Cloud security is re-emerging as a critical area of concern. For a time, security teams scrambled to bolt on security to third-party software, worrying that the data was outside owners’ control. Now, a new architecture is emerging, one in which companies have the opportunity to bake security into critical apps and cloud storage from inception. With automation and Cloud Access Security Brokers leading the way, there is an opportunity to make our systems and data more secure than ever before.
We had this chance with virtualization and missed the boat; this time, will you hop on board or let cloud security float on by?
One session not to be missed:
Session A6: Cloud Containerizaton Success
Presenters: Diana Kelley & Ed Moyle
More and more often, containers like Docker and Rckt are finding their way into cloud environments. Moreover, new cloud services are coming to light that are entirely based on these technologies. However, there are some circumstances where this technology may not be appropriate for certain use cases given the unique security constraints of those environments; but knowing when, where, and why these come into play can take some doing. This session will outline some of the unique considerations for containers in the cloud as well as outline strategic concerns for practitioners to think through during evaluation.
This talk will explore:
• What are containers (in the security realm)? Why do they matter?
• What are the security and risk considerations for containers in a cloud context?
• When might cloud not be appropriate for certain containerized apps?
• What factors should practitioners evaluate when looking at cloud container solutions?
• What are some mitigation strategies?
Register now