Three security issues loom large over the future of Cloud Computing: 1) Will corporate IT security policies still apply to the applications and services delivered via the cloud? 2) How will a CIO prove to management and clients that the company’s applications and services are as secure as before the cloud and meeting all SLAs? 3) Will security be robust enough to pass any compliance audits required? Only when each of these 3 concerns can be answered with a resounding “YES!”, will cloud computing be finally considered secure. Meanwhile, what will IT leaders and vendors have to consider, change, revamp, or manage differently in order to achieve this end goal?
Elayne Starkey, CSO, Department of Technology and Information (DTI), Delaware
Elayne Starkey is the Chief Security Officer for the State of Delaware/Department of Technology and Information (DTI) and responsible for the protection of information assets from high consequence events, including cyber and physical terror... More View all posts
Elayne Starkey is the Chief Security Officer for the State of Delaware/Department of Technology and Information (DTI) and responsible for the protection of information assets from high consequence events, including cyber and physical terrorism, and natural disasters. Elayne is the Chair of the Delaware Information Security Officer Team and member of the Governor’s Homeland Security Council. She has been a member of the Multi-State Information Sharing and Analysis Center (MS-ISAC) since it was founded in 2003. She is a member of the MS-ISAC Executive Board and a past co-chair of the Education and Awareness work group. Elayne is also a member of National Association of Chief Information Officers (NASCIO) Security and Privacy Committee, the Information Systems Security Association (ISSA) and a 2011 Computer Week’s Federal 100 winner. Elayne was previously the Chief Technology Officer at DTI and the Chief Information Officer for the Delaware Department of Public Safety. Elayne has private sector software engineering experience at Xerox Corporation in Rochester, NY and Perdue Farms Inc, in Salisbury, MD. Elayne holds a Bachelors of Science degree in computer science, math, and business administration from James Madison University and a Master’s degree in Computer Science from Rochester Institute of Technology with concentrations in Software Engineering and Data Communications. Less View all posts
Dan Lohrmann, CSO, Department of Technology, Management & Budget (DTMB), Cybersecurity & Infrastructure Protection, State of Michigan
Daniel J. Lohrmann (Dan) is an internationally recognized security leader, technologist and author. He is best known for his refreshingly practical commentary on technology and clear advice on computer security and ethics for home and work.... More View all posts
Daniel J. Lohrmann (Dan) is an internationally recognized security leader, technologist and author. He is best known for his refreshingly practical commentary on technology and clear advice on computer security and ethics for home and work. When people want to know how cybersecurity or technology infrastructure really works within state and local governments, they turn to Dan Lohrmann. Over the past twenty-five years, he has served public and private sector organizations which span the globe in a diverse set of technology and security leadership roles. He currently serves as Chief Security Officer (CSO) over both physical and cybersecurity in Michigan government. Mr. Lohrmann's new book is “BYOD for You: The Guide to Bring Your Own Device to Work.” Dan's first book was: "Virtual Integrity: Faithfully Navigating the Brave New Web." He has published articles and papers on security, infrastructure, customer service, cloud computing, bring your own device to work (BYOD), and social media in major technology and business magazines. Dan is also a global conference speaker on many security and technology topics, and he has been a keynote speaker at conferences from South Africa to Moscow and all over the USA. Lohrmann has received numerous professional awards including CSO of the Year, Public Official of the Year and Computerworld Premier 100 Leader. As Michigan CSO & Deputy Director for Cybersecurity & Infrastructure Protection (CIP), he leads the Michigan Cyber Initiative, which was launched by Governor Snyder at the 2011 Michigan Cyber Summit. Dan is also a lead on several federal Department of Homeland Security (DHS) committees and National Governors Association (NGA) efforts in cybersecurity. Dan began his career as a computer systems analyst at the National Security Agency (NSA), and he served in England for seven years in a variety of private sector leadership roles. He is a Certified Chief Information Security Officer (C/CISO). Less View all posts