The rise of public cloud computing has brought with it a new set of security considerations that are not widely understood. With a unique perspective from working on the security systems of a public cloud, Mark describes public cloud service provider and cloud customer threats, including malicious insiders, shared technology, data breaches, and data loss. For each, he assesses the risks and explores the value of mitigations like encryption-at-rest, encryption-in-flight, and other security best practices, separating hype from reality so that you can make educated decisions as your organization moves to the cloud.
Security and Compliance are two of the biggest concerns for businesses who are looking to migrate workloads to the public cloud. Businesses can take advantage of Configuration Manager 2012 R2 (ConfigMgr) and Security Compliance Manager (SCM) to keep their Azure VMs in 'green' state while reducing the attack surface and security risks of their VMs. In this session we'll take a look at how to secure your Azure VMs using Endpoint Protection, maintain patch level using ConfigMgr 2012 R2 and how to meet your security compliance requirements using SCM and ConfigMgr Compliance Settings. Presenter: Andreas Wasita (Kloud)_x000D_
Windows 8 extends the security and isolation capabilities of Windows to help build a far more trusted application experience. In this session, get a review of the Windows features that have been evolving since Windows Vista, and culminating in a whole new level of application isolation in Windows 8 Applications.