Cloud Security Alliance Call for Papers: Secure Cloud 2012

SecureCloud 2012 is a premier educational and networking event on cloud computing security and privacy, hosted and organized by Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA), CASED/Fraunhofer SIT and ISACA, four of the leading organisations shaping the future of cloud computing security.

SecureCloud 2012 is the only European conference to focus specifically on cloud computing security. It provides a unique opportunity for political and corporate decision-makers, CEO, CTO, CISOs, business leaders, and information security practitioners not only to learn, but also to make important global contacts and to participate in interactive strategy sessions with high level experts in cloud computing security. SecureCloud 2012 will have a special focus on the legal and policy aspects of cloud computing security.

We invite proposals for presentations, panels, or sessions, by thought leaders and experts from industry, academia and government. Proposals should have a specific focus on security aspects of cloud computing and we encourage submissions that focus on practical implications - for example by looking at real-world applications, realistic scenarios or implications for businesses or governments.

Proposals should be submitted by 1/20/2012 according to the guidelines below. You can obtain more information about the conference and submit a proposal by using the form on the Proposal Submission tab on the following page:

Unsubscribe to CSA Announcements by clicking here.

Best Regards,

Luciano "J.R." Santos
Research Director, Cloud Security Alliance

Proposal Information

We encourage proposals for presentations, panels, or sessions on topics including but not limited to:

Legal and policy aspects of cloud computing security
Implications and interpretation of relevant current legislation.
Potential changes in European data protection law and their implications for cloud computing and vice-versa.Implications of forthcoming changes in cybercrime law for cloud computing and vice versa.
Accountability and personal data processing.
Law enforcement and forensics in cloud environments.
Cloud computing agreements (comparison).
Liability regimes in cloud environments and their implications for information security.
Procurement and contractual guidelines to enhance security (for govs, and SMEs for example).
Coping with international differences in relevant data protection and privacy regulations.
Legal impact/value of certification frameworks for cloud computing.
Identity and access management in the cloud: legal aspects.
Cloud-centric regulatory compliance issues and mechanisms
Incident and data breach reporting schemes for cloud computing
Security aspects of cloud computing as a policy tool – e.g. business incubator clouds.
European or global cloud computing strategy.
The role of cloud computing in the context of CIP (Critical Infrastructure Protection) and CIIP (Critical Information Infrastructure Protection).
Cloud computing as a tool in resilient architectures, disaster and incident response and recovery including mutual assistance schemes using cloud computing.
The role of cloud computing in supporting social aspects of disaster recovery.
Managing security benefits and risks of cloud computing
Higher assurance cloud computing:
High assurance requirements and cloud technology for implementing them.
Setting security parameters in cloud SLAs and monitoring them.
Flexible and tiered levels of security and their pricing models (pay security as you go).
A comparison of different security classification regimes e.g. flexible vs tiered/predefined security levels.
Governance and assurance processes:
Governance, assurance, maturity and certification frameworks for cloud computing
Assurance across the cloud supply chain
Security policy enforcement and security testing in the cloud.
Data classification in cloud computing
Cloud computing security and resilience metrics
Business continuity and resilience for cloud computing customers
Security of cloud technologies:
Security of virtualisation
Secure computation in an outsourced environment
Security for emerging cloud programming models and PaaS
User interface and client-side risks and their mitigation
Security technologies:
Edge networks and client-based cloud applications
Identity, credential, key, and access management in cloud computing
Trust and policy management in clouds
Network security (DOS, IDS etc.) mechanisms for cloud contexts
End-to-end security and data confidentiality for customers (from the cloud to thin clients such as smartphones, tablets).
Security technologies and services in the cloud (HSM's, web filters, firewalls, IDSs etc.).
The use of trusted computing modules in clouds.
Trusted computing aspects
Standards to enhance cloud security, reduce lock-in and improve business continuity.
Other cloud computing risks and their mitigation

General guidelines

Proposals cutting across the above topics are also encouraged.
Proposals, presentations, panels, or sessions must be in English and should provide a learning opportunity for the conference attendees.
In case a proposal is accepted, the author (or one of the authors) must attend
Proposals that focus on marketing or promoting a product or service will not be considered.
Proposals from marketing or PR professionals (external or internal) will not be considered.

Share this