(Cloud) Access Risks

  • TYPE: Combined Session DATE: Thursday, April 19, 2012 TIME: 11:30-12:30 LOCATION: Galerie

Managing Cloud Computing Access Risks

Today’s cloud architecture increases the risk of access to a company’s critical data, such as intellectual property, personal privacy information, cardholder data, health information, financial data, etc. As a result, companies are asking themselves how do they ensure that their organization's most critical information is in the hands of the right individuals and that they're doing the right things with it?

During this panel session, we’ll outline what organizations need to do to identify, quantify, and manage the risk of information access in the cloud environment. We’ll discuss how companies need to determine what information presents the greatest risk and what access issues are the source of this risk. Next, learn how to present this information to your business colleagues in terms they understand, so that they know how this impacts the business. They must be able to translate this risk into underlying security issues and deconstruct the elements to identify the source of the risk and determine how to manage it. Simply identifying and quantifying the risk is not enough if you can't explain how to remediate and manage the risk. We’ll also explore the access assurance steps and automation needed to increase access controls to prevent future occurrences.

After this session, attendees will be able to:

  • define the practical steps needed to identify, quantify, and manage the risk associated with access in the cloud;
  • identify cloud access policies, the detective controls to continuously monitor risk and its source, the ability to remediate problems, and the preventative controls to better control risk moving forward;
  • analyze the elements of access risk and summarize why this should be among the top areas of concern for security professionals;
  • discuss how to effectively communicate access risk to business without slowing the business drivers of cloud migration; and
  • describe how to partner with business, audit, security, and cloud providers to create an effective cloud access assurance strategy.

Log in to download the presentation:  


As an infrastructure architect in the enterprise networking field since 1994, Bruce possesses in-depth experience in all facets of Identity & Access Management which include enterprise provisioning, access certification, password and credential management, as well as privileged access...

Deepak Taneja is the Founder and CTO of Aveksa, a security compliance software company. Prior to founding Aveksa, he was CTO and VP of Engineering at Netegrity. In this role, he was instrumental in growing the company into the market leader in Identity and Access Management. Previously he...


Session Links


European Identity & Cloud Conference 2012

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • Apr 17 - 20, 2012 Munich, Germany