Key Learning Points
- Cloud usage and data protection laws often collide
- Data in the cloud will inevitably cross national boundaries
- Data location or residency does not guarantee legal sovereignty
- Organizations need to shift focus from infrastructure to data protection
- Data protection technology like encryption can address these challenges
While global cloud adoption continues to accelerate, organizations in many regions have been hesitant to use the cloud because of concerns over the privacy and sovereignty of sensitive data. The basic nature of the cloud makes data residency a slippery concept – data will inevitably cross national boundaries. Although cloud providers offer robust infrastructure, you have to take responsibility for the protection of your own data. This presentation will describe strategies for applying encryption and tokenization to assure your compliance with data protection laws, while still taking full advantage of the cloud.
About William Leichter
William Leichter, Global Director of Cloud Security, has over 20 years of experience helping Global 1000 companies meet security and compliance challenges within their networks and in the cloud. Mr. Leichter leads CipherCloud’s efforts to evangelize new models for cloud security, and translate that into product requirements and market positioning. He has extensive experience in a range of IT areas including cloud platforms, B2B applications, network security, data loss prevention, email security, and network access control. He has held marketing and product management positions in the US and Europe, at CipherCloud, Axway, Websense, Tumbleweed Communications, and Secure Computing (now McAfee).