SANS WhatWorks in Virtualization and Cloud Computing Summit with Tom Liston, Washington DC, August 19-20

As security professionals, we work in an environment that never stops
changing.  New technologies and innovative new uses for old technologies
seem to appear every day.  Unfortunately, along with the benefits that
every new technology brings, there are new and novel security challenges
that need to be addressed. We’re forced to constantly learn just to keep

Two of the newest and most dynamic areas in Information Technology are
virtualization and cloud computing.  Unless you’ve been living under a
rock for the past few years, your organization is either currently
deploying or planning to deploy these technologies — and you’ve been
trying to figure out what it all means from a security perspective.

Virtualization is everywhere, from the desktop to the datacenter.  Cloud
computing has transformed our datacenters into flexible, elastic
environments that expand and contract to meet our needs.  Data storage
and computing “in the cloud,” has changed our ideas about what
infrastructure really means.

These technologies are being rolled out at a staggering pace in
organizations across the world.  The benefits of having a virtual
infrastructure are unquestionable: lower costs, flexibility, energy
conservation, scalability and reliability, just to name a few.  But what
really is the impact on security?  Do these new technologies make our
networks more secure, less secure, or are they just “different?”

You have questions, and you’re not alone.  Like any new technology, it’s
difficult to separate fact from fiction — reality from marketing hype
— and the media and vendors are of little help.  Where can you go to
find comprehensive, up-to-date answers that go beyond marketing and
truly get to the heart of these new technologies?

Once again, SANS is gearing up for its Virtualization and Cloud
Computing Summit, August 19-20 in Washington DC.  For the past two
years, the Summit has provided a forum for getting past the hype and
answering the questions that security professionals need answered.
Focusing on information you can use when you walk out the door, the
summit format combines topical expert presentations with end-user talks
where your peers who are already working with these technologies explain
both what they did “right” and how to avoid the pitfalls they
discovered.  We even bring in the vendors (and warn them to leave their
marketing-speak at home) so you can hear about what’s just over the

Having acted as conference chair since the Virtualization and Cloud
Computing Summit’s inception, I believe that the summit format offers
participants an unparalleled opportunity to truly learn the information
that they need in a way that they can put to use immediately.  You won’t
be just sitting back and listening: the Summit format is designed to
break down the wall between the presenters and the participants,
encouraging questions and discussion that get you the answers that *you*
need. Every session is unique — filled with interaction, discussion,
and the kind of back and forth dialogue that you won’t find anywhere
else.  You are guaranteed to walk away from the Summit with all your
questions answered.

Here’s what some previous attendees had to say:

“Industry Leaders…discussing leading edge security issues…that’s why
I’m here.” – Major Doug Harold, Information Protection Officer, Canadian
Air Force.

“Finally, a conference dealing with real world security issues
organizations need to confront when moving virtualization into
production environments.” – Iben Rodriques, 4BaseTech

“The event was packed with useful information, speakers, and peer level
dialogue.” – Russell Wood, CenlarFSB

Join us at the Fairmont Washington DC on August 19th and 20th.  Bring
your questions, bring your security problems, and get ready for answers.
Hope to see you in DC!

Tom Liston

SANS Institute’s Virtualization and Cloud Computing Security Summit
Senior Security Analyst
InGuardians, Inc.

The most trusted source for computer security training, certification, and research

Be the first to comment

Leave a Reply

Your email address will not be published.


error: Content is protected !!