The rise of public cloud computing has brought with it a new set of security considerations that are not widely understood. With a unique perspective from working on the security systems of a public cloud, Mark describes public cloud service provider and cloud customer threats, including malicious insiders, shared technology, data breaches, and data loss. For each, he assesses the risks and explores the value of mitigations like encryption-at-rest, encryption-in-flight, and other security best practices, separating hype from reality so that you can make educated decisions as your organization moves to the cloud.
Join this session to learn how Microsoft IT is successfully managing the Application lifecycle in their System Center 2012 Configuration Manager R2 environment with zero touch. Deep technical overview on how Microsoft IT automates LOB application publishing by leveraging System Center Orchestrator, Configuration Manager cmdlets, PowerShell scripts, and Team Foundation Server. This session covers the key stages of the application lifecycle for Windows 8.1, Windows Phone, Windows RT, and iOS – starting with Application object creation, deployment, supersedence, and ending with the retirement/removal of the application object from the environment—all this without the administrator having to lift a finger.