Adoption of the cloud is not only attractive for its technical prowess, but is becoming a competitive necessity. Companies not only have the challenge of determining how to best leverage the cloud, but more importantly how to secure it in absence of the traditional defined network perimeter. By focusing on the data, a new security model can be built based on Access Control, Data Encryption and Encryption Key Custodianship. This new security model can be applied on both on-premise and public/private workloads, allowing enterprises to confidently embrace a multi-cloud workload strategy.
|Date:||Tuesday, March 7, 2017|
|Time:||4:30-5:00 PM: Registration|
|5:00-6:15 PM Chapter meeting|
|6:15-7 PM Networking (appetizers & drinks)|
|7:15 PM: Actionable Detects: Blue Team Cyber Defense Tactics – Seth Misenar|
|Venue:||Crowne Plaza San Jose Silicon Valley
777 Bellew Drive
Milipitas, CA 95035
Title: Director of Technology (Office of the CTO)
Bio: Gorav Arora works in the CTO office of Gemalto’s Identity and Data Protection business. An IT professional for over 15 years, Gorav started his career in startups and large organizations around Silicon Valley, getting hooked to delivering many world “first” solutions. He has a broad background ranging from development of silicon-chips to large scale software systems. Recently, his accomplishments have been focused on building solutions that ensure organizations stay ahead of the latest threats to their digital assets. Gorav holds an MEng degree from McMaster University, where he specialized in computer vision and distributed architectures.
NEW DATE, TIME AND LOCATION