Transformation Week: Day Two - 13th October

A full overview for all sessions taking place on the first day of Transformation Week. Links to individual sessions are provided below.

Keynote: Securing the cloud – balancing the risks and benefits

Time: 10:00 – 11:00

Synopsis: John Godwin, UKCloud’s Director of Compliance and Information Assurance, will assess how information security, data protection and cloud resilience considerations need to be assessed during cloud transformation journeys, as well as the ongoing management of virtual environments. Supported by references to relevant standards and supporting frameworks, John will explore how the early detection of risks and the deployment of appropriate security controls can significantly contribute to the optimum protection for cloud-based workloads.

Secure Cloud Connectivity

Time: 11:00 – 12:00

Synopsis: In this session, Neil Fagan, CTO National Security at CISCO, focuses on securing the journey to the cloud and within the cloud. Starting with some of the key themes and trends in networking and cyber security, Neil will then follow up with explaining and discussing software defined networking (SDN) and its applicability within the cloud journey.  Finally, the session will conclude with key points on building a consistent operational model, moving to a predictive environment, and moving from a threat centric to zero trust environment and then into continuous authentication and a broader “SASE” (secure access service edge) architecture.

Considerations for personal data in the cloud

Time: 12:00 – 13:00

Synopsis: Join Dean Wicks MCIIS, Principle Information Assurance & Cyber Security Consultant at Amethyst Risk, as he explores the critical considerations and recommendations for storing and processing medical, personal and physiological data in the cloud.

Secure Cloud vs. Cloud Security

Time: 15:00 – 16:00

Synopsis: The shared responsibility model means that the adoption of a Secure Cloud service is a necessary first step, however this in itself is insufficient to effectively consume cloud services.  Consumers still need to consider Cloud Security for workloads running in these such environments.  Join VMware for a discussion on what steps both providers and consumers of cloud service should consider to achieve acceptable risk management levels for their respective organisations.