Grace Hopper Annual Conference Schedule


Cloud Security: Presentations

October 14 2:15 pm-3:15 pm
361 A Level Three GRBCC
TRACK: Security/Privacy
Presentation / Lightning Talk
Security in cloud based integration solutions
2:15 PM - 2:30 PM
LEVEL: Beginner

Participants will understand how to build in security and compliance aspects into a Cloud based integration solution. Focus on 3 elements around cloud security:
•Securing information – addressing aspects like data privacy in the cloud and safeguarding information
•Securing interaction –how to securely connect to your on-premise landscape when you need to connect it with the cloud
•Securing identity – touching on identity management and SSO in a hybrid landscape

Journey to the Cloud
2:30 PM - 2:45 PM
LEVEL: Intermediate

Cloud computing has changed the way of life for both enterprises and consumers. This talk discuss Goldman Sachs’ journey and highlights the security concerns that are evident with public cloud adoption in regulated industries (e.g. Financial Services), with particular focus on infrastructure-as-a-service offerings and related threats. This talk will further discuss strategies for adopting cloud service providers and designing, developing, and deploying applications that will operate in the cloud

Cloud Security from the Inside
2:45 PM - 3:00 PM
LEVEL: Beginner

Security is often cited as the #1 barrier to adoption of the cloud, but many cloud consumers and builders have not taken a thorough look at how security concerns change when moving to the cloud. This talk examines the risks of cloud security in the context of the alternatives and as compared to another human endeavor that transitioned from a decentralized model to a centralized one: banking and financial services.

An Overview of DDoS Impact on Cloud Performance
3:00 PM - 3:15 PM
LEVEL: Intermediate

In this work, we focus on the impact that Distributed Denial of Service (DDoS) attacks can have on performance in Cloud environments and present a summary of defense and mitigation strategies that are available for the industry to implement. We begin by providing a short background on DDoS attack types and then dive into the details of DDoS attack related performance degradation in the Cloud.