

2:40 PM – 3:40 PM | West | Room: 3009

In a post-prevention world, security professionals are blind to targeted attacks and advanced malware, and now realize that what used to protect them doesn’t work. Join this panel of CISOs who are leveraging big data security analytics and advanced threat protection to prepare for the inevitability of APTs and zero-day attacks, with faster time-to-detection and greater ability to minimize impact.

  • Neil MacDonald, VP, Distinguished Analyst and Gartner Fellow Emeritus, Gartner, Inc.
  • Carter Lee, CISO, Overstock.com
  • Golan Ben-Oni, CSO, IDT Corporation
  • Ramin Safai, CIS0, Jefferies & Company, Inc.

 

Survey of the Operating Landscape Investigating Incidents in the Cloud

Tuesday, February 25, 2014 | 4:00 PM – 5:00 PM | West | Room: 2002

You’re moving data and operations to the cloud. Sooner or later you WILL have an incident. The only question is whether you’ll be ready to respond. In this session, Paul and Jake will share their experience investigating incidents on private and public cloud architectures. You’ll learn what works, what doesn’t and which traditional forensics techniques can be adapted to the fluffy environment.

  • Jacob Williams, Chief Scientist, CSRgroup Security Consultants
  • Paul Henry, Security and Forensic Analyst, Lumension

 

Wednesday, February 26

Why Cyber Incident Response Teams Get No Respect

9:20 AM – 10:20 AM | West | Room: 3009

As security breaches continue to plague companies, a great cyber incident response team is essential. Management is often in the dark about CSIRT effectiveness because metrics are not in place to gauge if incidents are detected and resolved in a timely manner. Our panel of data security experts will share their insights on how to build a great CSIRT with the executive support and respect it needs.

  • Larry Ponemon, Chairman and Founder, Ponemon Institute
  • Christopher Pierson, Executive VP, Chief Security & Compliance Officer, Viewpost
  • Jill Phillips, Chief Privacy Officer, General Motors
  • Mark Weatherford, Principal, The Chertoff Group
  • Thomas Cross, Director of Security Research, Lancope

 

Is the Cloud Really More Secure Than On-Premise?

Wednesday, February 26, 2014 | 10:40 AM – 11:40 AM | West | Room: 2002

Scalability, low cost and fast deployment are attracting organizations to adopt cloud services. But some prefer to keep data on-premise. Panelists will discuss the security issues related to the cloud.

  • John Pescatore, Director, SANS
  • Bret Arsenault, Chief Information Security Officer, Microsoft Corporation
  • Bruce Schneier, Top Rated Speaker CTO, Co3 Systems, Inc.
  • Eran Feigenbaum, Director of Security, Google Apps, Google
  • Wade Baker, Managing Principal, Research and Intelligence, Verizon