Click here to close now.

Welcome!

.NET Authors: Liz McMillan, Carmen Gonzalez, Elizabeth White, Greg O'Connor, Jason Bloomberg

News Feed Item

Cloud Security Alliance Announces Keynote Line Up and Breakout Sessions for Congress 2014

CSA and International Association of Privacy Professionals (IAPP) join forces to offer comprehensive data protection program

SAN JOSE, Calif., July 31, 2014 /PRNewswire-USNewswire/ -- The Cloud Security Alliance (CSA) today announced the keynote line up and notable new breakout sessions for the upcoming CSA Congress and International Association of Privacy Professionals Privacy Academy, scheduled to take place September 17-19, 2014, at the San Jose Convention Center in San Jose, CA.  Participants are encouraged to take advantage of special early registration pricing now through August 8, 2014.

Cloud Security Alliance Logo.

CSA Congress and IAPP Privacy Academy 2014 will feature high-level keynotes, covering the latest trends and best practices for managing security and privacy in the cloud.

This year's keynote presenters include:

  • Judith Donath, Harvard Berkman Faculty Fellow and Author of The Social Machine: Designs for Living Online, will detail how interface design plays a fundamental -- yet under-utilized -- role in securing online privacy when demarcating the boundaries between public and private space, or when managing identities and reputations.
  • Taher Elgamal, Chief Technology Officer, Security of Salesforce.com, will speak to the future of cyber and information security standards and will provide first-hand experience in developing SSL. 
  • Adrienne Hall, General Manager, Trustworthy Computing, Microsoft Corporation, will demystify some commonly asked questions by cloud customers. She will then outline investments that are important in establishing customer trust, so that the benefits of the cloud can be fully realized.
  • Billy Hawkes, Data Protection Commissioner of Ireland, will speak to his experience as the regulator tasked with overseeing the European presence of many major Silicon Valley Internet firms, and how American companies can successfully navigate the European privacy landscape. 
  • Bruce Schneier, Security Technologist; Fellow, Berkman Center, Harvard Law School; and CTO of Co3 Systems, will speak on conceptualizing privacy and why, as we convert our evolved social systems to engineered socio-technical systems, we need to understand the role privacy plays in our lives and how it can be preserved.
  • Iwan Streichenberger, Chief Executive Officer, inBloom, will look to answer if concerns over data privacy can really make or break a business. Streichenberger will share lessons learned, his take on the privacy versus innovation challenge, and why businesses need to embrace customer privacy challenges right from the start.

The joint event will bring together CISOs, heads of information security, CIOs, CTOs, security architects, chief privacy officers and risk management leaders to discuss and collaborate on solutions to current and future threats to today's businesses.

"Whether it be from one of our distinguished keynotes, breakout session speakers, workshops or training sessions, this year's Congress is packed with practical and readily applicable knowledge for today's security professional," said Jim Reavis, CEO of the CSA.  "In joining up with IAPP, we hope to provide cloud professionals with an event that is unique and special, and one that will arm them with a new level of knowledge to help their organizations take advantage of the most advanced and best practices when it comes to global cloud security and privacy opportunities, risks, and challenges."

"The keynotes and sessions at this year's conference bring together some of the best thinkers across the security and privacy world, providing attendees with an interesting, holistic look at the data protection landscape," said Trevor Hugues, President and CEO of IAPP. "As security and privacy responsibilities in organizations continue to intersect, it's imperative that professionals from both disciplines have a well-rounded perspective on how data must be secured and managed."

In addition to a dynamic keynote line up, Congress 2014 will include a number of notable breakout sessions covering key emerging topics including:

Securing Cloud Apps at Pandora: What Today's Enterprises Can Learn
Doug Meier, Director, Security and Compliance at Pandora, will explain how Pandora roots out "shadow IT" and other risky practices while enabling fast, simple and secure provisioning of new apps. He will discuss hot topics such as single sign-on, identity management, active directory integration and the importance of the SAML standard.

Leveraging CHAOS (Controlling Havoc and Overhauling Security) Theory to Promote Cloud Adoption
Evelyn de Souza, Data Privacy and Compliance Leader at Cisco Systems, and Richard Noguera, Head of Information Security for The Gap, will present a new data-centric model that bridges the gap between information security teams and business users, to help promote agility by expressing data security in terms that can be readily understood by the business.

What Are Your Top 25 Cloud Security Weaknesses?
Randall Brooks, Engineering Fellow at Raytheon Corporation, will discuss how to apply the Common Weakness Risk Analysis Framework (CWRAF) to lay the foundation to identify the top 25 cloud security weaknesses and how to address them.

This year, the CSA and the IAPP are combining their Congress US and Privacy Academy events into a conference in the heart of Silicon Valley. This conference will offer attendees more than eighty sessions to choose from covering all aspects of privacy and cloud security. Nowhere else will cloud, IT and privacy professionals be able to meet and learn from each other, and gain visibility to practical, implementable solutions delivered by leading industry experts. Together the combined event will broaden the educational and networking opportunities available to both IAPP and CSA members.

