Hear from IT leaders, industry experts and developers at the defining event that brings together the entire cloud computing community.
Director of Cloud and Virtualization Solutions, Security Technology Business Unit, Cisco
Chris Hoff has 20 years of experience in high-profile global roles in network and information security architecture, engineering, operations, product management and marketing with a passion for virtualization and all things Cloud.
Hoff is currently Director of Cloud & Virtualization Solutions of the Security Technology Business Unit at Cisco Systems where he focuses on virtualization and cloud computing security, spending most of his time interacting with global enterprises and service providers, governments, and the defense and intelligence communities.
Previously, he was Unisys Corporation’s Chief Security Architect, served as Crossbeam Systems’ chief security strategist, was the CISO and director of enterprise security at a $25 billion financial services company and was founder/CTO of a national security consultancy amongst other startup endeavors.
Hoff is regularly interviewed by analysts, media and the press, is a featured guest on numerous podcasts and has keynoted and presented at numerous high-profile security conferences including Black Hat, DefCon, Microsoft’s Bluehat, RSA, Gov2.0, FIRST, Glue, Source, SecTor, and Troopers.
Hoff is a founding member and technical advisor to the Cloud Security Alliance, founder of the CloudAudit project and HacKid conference and blogs at http://www.rationalsurvivability.com/blog. You can also get his firehose Twitter timeline by following @beaker.
Hoff is a CISSP, CISA, CISM and NSA IAM. He was twice nominated as the Information Security Executive of the Year and won the Security 7 award in Financial Services in 2005. Hoff is a 2010 Microsoft MVP (Security) and a 2010 VMware vExpert.
Cloud Computing promises many things. Depending upon who you listen to, moving your applications and information to "The Cloud" will provide levels of security, when compared to "legacy enterprise IT," that will either be vastly superior or apocalyptic.There is such a conflation of deployment and delivery models that it's incredibly difficult to ascertain where the lines of responsibility and accountability for the security (and compliance) are drawn between the customer, provider and consumer. We're going to fix that in this workshop.