Security and Compliance Sessions at AzureCon 2015


imageThe AzureCon 2015 online conference was a outstanding success and I hope you had a chance to watch the keynote sessions in real time. The key note sessions into those such as Journey to the cloud with Scott Guthrie, Building apps with the intelligent cloud with Bill Staples, Transforming data into intelligent action with T.K. “Ranga” Rengarajan, and Infrastructure for the intelligent cloud with Jason Zander.

If you haven’t seen those sessions, I highly recommend checking out the recordings by clicking on the session on the AzureCon 2015 homepage.

There were plenty of sessions that weren’t keynotes, but well worth a look – especially in the areas of security and compliance. Since that’s what we’re all about here, I thought you might like a list of sessions on these topics:

If you want to know more before deciding on a session, here are the session descriptions and the presenters

Azure Platform security and compliance

Join this session for an overview of Azure security, including the strategy and the approach to meet the needs of highly-scalable, enterprise-class and hybrid workloads. It covers all of the key areas of security including identity security, network security, system security, data and key security, monitoring, response, compliance, and privacy.
Presented by: David Cross

New Azure Security Center helps you prevent, detect, and respond to threats

In this session, we will introduce a new Azure service that helps you prevent, detect and respond to threats with increased visibility and control over the security of your Azure resources and advanced analytics to identify attacks that might otherwise go undetected. Stay ahead of current and emerging threats with cloud security policies that enable you to recommend and monitor security configurations, easy deployment of integrated Microsoft and partner security solutions, and real-time security alerts that enable you to respond and recover from security incidents more quickly. Presented by: Sarah Fender

Encryption and key management with Azure Key Vault

Learn how to use disk encryption management for IaaS virtual machines and Azure Key Vault to help protect and safeguard your data to meet your organizational security and compliance commitments. Key Vault lets you store and control the keys and secrets that you use in your cloud application. Backed by FIPS 140-2 validated HSMs, it helps you reduce risks to your most important assets and achieve your compliance objectives, while balancing those needs with the scalability, availability, and agility benefits of the cloud. The Azure disk encryption solution lets you encrypt your IaaS virtual machine disks, including boot and data disks. The solution is integrated with Key Vault to help you control and manage the disk encryption keys in your Key Vault subscription, while ensuring that all data in the virtual machine disks are encrypted at rest in your Azure storage.
Presented by: Sumedh Barde and Devendra Tiwari

Financial services compliance in Azure

As the cloud platform with the largest compliance portfolio in the industry, Azure is committed to partnering with customers in their risk-management efforts through investments in trust and transparency. Driven by these principles, we are announcing today two new compliance programs tailored to the financial services industry.
Presented by: Alan Ross

Building secure virtual networks in Azure

Get a high-level overview of key network security features in Azure, see three examples of how these features can be layered to build secure networks in Azure and across hybrid connections to your on-premises network, and finally get a brief introduction to PowerShell commands for Network Security Groups and User Defined Routing.
Presented by: Jon Ormond

Azure façades for secure, hybrid applications

Discover an approach for using the Web Apps feature in Azure App Service to provide secured Salesforce and payment processors in on-premises services. In this session, you’ll learn how to move your security boundary to the external edge of your environment minimizing any surface area of attack. Use Salesforce in a HIPAA-compliant manner to reach your existing on-premises applications. This approach is also a solution that extends to help ensure PCI compliance with payment processing systems like Bluefin.
Presented by:  Tom Canter

Enjoy!

Tom
Tom Shinder
Program Manager, Azure Security Engineering
@tshinder | Facebook | LinkedIn | Email | Web | Bing me! | GOOG me!

image

Comments (0)

Skip to main content