Contact Us   |   Print Page   |   Sign In   |   Register
June 2018 ISSA International Series Web Conference




ISSA International Series: Cloud Services and Enterprise Integrations

Recorded (2 Hour Event) on Tuesday, June 27, 2018

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


Overview:

Securing cloud environments is a shared responsibility between your organization and your cloud service provider. But upholding your end of the bargain can be a challenge in these dynamic, complex environments — especially when dealing with a mix of physical networks and public and private clouds. In this webinar, we will discuss issues and strategies for handling Cloud Services and Enterprise Integrations. Amongst the topics covered we will attempt to address the issues of:

- How do cloud services impact security implementations?

- Who is responsible for defining security and how does one implement a security management program in an integrated enterprise cloud service environment?

- What transitional issues may occur during your migration? How do you audit a cloud service?

Register for the webinar to see the issues and benefits of handling cloud services and enterprise integration.

 

Moderator:

Michael F. Angelo - Chief Security Architect, Micro Focus | NetIQ

Michael F. Angelo CRISC, CISSP has over 30 years of information assurance experience. Michael has served as a trusted security advisor and security architect with leading corporations and government entities. He has acted as a technical adviser in the development of US national and international export controls. Currently chairs the ISSA International Webinar committee. Amongst his accomplishments he is an ISSA Fellow, and is named on the ISSA Hall of FAME for his contributions to the security community. In addition, he currently holds 61 US Granted Patents. His current work encompasses certifications, SDL, Threat Modeling, AppSec / DevOPS, as well as and Software Supply Chain analysis. Michael is a veteran moderator and has appeared at numerous International conference and in a multitude of International Web Conferences.


Speakers:

Mark Kadrich

For the past 30+ years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. His strengths are in architecture level design and review, solution design and efficacy, policy generation, endpoint security, and risk management. Mr. Kadrich is the author of the book Endpoint Security published by Addison Wesley. Mr. Kadrich holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering. He was a contributing author in publications such as Healthcare Technology Online, Health IT Outcomes, TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, SANS and The Black Hat Briefings. Mark Kadrich is a well- known speaker and

evangelist on network security matters at technical conferences and security events. He was the program manager and chair for Cornerstones of Trust for 3 years. Mr. Kadrich has been a CISO, CSO, CEO, Chief Scientist, Corporate Minion, and Security Slave. He is presently a Free Range CISO helping customers create and manage security IT environments.

 

Vincent A. Campitelli II

Vince has extensive experience in the converged fields of information technology and risk management. As a Regional Partner with Coopers & Lybrand (now PWC) he was a member of a small team of partners who led the adaptation of technology into the traditional fields of accounting and auditing. Post public accounting, he applied his mastery of risk management and technology with leading Wall Street and Healthcare organizations including Salomon Smith Barney, Goldman Sachs and McKesson Corporation. He developed and designed risk-based continuous improvement processes to monitor IT business systems and applications that resulted in improvements in operational performance and the reduction in outages and control deficiencies. Most recently, Vince has been consulting with the Office of the CEO of the Cloud Security Alliance (CSA) in supporting enterprise members apply CSA Security Guidance and Research results into their Cloud adoption and implementation programs.

Stephen E. Lipka, PhD, CRISC, CISSP

With over 10 years of information security experience, and decades of IT leadership and consulting experience, Dr. Stephen Lipka has developed a keen sense of what’s most important in protecting each organization’s information assets. In his current practice as a consulting CISO, Steve builds effectiveness in his clients’ information security programs and teams, all in the interest of protecting his clients’ profitability. Prior to his consulting practice, Steve served as CISO for Cushman & Wakefield, a global commercial real estate services firm. At C&W, he built the security and risk management program from the ground up. For that work, he was awarded NJ Technology Council’s 2016 CISO of the Year for privately held for-profit companies. Steve holds Bachelor’s and Master’s degrees from Polytechnic Institute of NY (now NYU), a PhD in computer science from SUNY Stony Brook, and CISSP and CRISC certifications.

Michelle Johnson Cobb, Chief Marketing Officer, Skybox Security

Michelle Johnson Cobb is the chief marketing officer for Skybox™ Security, a global leader in cybersecurity management. She helps to lead the company’s growth in more than 50 countries. For more than 15 years, Cobb has held executive roles in computer security, networking and enterprise software companies, including McAfee, Tumbleweed Communications and several startups. She received her MBA with high distinction from the University of Michigan Ross School of Business and a Bachelor of Science in Computer Science also from the University of Michigan.

Community Search
Sign In


Calendar

12/12/2018
ISSA Thought Leadership Series: 2018 User Risk Report

1/9/2019
ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

3/2/2019 » 3/3/2019
March CISO Forum San Francisco, CA

3/5/2019
Member Reception Party at RSA Conference 2019




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information