The Cloud Security Alliance has announced the closing keynote for its annual CSA Summit 2014, scheduled for Monday, February 24 from 9 am – 1 pm PT.
Technology convergence, cloud, mobile, and the Internet of Things are putting a severe strain on fixed perimeters, causing corporations to rethink their security. In his closing keynote, Alan Boehme, a member of the CSA’s board of directors and The Coca-Cola Company’s chief of enterprise architecture, will discusses the challenges complex multi-national organizations have in leveraging leading edge technology while maintaining secure and trusted IT capabilities. Mr. Boehme will explain why incremental approaches to managing and securing tech consumerization will fail, and why more disruptive approaches to enterprise network security are necessary. And finally, the keynote will highlight how several large organizations, in the private sector and government, are contributing to the SDP strategy and approach across multiple industries, and call upon enterprises worldwide to participate in the SDP initiative. A walk through of how the SDP model works will also be provided to attendees.
“We know the fixed perimeter is dead, the question now is, ‘What are we as organizations going to do about it?’” said Boehme. “From an enterprise perspective, we must take a new approach to protecting ourselves, overlaying the infrastructure and controls you already have in your environment to rework corporate security in light of today’s attacks, rather than today’s highly costly paradigm of continuously ripping and replacing. The CSA’s work developing and helping enterprises implement the SDP model is really the future of secure IT.”
SDP Workshop and Hackathon: Immediately following the closing of the CSA Summit, the CSA will host a Software Defined Perimeter workshop. The workshop will provide a detailed demo and explanation of SDP, and will kick off a ‘hackathon’ contest, which will last until 3pm PST on February 27, challenging attendees to hack the SDP protocol, modeled after military-grade networks.
The SDP Hackathon gives participants the IP addresses of the target file server as well as the SDP components protecting them. This in effect will simulate an ‘insider attack’ – one of the most difficult to prevent – on both private cloud and public cloud infrastructure. Participants will also have access to a reference SDP system to learn how the system works to plan their attack.
The first participant to successfully capture the target information on the protected server will receive an expenses paid trip to DEF CON ® 22, held in Las Vegas August 7-10, 2014. Contest rules are available at www.HackSDP.com. Space is limited, interested attendees should go to https://cloudsecurityalliance.org/events/csa-summit-2014/#_rsa to reserve a seat at the workshop.
The summit is sold out to the general public. Members of the media and analyst community interested in attending the event should contact kari@zagcommunications.com for more information, to receive press credentials and to schedule interviews with CSA leadership and conference speakers.
Cloud Security Alliance Congresses and Summits continue to be the industry’s premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. Attendees will gain exposure to industry-specific case studies that will help them learn and leverage best practices used by their peers in moving to a secure cloud.
About Cloud Security Alliance
The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.