Главная
Study mode:
on
1
Introduction
2
Cloud Defined
3
Cloud Providers
4
Why is the rush
5
IT on demand
6
Health care
7
Virtualization
8
Saving money
9
Migration challenges
10
Security challenges
11
Target
12
Data Security
13
Virtual Admins
14
Stealing a Data Center
15
Virtualization and Cloud Platforms
16
Challenges
17
Security Compliance
18
Media Freeze
19
PCI Compliance
20
Automated Closing
21
Administrative Controls
22
Key Management
23
Portable Encryption
24
Use Cases
25
Cloud Adoption
26
Secure Option
27
Configuration Management
28
Security gaps
29
Boundary control
30
Server integrity
31
Beer
Description:
Explore cloud computing and virtualization concepts in this 41-minute keynote address from BSides Columbus Ohio 2015. Delve into cloud definitions, providers, and the driving forces behind the rush to adopt cloud technologies. Examine the benefits of IT on demand and its impact on healthcare. Understand virtualization's role in cost savings and the challenges of migration and security. Investigate high-profile security breaches, data protection strategies, and the risks associated with virtual administration. Learn about various cloud platforms, compliance issues, and security measures such as media freeze and PCI compliance. Discover key management techniques, portable encryption, and use cases for cloud adoption. Address configuration management, security gaps, and server integrity in cloud environments. Conclude with insights on boundary controls and a lighthearted nod to beer.

Cloud and Virtualization Theory

Add to list