Authored by Katherine Teitler, Director of Content at MIS Training Institute.

Spring is a time for renewal. It is a period of growth and optimism; temperatures warm, flowers bloom and we dust off the drab days of winter.

Spring is also the time for Cloud Security World 2016. The optimistic theme is fitting: Cloud is no longer a thing to be feared or avoided at all costs. Cloud enables productivity, speed and flexibility, and the security of cloud providers has improved steadily as adoption becomes widespread.

Some magic remains under the hood, but most of the reputable providers are not afraid to tout the security of their offerings if for no other reason than time and money have been invested to make security a competitive advantage. Security is no longer the rain on cloud’s parade; it’s being built in rather than bolted on as cloud access security brokers (CASBs) act as border patrol between consumers and providers, ensuring security policies are met and enforced.

This doesn’t mean the industry can wipe away all concerns with cloud usage, however. Misunderstandings and ambiguity are still common when it comes to cloud. The speakers at Cloud Security World are busily preparing to clear up some of that confusion to set security pros straight during the two-day event in June.

What to Expect at Cloud Security World

With 18 talks on the program, it’s hard to highlight just a few, but here are some top picks for the upcoming event.

If You Make It, We Can Break It

Known best for his research in automotive security and the infamous Jeep Cherokee hack in 2014, Chris Valasek will kick off the conference with a look at the inevitability of vulnerabilities in technology. For every thing created, someone will try to break that thing. With sufficient time and skill, vulnerabilities that can be exploited will be found. This fact, known by many security practitioners, leads some to feel a constant sense of defeat.

Valasek will explain why finding the vulnerabilities, and even why having them found in your company’s product/network/widget by the white hats, is good for security and not a downfall of the industry. He will share some lessons he’s learned in his years as a researcher and provide a few amusing anecdotes, along with ideas on how pros can band together to improve device security.

Apple iOS and iCloud Forensics Live Demo

Kyle Poppenwimer, a senior digital forensics examiner at T&M Protection Resources, will conduct a live demo in which he’ll show some tips and tricks he’s used during investigations to forensically extract, preserve and analyze data. The aim of his talk isn’t to show how cool it is to break things, but to help security practitioners understand that when an incident occurs at their own company, all is not lost. Even deleted data can be restored and used as evidence when necessary.

This is a can’t-miss talk for anyone who’s ever dealt with a security incident at his or her organization.

Applying Commercial and Federal Cloud Compliance Strategies

A top-rated speaker at least year’s Cloud Security World, James D. Biggs will be back to provide a much-needed update on the current state of compliance requirements as they pertain to doing business with the U.S. government. Anyone who has tried to do business with the government knows that the process for meeting federal requirements is tricky at best.

When it comes to cloud-based technologies, waters get murkier since your data is hosted off-premises in a third-party solution. It also may be commingled with other companies’ data and is perhaps even stored in a geographic location that maintains different (maybe stricter?) data privacy and handling requirements.

As a basis for the discussion, Biggs will focus on FedRAMP and FISMA as frameworks for meeting compliance and share how they can be used for threat reduction, cost control and resource selection. Attendees will receive detailed handouts with suggested road maps for strategy planning.

Cloud Containerization Success

Security pros know that container technologies are redefining the technology landscape when it comes to software and application development. But did you know that containers like Rocket and Docker can provide a level of security, portability and assurance within cloud environments, as well?

Containers are segmented virtual environments that allow applications to execute without interfering with one another. Contrary to their namesake, containers don’t contain — i.e., they’re not a mechanism for sandboxing. So what are they, exactly? How can they provide business value to your organization?

Diana Kelley, executive security adviser at IBM, and Ed Moyle, director of thought leadership and research at ISACA, will share some “gotchas” of implementing containers — shadow IT and sprawl, just like all other tech implementations, are a potential hazard. They’ll also offer up some leading practices that will help you on your way to determining when containerization is right for your organization.

Don’t Get Left Out in the Cold

These four talks are just our top picks, but if you want to learn about automation, modernizing your software development life cycle or even how encryption in the cloud works, check out our Cloud Security World 2016 agenda. You can also register to join us June 14–15, 2016, at the famous Omni Parker House Hotel in downtown Boston.

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today