George GerchowJohn MutuskiJohn Pironti

Sponsored by

SumoLogic

Does Cloud Equal Better Security and Compliance?

Date: This event took place live on April 07 2016

Presented by: George Gerchow, John Mutuski, John Pironti

Duration: Approximately 60 minutes.

Questions? Please send email to

Description:

We're sure you've asked yourself this at least once in the last week...or maybe more. #TheStruggleIsReal

Agile development, speed, application-uptime, modern apps – the list of needs and wants from teams supported by security goes on and on. To help enable these teams meet these challenges quickly and efficiently, the cloud seems like the perfect fit. Yet, the thought of moving to the cloud makes some people a little uncomfortable – kind of like online dating.

This is where we come in! We’ve brought together two security industry experts and a leading security professional to talk about the pros and cons of moving to the cloud.

Join this unconventional webcast to:

  • Learn how to bake security in from the beginning of the application lifecycle
  • Focus on securing the data and ease storage location concerns
  • Realize your compliance checklist doesn't equal security
  • Learn how the Director of Information Security from Teladoc, Inc., made the decision to secure his PCI compliant data in the cloud with Sumo Logic

About John Mutuski, Director of Information Security – Teladoc, Inc.

  • 16 years as a information security professional, working in and for dozens of Fortune 100/1000 clients
  • Led a global security engineering team for Broadridge Financial, who processes more than $5 trillion in equity and fixed income traders per day
  • Now, overseeing the security program for the first and largest telehealth provider in the country

About George Gerchow, Director of Security – Compliance Products – Sumo Logic

As Sumo Logic's Director, Product Management for Security and Compliance, George Gerchow brings 18 years of information technology and systems management expertise to the application of IT processes and disciplines. His expertise impacts the security, compliance, and operational status of complex, heterogeneous, virtual and cloud computing environments. Mr. Gerchow's practical experience and insight from managing the infrastructures of some of the world's largest corporate and government institutions, make him a highly regarded speaker and invited panelist on topics including cloud secure architecture design, virtualization, configuration management, operational security and compliance. George was one of the original founders of the VMware Center for Policy and Compliance and he holds CISSP, ITIL, Cisco, and Microsoft Certifications. Mr. Gerchow is also the coauthor of Center for Internet Security QuickStart Cloud Infrastructure Benchmark v1.0.0 and is a Faculty Member for IANS Institute of Applied Network Security.

About John Pironti, President – IP Architects

John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 20 years. Mr. Pironti has a number of industry certifications including Certified in the Governance of Enterprise IT (CGEIT), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information System Control (CRISC), Information Systems Security Architecture Professional and (ISSAP) and Information Systems Security Management Professional (ISSMP). Mr. Pironti frequently provides briefings and acts as a trusted advisor to senior leaders of numerous organizations on information security and risk management and compliance topics and is also a member of a number of technical advisory boards for technology and services firms. He is also a published author and writer, highly quoted and often interviewed by global media, and an award winning frequent speaker on electronic business and information security and risk management topics at domestic and international industry conferences.