Technology Communities |
SecurityJump straight to an abstract:
The Abstracts
Introduction to Storage Security As society becomes more dependent on IT and digital assets, the social impact of the failure of IT resources ceases to be an inconvenience and begins to take on the character of a disaster. Few other elements of the IT infrastructure have a more important relationship with data than that of storage systems. They may also be the last line of defense against an adversary, but only if storage managers and administrators invest the time and effort to implement and activate the available storage security controls. This session covers the storage security fundamentals. It starts by providing information on the types of data that should be protected along with the drivers for this protection. Next, it summarizes important information assurance and security concepts, with a particular emphasis on risk. It continues with a characterization of storage security and concludes with practical guidance on starting a storage security program. Learning Objectives
• General introduction to storage security concepts
Self-encrypting Storage: Comparing Alternatives Data security is top of mind for most businesses trying to respond to the constant barrage of news highlighting data theft and security breaches. Combined with litigation risks, compliance issues and pending legislation, companies face a myriad of technology and products that all claim to protect data at rest. The disk drive industry has launched innovative, simple and powerful technology intended to secure data where it lives – in the disk drive. This tutorial will give storage users and managers a look at emerging drive-level encryption technology for laptops, PCs, and data centers that provides a secure storage foundation and compare that technology with alternative storage encryption methods, including: host-based, appliance, network fabric, and controller-based. Learning Objectives
• High-level understanding of the various methods for encrypting storage, including self-encryption
Introduction to Key Management for Secure Storage As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective key management policies. Without the proper generation, distribution, storage, and recovery of key material, valuable data will be eventually compromised. Worse, without proper management of key information, data can be completely lost. This session explores the fundamental issues and technologies that impact key management for disk, tape, array, and other storage devices. Major issues associated symmetric encryption keys are presented, along with practical advice on effective key management issues and practices. Learning Objectives
• Become familiar with basic cryptographic key terminology.
An Inside Look at Imminent Key Management Standards
• Discover the background of existing key management standards, including OASIS KMIP and IEEE P1619.3
Legal Issues Relevant to Storage This session describes the legal issues storage security professionals are likely to encounter as part of their role as the focal point for securing storage systems. Learning Objectives
• General introduction to the relevant legal issues
How E-Discovery Will Affect Your Life as a Professional
• This session helps the storage professional understand the new Federal Rules of Civil Procedure (FRCP) that were recently updated.
Cloud Storage Security Introduction Introduction of computing and data services in a virtualized and service provider context exposes the customer's information to a new set of threats and vulnerabilities. This session provides an introduction to those threats and what techniques are available to mitigate the threats. Learning Objectives
• What threats are there to the privacy and accuracy of my data in a cloud implementation?
Cloud Storage Securing CDMI With SNIA’s publication of the Cloud Data Management Interface (CDMI) specification, cloud storage implementations can now offer a standard set of features and capabilities. Security is part of this feature set and some believe that it is a make-or-break element of cloud storage, and cloud computing in general.
This session will overview the security of the new CDMI standard, which includes protective measures employed in the management and access of data and storage. These measures span transport security, authentication, authorization and access controls, data integrity, sanitization, data retention, protections against malware, data at-rest encryption, and security capability queries.
• Understand which security issues are considered critical to cloud storage |
LoginFeatured Events
|

