Technology Communities |
SecurityMaterial on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period. Jump straight to an abstract:
The AbstractsSaving Private Data: An Introduction to Storage SecurityDownloadIn their relentless drive to master the ever increasing floods of data, organizations increasingly exploit the efficiencies and cost reductions realized through storage networking. But as these information assets centralize, their value as targets increases dramatically. Tales of breaches litter the popular and industry press as more organizations find themselves becoming statistics in the struggle to safeguard their information. This tutorial introduces the newly revised best common practices for storage security developed by SNIA's Security Technical Working Group and will provide timely guidance on how you can succeed in the mission of saving your organization's private data. Learning Objectives:
ABCs of EncryptionDownloadPublic disclosures of data indiscretions have become regular enough and embarrassing enough that many organizations are exploring encryption options both to satisfy information protection requirements and to simply stay out of the headlines. Those who have ventured into this space quickly realize that there is no magic crypto fairy dust that will make the problems go completely away. However, with careful planning and judicious use of the right technologies, organizations can eliminate many of their exposures. This session focuses on the efforts required at the storage layer to both create a successful encryption strategy and effectively deploy products that address encryption of data at-rest as well as data in-flight.. The session is based on an established step-by-step process that is defined in detail in a SNIA white paper, and also covers recent SNIA work on Best Current Practices. Learning Objectives:
An Introduction to Key Management for Secure StorageDownloadAs secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective key management policies. Without the proper generation, distribution, storage, and recovery of key material, valuable data will be eventually compromised. Worse, without proper management of key information, data can be completely lost. This session explores the fundamental issues and technologies that impact key management for disk, tape, array, and other storage devices. Major issues associated symmetric encryption keys are presented, along with practical advice on effective key management issues and practices. Learning Objectives:
Storage Security Panel: Learning from Others ExperiencesDownloadThis session features a panel discussion made up of end-user organizations that have deployed various storage security solutions within their enterprises. The session goal is to help IT management and administrators learn from the challenges and successes other have had in deploying storage encryption and key management solutions. Topics include:
TCG Trusted Storage SpecificationsDownloadThe Trusted Computing Group (TCG) Storage WorkGroup has published formal specifications for security and trust services on storage devices, including hard drives, flash, and tape drives. The majority of hard drive and other storage device manufacturers participated. Putting security directly on the storage device avoids the vulnerabilities of platform OS-based software security. The details of the Specification will be highlighted, as well as various use cases, including Full Disk Encryption with enterprise key management, from the laptop to the data center. Learning Objectives:
SCSI Security Nuts and BoltsDownloadThe SCSI Command Sets are the "lingua franca" of computer storage, the language by which computer systems and peripherals communicate to support the storage and retrieval of information - the lifeblood of any modern business. SCSI has evolved from origins in the early 1980s in "small" computers to support modern SANs that interconnect ten of thousands of peripherals and servers. The latest SCSI standards projects underway in INCITS Technical Committee T10 define the creation of Security Associations, methods of deriving keys & performing strong mutual authentication, per-command security controls supporting multiple levels of protection, support for security protocols defined separately by multiple other standards organizations, and the control and operation of new security features within storage peripherals themselves. This session will cover these new features in detail, and will highlight the new requirements that these features will place on the operation and management of future computer systems and their storage configurations. Learning Objectives:
Information Security and IT ComplianceDownloadIn times past, the sole yardstick of an Enterprise's IT department was business application availability. Today, however, a multitude of both internal and external requirements are applied to IT, along with a host of metrics. IT Policies are now driven by a need for compliance with national and international legislation on information security (e.g. HIPPA, Sarbanes-Oxley), various standardized and industry-developed regulatory frameworks (e.g. ISO 17799, COBIT), auditing standards, and even risk management requirements derived from insurance coverage. IT metrics include not only demonstrating compliance to the requirements but also such items as e-discovery response times, intrusion detection tests, and data retention periods. This session will describe SNIA Best Practices addressing data security compliance, understanding risks, and utilizing event logging. Commonly encountered requirements will be identified, and approaches to creating IT Policies and collecting evidence that enable appropriate metrics to be used to demonstrate compliance will be described. Learning Objectives:
How E-Discovery Will Impact Your Life as a Storage ProfessionalDownloadMention the term E-Discovery to a storage professional and watch their reaction. Storage Professionals today face the daunting task of being able to quickly know where every email, word document and database file lives and how to get it back in a hurry in the event of a catastrophe. With the recent update to the Federal Rules of Civil Procedure (FRCP) a storage professional now has even more pressure to potentially know the content inside those files. This session helps the storage professional understand the new Federal Rules of Civil Procedure (FRCP) that were recently updated. We will also look at an e-discovery request from the perspective of an end-user. Finally, we will provide some recommendations on how to prepare for an e-discovery request. Learning Objectives:
|
LoginFeatured Events
|

