You're Officially Registered


QUICK TIPS

Run a System Check

FAQs and Suggestions

What is a virtual seminar?

  • Interact with today's top experts as they reveal proven tips, tactics and techniques throughout the day
  • Engage top vendors during interactive booth times; test drive live product demos
  • Network with hundreds of your peers from around the world
  • And more

Cloud computing is opening up new areas of management and compliance issues for CIOs, IT managers, auditors and compliance and risk officers.

The cloud's boundaries are difficult to define and resources are transparent to users and administrators, which makes the creation and enforcement of controls more difficult than normal system audits. This virtual seminar offers several perspectives from industry leaders on managing risk and compliance in the cloud.

Join leading information security and compliance educators, ISACA, SearchCompliance.com and SearchSecurity.com, who have teamed up to give you direct access to renowned security and compliance experts, qualified senior IT peers and practical independent advice and best practices on how to define, defend and regulate cloud environments.

Speaker Biographies

About Dave Cullinane
CISO, VP of eBay

CSO Magazine’s 2006 Compass Award --
“Visionary Leader of the Security Profession”

Keynote Presentation: Cloud Security: Building Trust in the Cloud

Dave has more than 20 years of security experience and is Board Certified in Security Management by ASIS International as a Certified Protection Professional (CPP). He is also a Certified Information Systems Security Professional (CISSP) and a former Certified Business Continuity Professional (CBCP). Prior to joining eBay, Dave was the CISO for Washington Mutual, one of the largest banks in the United States. Prior to that Dave was a Senior Consultant for nCipher, Inc., the Director of Information Security for Sun Life of Canada's U.S. operations and helped create Digital Equipment Corporation's Security Consulting Practice.

Dave is a Charter Member of the Alliance for Enterprise Security Risk Management (AESRM) and the Global Council of Chief Security Officer and is past International President of the Information Systems Security Association (ISSA).


About Joseph C. Granneman, CISSP

Active member in the FBI Infragard program and the Chicago Electronic Crimes Task Force

Session title: Data Protection and Access Control in the Cloud

Joseph Granneman is considered a leading authority in the information security fields. With over 20 years of technology experience in both health care and financial services, Granneman speaks regularly on risk management, electronic medical records and incident response. He holds certifications from Microsoft, Novell, Citrix and is also a CISSP and has written articles for Information Security Magazine, CSO and CIO magazine, SC magazine, and Advance for Health Information Executives. He was active in the Health Information Security and Privacy Security Working Group for Illinois which developed the frameworks for the security and privacy of a national electronic medical record. He was a member of the Certification Commission for Health Information Technology (CCHIT) Security Working Group.


About Richard E. Mackey, Jr.

Vice President, SystemExperts

Session title: Compliance and the Cloud

Dick is regarded as one of the industry's foremost authorities on distributed computing infrastructure, compliance, and security. He has helped many organizations, from online retailers and application service providers to major manufactures assess and improve their security programs. He has advised leading Wall Street firms on overall security architecture, virtual private networks, enterprise wide authentication, and intrusion detection and analysis. Mackey has been a frequent speaker at conferences and a regular contributor to major publications on topics such as regulatory compliance, security standards, identity management, and service-oriented architecture security.


About Jeffrey Ritter

Founder and CEO, Waters Edge Consulting

Session title: Vendor Management in the Cloud

Building on a global career in law, technology, standards development and academic research, Jeffrey's training, systems design and advisory services help organizations identify all of the rules by which systems and data are to be managed, and assure that compliance with those rules can be achieved faster, cheaper and with improved governance. Jeffrey is a well known online host and moderator of the e-symposia for ISACA, ISC(2) and ISSA.

For six years, he served as legal advisor to I-4, a private membership research organization serving the top chief information security officers in Europe and North America. As a public speaker and lecturer, Jeffrey is recognized for his effectiveness at translating complex legal and technology concepts into functional knowledge useful to legal and non-legal audiences.

Tips for an Enriching, Educational Virtual Experience

How do I log in On Demand

Because you're pre-registered, we will send you an email reminder before the seminar begins with a link to enter the virtual environment. If, in the rare occurrence, you aren't able to enter, you'll be prompted to enter your email address and reset your password.

What is a virtual seminar?

You'll enter a slick interface — along with several hundred of your peers — and experience expert information, peer interaction and technology information. You'll attend sessions with our security and compliance experts, you'll visit vendor booths with product demo information and real live reps to answer your questions, you'll download background information on cloud management best practices, and you'll interact with your peers. Earlier this year we held a virtual seminar on governance, risk and compliance (GRC), with rave reviews on both the content received and the easy-to-navigate online experience.

What will I get from this virtual seminar?

This free, one-day virtual seminar explores several perspectives from industry leaders on managing risk and compliance in the cloud. Connect with renowned security and compliance experts, qualified senior IT peers and practical independent advice and best practices on how to define, defend and regulate cloud environments. Walk away with insight on how to:

  • Select the cloud infrastructure approach that's best for your business
  • Protect data and control access to the cloud once it’s in a provider’s hands
  • Understand emerging audit guidelines and standards for cloud computing, including SAS 70 Type I and II audits
  • Deal with common vendor management issues, such as SLAs, due diligence of the provider partner and maintaining administrative control

PC Requirements

Click Here to Run System Check
To interact with the online environment requires a Windows PC with Internet Explorer 6.0 minimum, or Firefox 3.0 to 3.0.19 and 3.6. Mac with Firefox 3.0 to 3.0.19 and 3.6 and Safari 3.1 or higher are also supported. We support Windows XP, Windows Vista, and Windows 7 on PCs. Leopard, Tiger, and Snow Leopard are supported on Macs. Linux Fedora Core 10 is also supported operating systems. Macromedia Flash Player 10 or higher is required. Access to the internet using high speed access (Cable, DSL, Network) is highly recommended for the overall environment and is required for all presentations. Pop-up blockers must also be disabled and cookies and JavaScript should be enabled. On entering the environment, a system check is run which will identify computer requirements that need to be addressed to interact with the online environment. It is recommended to view the environment with the display resolution of 1024 x 768.

On Demand

Presented in partnership by:

On Demand
Session#1

Keynote: Cloud Security: Building Trust in the Cloud

Session#2

Technology in Action Spotlight Session Presented by Google

Session#3

Data Protection and Access Control in the Cloud

Session#4

Compliance and the Cloud

Session#5

Technology in Action Spotlight Session Presented by ArcSight

Session#6 Vendor Management in the Cloud