Vote for VMworld Session 5480: Managing Risk in the Cloud with Highly Secure Workloads

April 29, 2013 by Diana Nolting

Voting for VMworld 2013 sessions run through Monday, May 6th at 5 p.m. PDT.  Below is a highlight of one of Bluelock's recommmended sessions for voting.  Please vote by visiting Users must register a free account to vote. 


Session #5480: Managing Risk in the Cloud with Highly Secure Workloads

with Deloitte & Touche LLP and Bluelock 


As a Senior Manager at Deloitte, Krishna Marella has seen first-hand how the IT world has changed recently and how companies are dealing with a convergence of technology and services, which are constantly evolving. Security and risk management need to keep up with those evolutions; especially as the frequency and publicity of attacks on IT are increasing and becoming more sophisticated. Customer expectations around protection of data are higher than they ever been and security is a bigger focus for the entire business than it has ever been. 

What industry a customer is in determines a lot of the more common threats and there are trends in what problems customers are asking for help solving. Customers are interested in managing risk specifically related to logging and monitoring, three different types of firewall connections and increased network visibility.


Cloud can add risk, or it can help remove risks the company is already exposed to, depending on how it is used. Companies can manage risk along the way through unique solutions like cloud-based recovery, encryption-in-flight and encryption-at-rest and can mitigate risk by leveraging geographically-separated environments. Bluelock Chief Technology Officer Pat O’Day will share use cases in which cloud helped mitigate risk and protect applications.


What you will learn: 


<- IT has changed and companies are dealing with a convergence of technology and services, which are constantly evolving. Customer expectations around data protection are higher than they ever been.


- Your industry determines a lot of the threats that can come at you. There are trends in what customers are asking for including data encryption at rest, logging and monitoring and network visibility.


- Cloud can either add risk, or it can help mitigate risk the company is already exposed to through cloud-based recovery, encryption and meeting higher compliance standards.




Krishna Marella, Senior Manager at Deloitte & Touche LLP 

Krishna is a seasoned information security and risk management professional with over 12 years of progressive management and leadership experience. He has provided a wide array of information security consulting services at Deloitte in areas such as information security strategy, cyber threat management; secure SDLC, custom application security, data protection, cloud security and identity and access management. Prior to joining Deloitte, Krishna has served in various software development and system architecture roles. He has a strong technical background that is characterized by years of programming and software engineering experience towards development of commercial software and design & implementation of internet portals. Krishna has a M.S. degree in Electrical and Computer Engineering from Michigan State University. He is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP). His professional areas of interest include cloud computing and next generation technologies.


Pat O'Day, Chief Technology Officer at Bluelock 

Bluelock’s Chief Technology Officer, Pat O’Day helps position the company and its strategy in the ever-evolving infrastructure-as-a-service space. He collaborates with partners, clients and engineering to maintain Bluelock’s innovative position as a customer-focused, holistic cloud provider. O’Day’s leadership experience includes roles in Enterprise IT, traditional datacenter and IT service organizations.