Training

Cloud Security , Next-Generation Technologies & Secure Development

Legal Considerations About Cloud Computing

Legal Considerations About Cloud Computing
Organizations are leaping to embrace "cloud computing" - accessing virtualized resources via the Internet. But are they jumping too soon without weighing all the legal considerations regarding security and privacy? Register for this webinar to hear a government security leader's expert insights on:
  • e-Discovery and records retention challenges;
  • Security and privacy risks;
  • What it takes to ensure safe, secure cloud computing.

Background

Cloud computing is among the hottest topics in both the private and public sectors. Business and technology leaders are enamored with the notion of accessing virtualized resources via the Internet. Cloud's efficiencies promise to save significant money for organizations - and eventually consumers.

Yet, despite cloud's attractiveness, few government agencies especially have implemented any type of cloud computing initiative, mostly because of IT security concerns.

This session tackles those IT security concerns head-on, as David Matthews, Deputy CISO for the City of Seattle, discusses key legal considerations such as:

  • eDiscovery - Where is the data? Who owns it? If requested, how does one retrieve, analyze or protect this data?

  • Records Retention - Again, who is responsible for the data? How does one enforce retention rules, and who is responsible for the disaster recovery plan?

  • Pain Points for Organizations - including accessibility issues, confidentiality concerns, verification of data integrity, risk identification and mitigation, as well as insider threats from cloud provider staff.

Matthews also will provide a brief overview of cloud computing, and he'll conclude with a set of strategies and suggestions for successful, safe engagements in the cloud.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.