HomeAgenda DetailsSpeaker RosterVenue & HotelExpo DetailsRegistration Details

Thursday, March 26 
7:45 AM – 8:45 AM Continental Breakfast 

8:45 AM – 9:00 AM Opening Remarks from the Chair
Pete Lindstrom, Research Director, IDC

9:00 AM – 10:00 AM Lessons Learned from Implementing Cloud-Based
Web Access Protection
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
What drove our need to look at cloud based secure web gateways
What benefits are cloud based secure web gateways providing their Customers
What to consider when looking at cloud based protections for web access
How to leverage cloud based protections when integrating acquired companies
Lessons learned from implementing a hybrid solution

10:00 AM – 11:00 AM Building Trusted Clouds
Steve Orrin, Chief Technologist, Intel Federal
Evaluate the trust/security properties that can be provided by a CSP or in their Private Cloud
How to use emerging cloud and virtualization technologies to provide workload policy controls and Data Protection 
Leverage trust based technologies and solutions in their cloud usage to help achieve compliance and policy requirements
Audit and report on Cloud Trust and Security 
Better define policies for cloud based workloads and transactions

11:00 AM – 11: 15 AM Refreshment Break

11:15 AM – 12:30 PM Legal Developments in the Cloud 
Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
How regulations like HIPAA, Gramm-Leach-Bliley and the FTC are impacting and limiting service adoption
How tools like encryption and other offerings are helping companies manage compliance and enterprise risk
Practical concerns to deploying enterprise-wide solutions where users or data subjects may reside in the EU or other heavily regulated countries
How to develop an enterprise-specific checklist to address legal and business risks during the cloud contracting process 

12:30 PM – 1:30 PM Networking Luncheon

1:30 PM – 2:30 PM Your Cloud Security Gateway - Visibility and Control for Cloud Architectures 
Pete Lindstrom, Research Director, IDC
This session will describe the new product category that aims to provide:
Policy enforcement
Activity monitoring
Content monitoring (dlp)
And encryption to enterprise cloud apps

2:30 PM – 2:45 PM Refreshment Break

2:45 PM – 3:45 PM How Secure is the Cloud?
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources
Learn the top 4 things everyone needs to know about the cloud before jumping in
Learn why the current cloud environment is a tumultuous storm waiting to happen
Find out why the big companies are slow to adopt the cloud
3 things to consider before you find yourself in the cloud of regulatory hell
Learn what future technologies will have a major impact on cloud security, and why the cloud will become the safest storage platform in history

3:45 PM – 5:00 PM Panel Discussion
Moderator: Pete Lindstrom, Principal, VP of Research, Spire Security, LLC
Panelists: Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
Steve Orrin, Senior Security Architect and Principal Engineer, Intel Corporation
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources

5:00 PM – 6:00 PM Cocktail Reception
Summit Chair 













Pete Lindstrom, Research Director, IDC

Top-notch training. Compelling speakers. Meaningful interactions.
Register for the 2015 Infosec Conference
Join the conversation using #InfoSecWorld
Contact Us


Registration/General Inquiries:
Customer Service
(508) 879-7999 ext. 501
[email protected]

Speaking Opportunities:
Katherine Teitler
Director of Content Development 
[email protected] or (508) 532-3624

Exhibit Sales:
Vendors A-L
CJ Oliveri
Director of Sales, Conference Division
[email protected] or (508) 532-3609

Vendors M-Z
Howard Weinman
Director of Sales, Conference Division
[email protected] or (508) 532-3652