Mon, 7 May 2012
Expert Chat with HP on How Better Understanding Security Makes it an Enabler, Rather than an Inhibitor, of Cloud Adoption
Find the podcast on iTunes/iPod. Read a full transcript or download a copy. Sponsor: HP. It now falls to CIOs to not only rapidly adapt to cloud computing, but to find the ways to protect their employees and customers as they adopt cloud models – even as security threats grow. This is a serious -- but not insurmountable challenge. Cloud computing has clearly sparked the imagination of business leaders, who see it as a powerful new way to be innovative and gain first-mover advantages -- with or without traditional IT's consent. This simply now means that the center of gravity for IT services is shifting toward the enterprise’s boundaries – moving increasingly outside their firewalls. And so how can companies have it both ways -- exploit cloud's promise but also provide enough security to make the risks acceptable? How can organizations retain rigor and control while pursuing cloud benefits? In a special BriefingsDirect sponsored HP Expert Chat discussion on how to define and obtain improved security, I recently moderated an in-depth session with Tari Schreider, HP Chief Architect of HP Technology Consulting and IT Assurance Practice. Tari is a Distinguished Technologist with 30 years of IT and cyber security experience, and he has designed, built, and managed some of the world’s largest information protection programs. In our discussion, you’ll see the latest recommendations for how to enable and protect the many cloud models being considered by companies the world over. As part of our chat, we're also joined by three other HP experts, Lois Boliek, World Wide Manager in the HP IT Assurance Program; Jan De Clercq, World Wide IT Solution Architect in the HP IT Assurance Program; and Luis Buezo, HP IT Assurance Program Lead for EMEA. Find the podcast on iTunes/iPod. Read a full transcript or download a copy. Sponsor: HP.
Direct download: BriefingsDirect-HP_Security_Expert_Tari_Schreider_Chats_on_Best_Practices_for_Cloud_Protection.mp3
Category:technology -- posted at: 12:04pm EST |
Search
Archives
AugustMay
February
January
November
September
July
April
March
January
September
August
June
March
February
January
December
November
October
September
August
June
May
April
March
February
January
December
November
October
September
August
July
June
May
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
June
May
April
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December
November
October
September
August
July
June
May
April
March
February
January
December