How will changes in European data protection regulation affect cloud providers and users? How will forensics look like in the Cloud? These are some of the topics discussed by 250 experts from science, industry and politics at the SecureCloud Conference 2012 from May 9-10, 2012 in Frankfurt. SecureCloud 2012 is the premier European educational and networking event on cloud computing security and privacy.
This year, the agenda is set to arm participants with information, guidance and recommendations on the most important issues in cloud security including mobile, legal and policy. The event is co-hosted and organized by the Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA), the Center for Advanced Security Research (CASED), the Fraunhofer Institute for Secure Information technology and the worldwide association of IS professionals ISACA.
The event will host a series of keynote presentations given by the foremost authorities and thought leaders in cloud security, including Robert Bohn, Reference Architecture Lead for the NIST Cloud Computing Program of Applied and Computational Sciences Division of NIST/ITL; Dr. Carl-Christian Buhr, European Commission and Cabinet Member for Vice-President Neelie Kroes; Billy Hawkes, Irish Data Protection Commissioner and Eran Feigenbaum Director of Security, Google Apps at Google. The format will allow for the opportunity for political and corporate decision-makers to learn first-hand how some of the most well-known and respected companies in the world are addressing cloud security through interactive sessions and networking events.
Dr. Carl-Christian Buhr, European Commission Cabinet Member of Vice-President Neelie Kroes, during his keynote, said he was pleased to hear that the CSA will be launching its certification framework, also announced today. The European Commission (EC) will include in the European Cloud Strategy document, which will be published this summer, an action on certification. The EC doesn't foresee any European mandatory certification scheme, but encourages and supports a market-driven, bottoms-up approach for security certification for cloud computing services and providers.
“Privacy and data protection are fundamental rights to the European citizens,” said Billy Hawkes, Irish Data Protection Commissioner. “Therefore, as a customer I should not have to worry about how companies process and store my data. On the other hand, small companies face a big challenge if they want to offer full transparency and accountability to their customers. Within the new EU data protection regulations we have to find ways to support companies, e. g., with certification systems for cloud providers they can rely on.”
“Cloud Computing already is a part of our daily life and work. But to securely unlock the full potential of this technology, scientists, cloud providers and users have to act in concert,” said Prof. Ahmad-Reza Sadeghi, Scientific Director at Fraunhofer SIT. “IT Security has become important for all new technologies. For Cloud Computing however, it is a precondition. The smallest technical inconsistencies or negligence can cause dramatic consequences. Companies need standardized guidelines and innovative solutions, therefore we have to further increase research and development in this area.“
“The European Commission has set out an ambitious digital agenda in its policy for cloud computing,” said Daniele Catteddu, Managing Director, EMEA for the CSA. “However, cloud computing needs to be more sufficiently addressed across the European legal frameworks and much further research needs to be done to address the challenges of European law on competition, network regulation and electronic commerce for clouds to operate in this market. It is our intention to bring these issues to light and provide a forum for collaboration and guidance to our participants.”The conference program will also include a focus on mobile cloud computing. With mobile computing experiencing tremendous growth and adoption, mobile devices are gaining significant power and dynamic capabilities. Personally owned and potentially insecure mobile devices are increasingly being used to access employers’ systems and cloud-hosted data. Conference speakers will provide information and research to help participants understand the critical need to secure mobile endpoints from a cloud-centric vantage point.
Oliver Küch | Fraunhofer-Institut
Further reports about: > Advanced Security Research > CASED > CSA > Cloud Computing > Cloud Security Alliance > Commission > Conference > ENISA > European Network > Google Research Award > ISACA > IT Security > Pervasive Computing > SecureCloud > Security Forum > information systems > mobile devices
#IC2S2: When Social Science meets Computer Science - GESIS will host the IC2S2 conference 2017
14.10.2016 | GESIS - Leibniz-Institut für Sozialwissenschaften
Agricultural Trade Developments and Potentials in Central Asia and the South Caucasus
14.10.2016 | Leibniz-Institut für Agrarentwicklung in Transformationsökonomien (IAMO)
Ultrafast lasers have introduced new possibilities in engraving ultrafine structures, and scientists are now also investigating how to use them to etch microstructures into thin glass. There are possible applications in analytics (lab on a chip) and especially in electronics and the consumer sector, where great interest has been shown.
This new method was born of a surprising phenomenon: irradiating glass in a particular way with an ultrafast laser has the effect of making the glass up to a...
Terahertz excitation of selected crystal vibrations leads to an effective magnetic field that drives coherent spin motion
Controlling functional properties by light is one of the grand goals in modern condensed matter physics and materials science. A new study now demonstrates how...
Researchers from the Institute for Quantum Computing (IQC) at the University of Waterloo led the development of a new extensible wiring technique capable of controlling superconducting quantum bits, representing a significant step towards to the realization of a scalable quantum computer.
"The quantum socket is a wiring method that uses three-dimensional wires based on spring-loaded pins to address individual qubits," said Jeremy Béjanin, a PhD...
In a paper in Scientific Reports, a research team at Worcester Polytechnic Institute describes a novel light-activated phenomenon that could become the basis for applications as diverse as microscopic robotic grippers and more efficient solar cells.
A research team at Worcester Polytechnic Institute (WPI) has developed a revolutionary, light-activated semiconductor nanocomposite material that can be used...
By forcefully embedding two silicon atoms in a diamond matrix, Sandia researchers have demonstrated for the first time on a single chip all the components needed to create a quantum bridge to link quantum computers together.
"People have already built small quantum computers," says Sandia researcher Ryan Camacho. "Maybe the first useful one won't be a single giant quantum computer...
14.10.2016 | Event News
14.10.2016 | Event News
12.10.2016 | Event News
25.10.2016 | Earth Sciences
25.10.2016 | Power and Electrical Engineering
25.10.2016 | Process Engineering