Tuesday February 08, 2011, the Charlotte Chapter of ISACA is hosting a Half Day Event focused on "Overview of the Cloud"
3 CPE's will be awarded.
11:30 AM Registration / Networking
11:50 PM Chapter Announcements & Speaker Introduction 12:00 PM Presentation Begins 1:30 PM Break
11:50 PM Chapter Announcements & Speaker Introduction
12:00 PM Presentation Begins
1:30 PM Break1:40 PM Presentation Continued.
3:00 PM Closing Remarks
Cost and Credits Offered:
Registration available until 11:00 PM EST February 03, 2011: The registration event cost is free for Charlotte ISACA members, $15.00 for Other ISACA Chapter, ISSA, IIA, & Partner Members, and $25 for non-members. An additional fee will be added for EventBrite processing. 3 CPES will be offered. Lunch will NOT be provided to keep the cost low, please plan accordingly.
Cloud Abstract: The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable
Aesop wrote a little ditty about some discontented frogs who lived in a pond. They asked Jupiter for a King. They got one. They didn't like it. They got a replacement. It ate them. The moral of this story is "be careful what you wish for."
The corresponding analog is that of the future state of security in a cloud based virtualized world. It's coming, but it's not going to look much like what security looks like today and it's certainly not what people are expecting. In fact,it may consume us all because we're actually unprepared for what we're asking for.
You'll laugh, you'll cry, you will want to know where I got the frogs for my slides...but best of all you will be one step closer to cloud readiness. Topics covered will include:
- Key Ingredients in the Cloud Recipe
- When Is An Application Cloud Ready?
- Cloud Archetypes
- Mapping the Archetypes to Security
- Public V/S Private Cloud
- How is "Cloud" Different than Today's Outsourced Services
- Can the Cloud Transfer Risk?
- Cloud Things that Can Go "Bump" in the Night
- Public v/s Private: Does it matter?
- Cloud Simplexity?? Is it a problem?
- Web 3.0, Infrastructure 2.0, and Security 1.x?? Really?
- Break Glass, Apply common sense.
Speaker Profile: Corey Elinburg
Mr. Elinburg is a highly experienced information security professional with a fifteen year record of developing, delivering, architecting, managing and supporting information security. He is a proven technology strategist with a clear understanding of the capabilities and practical application of technology to business processes. He is a trusted thought leader, technology evangelist and strategic advisor to industry analysts, business partners, vendors and customers. Mr. Elinburg has been a featured speaker at Cisco Live and is the author, co-author and technical editor of white papers, implementation guides and books.
Refund Policy: Due to the deadlines for attendance guarantees which commit us to pay for you whether or not you are able to attend, paid registrations will be refunded in full, minus the processing fee, for requests received in writing on or before February 03, 2011 at 5:00 PM EST. Submit refund requests to firstname.lastname@example.org. No refunds will be given for any cancellation requests received after February 03, 2011 at 5:00 Pm EST. No reimbursement will be made if you fail to attend. Please note that substitutions will be accepted until 5:00 PM EST on February 03, 2011. Substitutions may be requested by sending an email to email@example.com. No walk ins permitted for this event.
Parking: Parking is not included as part of the event fee. Parking is available at various other locations. Please find your appropriate parking.
You must pay in advance during your online registration.