What is needed in the Next Generation Cloud trusted platform? (RSA Conference)

The most important engineering pillar in the cloud security ecosystem is how you build a trusted platform. It is more than just 2FA and encrypting all data. We will walk through some next generation thinking in Google’s vNext cloud security pillar and how you should look at the cloud security stack layers to ensure you truly have a trusted platform for next generation applications and data.

Detailed Presentation :

(Source : RSA USA 2017)

Speaker :

David B. Cross

David Cross holds a B.S. in computer information systems as well as an MBA with a management information systems concentration and is a longtime advocate of security application and technology stemming back to his military service when he first started his work in encryption, information protection and analysis of data with his five years’ active duty service with the aviation electronic warfare community of the United States Navy. Cross is the Cloud Security Engineering Director in the Google Security and Privacy organization. and he spent his previous 18 years with Microsoft in numerous security product and engineering leadership roles. In addition, Cross has been a contributing Author on a number of whitepapers and Microsoft Press books regarding security and PKI.

8669813678?profile=original

Pre Register For SACON -  India's First Security Architecture Conference

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.

>>Click Here To Pre Register & Avail Special Discounts

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)