Thursday, March 26 
7:45 AM – 8:45 AM Continental Breakfast 
8:45 AM – 9:00 AM Opening Remarks from the Chair
Pete Lindstrom, Research Director, IDC
9:00 AM – 10:00 AM Lessons Learned from Implementing Cloud-Based
Web Access Protection
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
•
What drove our need to look at cloud based secure web gateways
 •
What benefits are cloud based secure web gateways providing their Customers
 •
What to consider when looking at cloud based protections for web access
 •
How to leverage cloud based protections when integrating acquired companies
 •
Lessons learned from implementing a hybrid solution
 
10:00 AM – 11:00 AM Building Trusted Clouds
Steve Orrin, Chief Technologist, Intel Federal
•
Evaluate the trust/security properties that can be provided by a CSP or in their Private Cloud
 •
How to use emerging cloud and virtualization technologies to provide workload policy controls and Data Protection 
 •
Leverage trust based technologies and solutions in their cloud usage to help achieve compliance and policy requirements
 •
Audit and report on Cloud Trust and Security 
 •
Better define policies for cloud based workloads and transactions
 
11:00 AM – 11: 15 AM Refreshment Break
11:15 AM – 12:30 PM Legal Developments in the Cloud 
Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
•
How regulations like HIPAA, Gramm-Leach-Bliley and the FTC are impacting and limiting service adoption
 •
How tools like encryption and other offerings are helping companies manage compliance and enterprise risk
 •
Practical concerns to deploying enterprise-wide solutions where users or data subjects may reside in the EU or other heavily regulated countries
 •
How to develop an enterprise-specific checklist to address legal and business risks during the cloud contracting process 
 
12:30 PM – 1:30 PM Networking Luncheon
1:30 PM – 2:30 PM Your Cloud Security Gateway - Visibility and Control for Cloud Architectures 
Pete Lindstrom, Research Director, IDC
This session will describe the new product category that aims to provide:
•
Policy enforcement
 •
Activity monitoring
 •
Content monitoring (dlp)
 •
And encryption to enterprise cloud apps
 
2:30 PM – 2:45 PM Refreshment Break
2:45 PM – 3:45 PM How Secure is the Cloud?
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources
•
Learn the top 4 things everyone needs to know about the cloud before jumping in
 •
Learn why the current cloud environment is a tumultuous storm waiting to happen
 •
Find out why the big companies are slow to adopt the cloud
 •
3 things to consider before you find yourself in the cloud of regulatory hell
 •
Learn what future technologies will have a major impact on cloud security, and why the cloud will become the safest storage platform in history
 
3:45 PM – 5:00 PM Panel Discussion
Moderator: Pete Lindstrom, Principal, VP of Research, Spire Security, LLC
Panelists: Gerard M. Stegmaier, Esq., Partner, Privacy & Data Security, Goodwin Procter LLP
Steve Orrin, Senior Security Architect and Principal Engineer, Intel Corporation
Ed Pollock, CISSP-ISSMP, CISM, CISO, STERIS Corporation
Paul Lewis, Vice President, Information Security and Data Forensics, T&M Protection Resources
5:00 PM – 6:00 PM Cocktail Reception