Webinar on Common Mistakes and Learnings in Securing Cloud Based Applications

Page 1

Cloud-based applications are designed to be distributed and scalable, benefiting from elastic infrastructure (processing, memory and storage). Applications built for the cloud are increasingly architected based on the principle that hardware failure may happen. Cloud based application security remains a top concern for various organizations, as security threats to these applications can cause financial / data loss, downtime or reputation damage. If your enterprise is using cloud application already or on its journey of cloud adoption, this session will help you to understand how you can secure your application and data outside of your firewall. In this webinar, you will learn about: Security Considerations for Cloud Applications and Platforms Understand risk associated with cloud application and infrastructure Best practices to reduce risks with cloud based applications Who Should Attend? Software and security architects Technical managers Software developers IT security professionals DateWed, October 9th, 2013 Time11.30 am - 12.15 pm EST PresentersJaykishan Nirmal, Practice Head, CISSP, CSSLP, CISA Webinar URL http://www.aujas.com/webinar/2013/oct/index-us.html


About Aujas Aujas is a Global Information Risk Management (IRM) services company. We provide technology life-cycle services including strategy and design, control integration, sustenance and optimization services in the area of information risk. Our objective is to offer effective IRM services on business and technical issues. REGISTER NOW Š 2013 Aujas. Know more - Solutions for Data Protection, Identity management and access management


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.