5 steps to secure your cloud operations

By Kevin Jackson

Once considered marketing hype, cloud computing is now being used by organizations around the world to achieve business goals—and has been accepted as a critical operational component. While this IT service consumption option has become the new norm, there are still a lot of rational and well-founded data security concerns organizations must know how to handle. 

Join internationally recognized cloud security expert Kevin L. Jackson as he walks you through best practices for the cloud, and gives you valuable guidance on:

— Cloud security

— Data management

— Encryption key management

— How to evaluate cloud services providers

— Proper data classification


About the author

Kevin L. Jackson is a globally recognized cloud computing thought leader and an (ISC)2 Certified Cloud Security Professional instructor. He has also been recognized as a “Top 100 Cloud Computing Experts on Twitter”, a “Top 100 Cybersecurity Influencer and Brand” and a “Top 50 Federal IT Blogger”. His “Cloud Musings” blog receives more than 80,000 views per month. Kevin's professional career includes service in the US Navy Space Systems Command, Vice President of J.P. Morgan Chase, Worldwide Sales Executive for IBM, and NJVC Vice President, Cloud Services.