Cloud computing is a fact of life for enterprise IT delivery. Over the past few years, enterprise culture has shifted to accept that cloud computing is the way forward. But the end result isn't that simple. Due to the variety of requirements and available solutions, enterprises implement an array of cloud services, from multiple providers, using all three deployment models (IaaS, PaaS, and SaaS).

While there is strong guidance available on a strategic level and tools available to service individual services, organizations struggle integrating these solutions into their day-to-day security practices.

How do you properly evaluate the risk across services? Can you move beyond knowing what services are in use to knowing how they are being used? Can your choice of service provider reduce your risk and the operational impact of adopting cloud services?

Join us as we discuss the scope of the issue and the roadmap to resolve it. You’ll learn from the experiences and perspectives of three leading executives grappling with these issues today.

Generously Supported By:

supported by logo
Speakers
speaker photo
Mike Muscatell
Information Security Manager, Snyder's-Lance, Inc.
Mike Muscatell developed the Information Security Program & authored the CSIRT for Snyder’s-Lance Inc. where he is the Information Security Manager. Mike has 30 years in IT, 20 of in Information security, holds CEH, CPT and Six Sigma certifications. Will be featured in the January 2016 edition of SC Magazine discussing what’s emerging with APT attacks.
speaker photo
Johan Hybinette
CISO, HOSTING.com

Johan, a veteran information security professional and evangelist with over 25 years’ experience. Historically focused on providing CISO services to many corporations. Mr. Hybinette possesses a unique “black/white hat” perspective finding innovative ways to maintain and improve information security infrastructures. Deep compliance knowledge including and not limited to HIPAA, PCI, GLBA, NIST, FISMA, ISO 27K, and Sarbanes Oxley.

When he isn’t glued behind a computer screen, he spends time, tinkering with race cars, lock picking, reverse engineering and trying very hard not be the worst cook in the Rockies.

speaker photo
Mark Nunnikhoven
Vice President, Cloud & Emerging Technologies, Trend Micro
Mark focuses on helping businesses as they move from the data centre to hybrid environments to working fully in the cloud. Bringing a wealth of practical experience to the table, he is regularly sought after to speak on cloud computing, usable security systems, and modernizing security practices.
Moderator
speaker photo
Tatiana Melnik
Attorney, Melnik Legal, PLLC
Tatiana Melnik is an attorney concentrating her practice on IT, healthcare, data privacy and security, and regulatory compliance. She regularly speaks on IT legal issues including, HIPAA/HITECH, cloud computing, and IT contracting. JD, University of Michigan Law School; BS (Information Systems), University of North Florida.