Attendees of the Dec. 4 Content Protection Summit (CPS) in Los Angeles will walk away better informed on the industry’s state of cloud security, thanks to a pair of breakout sessions from IBM Security and Convergent Risks.
First up, Andrew Lemke, North America cyber resiliency technical solution leader for IBM, will offer the two-part presentation “Secure Journey to the Cloud,” with the main stage portion tackling the unique security challenges of cloud environments, and the breakout session offering ideas on where organizations should focus their resources first, to gain the biggest, immediate reductions in risk.
“We understand that a complete security program is required to maintain confidentiality, integrity and availability of our critical data and the infrastructure that holds it,” the session description reads. “In this breakout session we will look a little deeper.”
Following Lemke’s discussion, the Convergent Risks’ team will have the discussion “Towards a Common Goal – Ensuring Security in Cloud Environments,” where Chris Johnson, president and CEO, Janice Pearson, VP of global content protection, and advisor Mathew Gilliat-Smith will go over the security pitfalls that await companies without the right cloud workflow configurations and security, including unrestricted access, weak encryption, exposed keys and more.
There are three logical phases to cloud security, Gilliat-Smith said: First is discovery — what problems are you trying to solve? Second is design — strategies to embed security principles to the problems you are trying to solve. Third is implementation — educating your security teams to take action to embed security processes throughout while continually evaluating your landscape.
“This session will share examples of common security issues experienced in cloud workflows and the methodology for determining which of the many security standards and best practices suit your business best, as well as how to make sure you are following them correctly.,” he said. “Research shows that for some, security is not a significant factor when choosing a cloud provider or when selecting a piece of technology.
“Regardless of the cloud service model or provider, the security of your organization’s data in the cloud should remain your responsibility even if you decide to transfer some of the risk. You will come away from this session with a better understanding of how to tackle these issues.
The Content Protection Summit is produced by the Media & Entertainment Services Alliance (MESA) and Content Delivery & Security Association (CDSA), and is presented by SHIFT, with sponsorship by IBM Security, NAGRA, Convergent Risks, LiveTiles, Richey May Technology Solutions, EIDR, the Trusted Partner Network (TPN) and Darktrace.