Negotiating the Cloud Standards and Advice Jungle
- LANGUAGE: English DATE: Tuesday, November 05, 2013 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Cloud computing is one of three dimensions in which organizations are moving towards an economy based upon the interconnection of IT services ("The Open API Economy"). The success of this economy and hence of cloud computing depends on the availability of clearly defined interfaces; standards have a key role to play in achieving this.
Cloud services are built using a technical architecture that may include both proprietary and standard protocols and interfaces. Many of these standard protocols and interfaces are already available and indeed form the basis of cloud connectivity. However the services themselves have significant proprietary content and this can make the costs of changing provider high.
Join us in this webinar to get a brief overview on existing frameworks, standards, advice and certifications - and their relevance for your cloud initiatives.
Continuing Education Credits
After attending this webinar you will be able to:
- Explain why standards are important to cloud computing
- List the major standards and initiatives relating to cloud computing
- Identify the status of these standards and initiatives
- Describe the recommended action in relation to these standards
- Explain why standards for certification and attestation are important
This event qualifies for 1 Group Internet Based CPE
Prerequisites: None Advance Preparation: None Learning Level: Intermediate Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: email@example.com
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.