Cloud Security Alliance Congresses continue to be the industry's premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. In addition to offering best practices and practical solutions for remaining secure in the cloud, CSA Congresses give attendees exposure to industry-specific case studies that will help them learn and leverage best practices used by their peers in moving to a secure cloud.

IAPP conferences are recognized internationally as the leading forums for the discussion and debate of issues related to privacy policy and practice. The annual IAPP Privacy Academy is known for its diverse programming around operational privacy and technology.

Special discount pricing for individuals and groups is running now through August 8th. To register visit https://cloudsecurityalliance.org/events/csa-congress-2014/.

Media attendees
Qualified media should contact [email protected] for a complimentary CSA Congress press pass.

About the Cloud Security Alliance

The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

About the IAPP  

The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. Founded in 2000, the IAPP is a not-for-profit association that helps define, support and improve the privacy profession through networking, education and certification. More information about the IAPP is available at www.privacyassociation.org.

Logo - http://photos.prnewswire.com/prnh/20130723/DC51526LOGO

SOURCE Cloud Security Alliance

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Enterprise IoT is an exciting and chaotic space with a lot of potential to transform how the enterprise resources are managed. In his session at @ThingsExpo, Hari Srinivasan, Sr Product Manager at Cisco, will describe the challenges in enabling mass adoption of IoT, and share perspectives and insights on architectures/standards/protocols that are necessary to build a healthy ecosystem and lay the foundation to for a wide variety of exciting IoT use cases in the years to come.
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
SYS-CON Events announced today that B2Cloud, a provider of enterprise resource planning software, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. B2cloud develops the software you need. They have the ideal tools to help you work with your clients. B2Cloud’s main solutions include AGIS – ERP, CLOHC, AGIS – Invoice, and IZUM
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and easy to use. MangoApps has been named a "Market Leader" by Ovum Research and a "Cool Vendor" by Gartner...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on Twitter at @MicroservicesE
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immediate and actionable interpretation of events as they happen. Another aspect concerns how to deliver ...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Raspberry Pi, BeagleBone, Spark and Intel Edison. You will also get an overview of cloud technologies s...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
As we approach the next @ThingsExpo, to be held June 9-11 at the Javits Center in New York, my thoughts naturally turn to the Internet of Things. The IoT is a leviathan—in the best possible sense of the term—that will sweep up most everything in the ocean of data and technology being created today and tomorrow. But rather than try to grasp all of its possible uses, for today I'm looking at “just” the Industrial Internet part. I just read a long paper co-authored by Tim Berners-Lee about the possibility of describing a “web science,” that is, discipline that combines the study involved ...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Telecommunications Corporation, a facilities-based international carrier licensed by t...
There are lots of challenges in IoT around secure, scalable and business friendly infrastructure for enterprises. For large corporations, IoT implementations are one of the top priorities of the decade. All industries are seeing a competitive need to sustain by investing in IoT initiatives. The value addition comes from improved customer service, innovative product and additional revenue streams. The data from these IP-connected devices can be leveraged for a variety of business applications as well as responsive action controls. The various architectural building blocks of an IoT ...
The WebRTC Summit 2015 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
Recent technology advances in miniaturization has positioned the wearables as the pinnacle of technology convergence with the human body. We inquire if wearables are mere standard miniaturized devices extended with the connectivity and present our views on considerations like design, applications, performance, efficiency, interoperability, usage scenarios, human device interaction and consequent trade-offs enabling wearables to impart optimal value.
In this session we look at creating interactive communications via the web by adding messaging, file transfer, and group communication (group chat and audio/video conferencing) into the web experience. We will also discuss potential applications of this technology in areas including B2B, B2C, P2P, and gaming. Peter is Technical Director at Acision. He graduated from The University of Edinburgh in 2000 with a BSc (Hons) in Computer Science. After graduation Peter worked on a PSTN switch developing signalling stacks for SS7, ISDN and similar protocols and creating advanced routing and serv...
The Internet of Things Maturity Model (IoTMM) is a qualitative method to gauge the growth and increasing impact of IoT capabilities in an IT environment from both a business and technology perspective. In his session at @ThingsExpo, Tony Shan will first scan the IoT landscape and investigate the major challenges and barriers. The key areas of consideration are identified to get started with IoT journey. He will then pinpoint the need of a tool for effective IoT adoption and implementation, which leads to IoTMM in which five maturity levels are defined: Advanced, Dynamic, Optimized, Primitive,...
SYS-CON Events announced today that AIC, a leading provider of OEM/ODM server and storage solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. AIC is a leading provider of both standard OTS, off-the-shelf, and OEM/ODM server and storage solutions. With expert in-house design capabilities, validation, manufacturing and production, AIC's broad selection of products are highly flexible and are configurable to any form factor or custom configuration. AIC leads the industry with nearly 20 years of ...