Cloud services come in a variety of configurations, and there are lots of security considerations when using the cloud for enterprise applications. How much of your traffic should you encrypt, and does that vary by application type? What are the best-practices for handling authentication and access for your own end-users? What about anti-malware updates -- who manages those? And what¹s the best way to handle third-party users whose patches and updates are in question?
Join us as we look at these issues with guest John P. Pironti, President, IP Architects LLC, and come up with five baseline requirements for being smart about security when setting up and using cloud-based security.
Listeners can expect to gain greater insights about:
- What transitioning to the cloud does for your risk level - Which applications and processes make more sense to move to the cloud and what you should consider when making this decision
- How to implement and maintain effective information risk management when you don't own or control the information infrastructure - Who is responsible when a security incident happens in a cloud environment (the answer may surprise you) - What to look for in cloud service agreements and what limitations will most likely always exist
Sorry we couldn't complete your registration. Please try again.
You must accept the Terms and conditions to register