Virtualization: Resource Coupling and Security across the Stack

Page Content

Dennis Moreau - Configuresoft

Sep 10, 2008

Size: 554.3MB

Download: Video Icon MP4 Video   Flash Icon Watch in your Browser (Flash Required)  

Abstract

Virtualization technology can deliver better IT asset utilization, more agile IT asset allocation, more efficient use of resources, while supporting a potentially more secure IT infrastructure. Virtualization accomplishes these benefits by leveraging mechanisms which provide a) asset isolation, b) resource sharing and c) provisioning dynamics.
This session will address how to use configuration and behavioral information to address the increased complexity of security, compliance and risk assessment in virtualized environments. Comprehensive security and risk situation awareness of more dynamic, more interdependent, and more insulated assets, will allow enterprises to take fuller advantage of the promised benefits of virtualization.
This session will also briefly address extension of these considerations to the cloud and utility computing infrastructures.

About the Speaker

As a Founder and the Chief Technology Officer for Configuresoft, Dennis Moreau is specialist in the application of leading edge technologies to the solution of complex problems in the Information Technology management domain. His primary focus is in developing enterprise scale solutions to improve IT efficiency and effectiveness for systems management, security compliance and configuration optimization. He works actively with the National Institute of Standards and Technology (NIST) and Mitre on the development of security configuration policy compliance standards.

Dennis has over than 20 years of experience in evaluating, designing and managing complex software systems. Prior to joining Configuresoft, he was the Associate Vice President and Chief Technology Officer for Baylor College of Medicine (BCM). Dennis also has extensive experience as an IT Strategic Planning and System Architecture consultant for many commercial and governmental organizations including the DOD, NASA and IBM Corporation. He holds a doctorate in Computer Science and speaks regularly at IT management and security conferences internationally.

Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52, West Lafayette Campus. More information...

© 1999-2013 Purdue University. All rights reserved.

Use/Reuse Guidelines

CERIAS Seminar materials are intended for educational, non-commercial use only and any or all commercial use is prohibited. Any use must attribute "The CERIAS Seminar at Purdue University." Opinions expressed in the recordings are not necessarily representative of the views of CERIAS or of Purdue University.