If your organization is moving to the cloud (and who’s isn’t these days?), you’re probably wondering how traditional approaches to security apply when a few hundred lines of code run over a few seconds can provision servers, configure firewalls and perform any number of other tasks that used to take teams of people, gobs of hardware and months to do.
If this brave new world of IT-as-code has you overwhelmed and wondering where to start, DON’T PANIC! This conversation will cover the basics around how companies are shifting their infrastructure, computing workloads and data to cloud service providers. We’ll discuss the opportunities cloud technologies offer to help solve security problems that have held back business and placed security professionals at odds with development and operations.
Participants should leave with less uncertainty and more confidence in the potential of cloud technologies and how they can adapt their security program as the industry shifts to this radical new technology.
- Cloud authentication
- Cloud monitoring
- Cloud encryption
- Security programs, cloud security criteria
About Peter Lukas
Peter Lukas has worked in information security exclusively for over 20 years supporting academia, telecom, financial and information services businesses around the Twin Cities area and globally. While an avid technologist, Lukas is continually fascinated by the challenges presented at Layer 8, and strongly believes that a good understanding of the workings of the most fascinating computer system of all, our brains, is key to a successful career and positive working relationships. When not trying to crack the latest technical conundrum for his job, Lukas is father to an amazing teen, a distance runner, aspiring yogi and avid napper.