As banking institutions seek tremendous cost savings from cloud infrastructure and services, two key factors must be considered: The Patriot Act, which has strict stipulations regarding access to data and where it is stored, and the protection of data -- even from third party service providers.
This webinar explores what these security topics mean to financial institutions:
The impact from the newly-extended Patriot Act re: sensitive data in the cloud;
Risks to consumer information stored in the cloud from 3rd parties;
How to address data sovereignty issues with cloud computing infrastructure.
The virtual nature of cloud computing opens up cost savings that are difficult to ignore, yet two orthogonal but perhaps complimentary issues make having a cohesive data security strategy dramatically more complex.
The first is the recently extended U.S. Patriot Act which provides for sweeping abilities for law enforcement to access data stored in U.S. Data Centers - regardless of geography. Often in conflict with local, e.g. European Union Data Protection legislation, there are complex issues ahead concerning the protection of data as it crosses international boundaries.
The second issue is that of protecting the data stored in cloud infrastructure - with its virtual nature - it's not possible to know necessarily where a piece of data is being stored in the cloud - nor is it always clear who exactly at the 3rd party service provider has access to that data.
The question becomes, is it possible to have a strategy where data from international jurisdictions can be stored in the cloud while retaining clear lines of separation? Similarly is it possible for enterprises to control their data stored in a 3rd party cloud without knowing exactly where it is?
It turns out that some new advances in key management could help resolve both these scenarios. By using some common examples, e.g. "How to protect sensitive emails in Microsoft BPOS/Office 365 Environments" and "How to enforce sovereignty of data stored in a cloud based infrastructure", we'll help uncover:
The specific threats to data in the cloud;
How to segregate data using encryption keys;
How to protect and control data stored in the cloud.
Webinar Registration
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Wasim Ahmad brings to Voltage over 19 years of experience in enterprise software, application development and business intelligence, working with Global 2000 customers. Most recently, Wasim was Vice President of Strategy and Marketing at CA. Wasim was responsible at CA for defining and executing business strategy, focusing on portfolio strategy, mergers and acquisitions, as well as associated sales, marketing and branding strategies.
Prior to CA, Wasim was with Sterling Software serving as a Business Unit Director, where he focused on applications development products for Distributed, Mainframe, Microsoft and J2EE platforms. Before Sterling, Wasim was with Synon, a start up in the applications development space, in various roles including product management and European marketing.
Wasim holds a B.Sc. degree in Physics from the University of Sussex, England.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.