Virtualization: Resource Coupling and Security across the Stack
Page Content
Dennis Moreau - Configuresoft
Sep 10, 2008
Size: 554.3MB
Download:
MP4 Video
Watch in your Browser (Flash Required)
Abstract
Virtualization technology can deliver better IT asset utilization, more agile IT asset allocation, more efficient use of resources, while supporting a potentially more secure IT infrastructure. Virtualization accomplishes these benefits by leveraging mechanisms which provide a) asset isolation, b) resource sharing and c) provisioning dynamics.
This session will address how to use configuration and behavioral information to address the increased complexity of security, compliance and risk assessment in virtualized environments. Comprehensive security and risk situation awareness of more dynamic, more interdependent, and more insulated assets, will allow enterprises to take fuller advantage of the promised benefits of virtualization.
This session will also briefly address extension of these considerations to the cloud and utility computing infrastructures.
About the Speaker
As a Founder and the Chief Technology Officer for Configuresoft, Dennis Moreau is specialist in the application of leading edge technologies to the solution of complex problems in the Information Technology management domain. His primary focus is in developing enterprise scale solutions to improve IT efficiency and effectiveness for systems management, security compliance and configuration optimization. He works actively with the National Institute of Standards and Technology (NIST) and Mitre on the development of security configuration policy compliance standards.
Dennis has over than 20 years of experience in evaluating, designing and managing complex software systems. Prior to joining Configuresoft, he was the Associate Vice President and Chief Technology Officer for Baylor College of Medicine (BCM). Dennis also has extensive experience as an IT Strategic Planning and System Architecture consultant for many commercial and governmental organizations including the DOD, NASA and IBM Corporation. He holds a doctorate in Computer Science and speaks regularly at IT management and security conferences internationally.
Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M.
STEW G52, West Lafayette Campus.
More information...
© 1999-2013 Purdue University. All rights reserved.
Use/Reuse Guidelines
CERIAS Seminar materials are intended for educational, non-commercial use only and any or all commercial use is prohibited. Any use must attribute "The CERIAS Seminar at Purdue University." Opinions expressed in the recordings are not necessarily representative of the views of CERIAS or of Purdue University.