Technology Communities |
SecurityJump straight to an abstract:
The Abstracts
Introduction to Information Assurance Many organizations face the task of implementing data protection and data security measures to meet a wide range of requirements. With increasing frequency, storage managers and professionals are being asked to handle elements of this protection, which are often presented in the form of a security checklist. However, checklist compliance by individuals who are missing a basic background in Information Assurance is a quick recipe for trouble. At its core, Information Assurance is about ensuring that authorized users have access to authorized information at the authorized time. Further, it doesn't matter whether the information is in storage, processing, or transit, and whether threatened by malice or accident. This session provides an introduction to Information Assurance as well as details that will help storage personnel better understand its applicability in their own environments. Learning Objectives
SNIA Storage Security Best Practices Learning Objectives
A CISO's View of the Storage Ecosystem Many organizations face the task of implementing data protection and data security measures to meet a wide range of compliance requirements. Heading that charge is the CISO and other security professionals, who are responsible for protecting information at rest, in transit, and when threatened intentionally or not. Until recently the CISO, as well as security professionals, have had limited interaction with the storage layer. However, this trend is changing rapidly. The CISO and the security organization are now expanding their purview and placing increased scrutiny on the storage ecosystem. The scrutiny comes in the form of traditional and non-traditional security controls and requirements. In order for organizations to be successful, security and storage professionals must partner in order to protect information assets from current and emerging threats. Learning Objectives
How E-Discovery Will Impact Your Life as a Storage Professional
Computing or Litigating in the Cloud - Emerging Issues in E-Discovery, Search and Digital Evidence Management Learning Objectives
Storage Security - Learning from Others Experiences (Panel Discussion) This session features a panel discussion made up of end-users, standards bodies representatives, and vendor individuals that have been involved with the evaluation, selection, and deployment of various storage security solutions within their enterprises. The session goal is to help IT management and administrators learn from the challenges and successes other have had in deploying storage encryption and key management solutions. Topics include: What processes and policies have, or haven’t worked for other organizations? What are the various architectural options for deploying this type of solution? How can you determine what deployment option is best for your organization? What are the primary key management factors for consideration? What services are available to help in this area? A higher level of co-ordination between the events at SNW is desirable. Past SNW participant feedback has indicated that a conference session facilitating understanding of daily operations would help drive traffic to a Hands-On Lab and give the conferences a real-world practical side that should appeal to a number of SNW attendees. This conference session will provide the groundwork for what will be demonstrated at the Data Protection/Security Hands-On Lab and serve as an educational foundation for this event, enabling end users to both become aware of SNIA educational opportunities and to help them get the maximum benefit Learning Objectives
Preparing for a Security Audit: Best Practices for Storage Professionals Until recently, being in compliance with security requirements and preparing materials for a security audit typically wasn't part of storage operations, but times have changed. This tutorial focuses on practical advice for storage administrators without assuming you have an information security background. At the end of the session you should have a set of guidelines for meeting expectations of preparing for, going through, and avoiding the pitfalls that could result from an audit Learning Objectives
ABCs of Encryption Public disclosures of data indiscretions have become regular enough and embarrassing enough that many organizations are exploring encryption options both to satisfy information protection requirements and to simply stay out of the headlines. Those who have ventured into this space quickly realize that there is no magic crypto fairy dustĀ that will make the problems go completely away. However, with careful planning and judicious use of the right technologies, organizations can eliminate many of their exposures. This session focuses on the efforts required at the storage layer to both create a successful encryption strategy and effectively deploy products that address encryption of data at-rest as well as data in-flight. The session is based on an established step-by-step process that is defined in detail in a SNIA white paper, and also covers recent SNIA work on Best Current Practices. Learning Objectives
An Introduction to Key Management for Secure Storage As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective key management policies. Without the proper generation, distribution, storage, and recovery
Self-Encrypting Drives
Self-encrypting storage (e.g. hard drives) integrates the AES encryption hardware and strong access control directly into the drive electronics and thus avoids many of the vulnerabilities of software-based solutions, providing protection against computer loss or theft and facilitating computer re-purposing and end-of-life. By deleting the cryptographic key under strong administrative access control, the drive can be instantly Learning Objectives
|
LoginFeatured Events
|

