GOTO is a vendor independent international software development conference with more that 90 top speaker and 1300 attendees. The conference cover topics such as .Net, Java, Open Source, Agile, Architecture and Design, Web, Cloud, New Languages and Processes
Jakob Illeborg Pagter, TweetCryptographic Techniques Guru
Biography: Jakob Illeborg Pagter
Jakob's work is focused on creating innovative security solutions which can foster new ideas & business rather than consolidating old ones. One example of such a solution is the security architecture behing the GoalRef intelligent football. Another is the secure auction system of Partisia ApS. He is involved in numerous projects applying novel cryptographic techniques to solve real-world problems (e.g www.abc4trust.eu and www.cfem.dk).
Twitter: @pagter
Presentation: TweetCloud Security or: How I Learned to Stop Worrying and Love the Cloud
Over the last years Cloud Computing has become one of the most hyped concepts in IT. The lure is obvious: increased business agility and reduced cost. However, many are worried about security: loss of control and lack of confidentiality. In fact, according to IDC (2010), security is the main worry for companies considering to "move to the cloud".
In this talk we start by looking at why, i.e. the threat landscape, and then move on to how to secure cloud solutions - today and and in the future. For solutions we focus primarily on the architectural landscape, and provide a number of concrete examples on security - or lack thereof - in the cloud. Focus is not so much on contracts, SLAs, governance etc.
Todays solutions include understanding cloud deployment models, getting programmatic access, and knowing how to build secure applications in the cloud - and how not to! We will present a case study based on Dropbox, as well as a number of do's and don'ts based on prototypical cloud solutions.
In the future much better technical solutions will appear, and the talk will be concluded with a glimpse of these. One such solution is using cryptography; not only to protect data at rest, but also to compute on encrypted data! The latter may seem impossible, but this talk will briefly explain how this can be done using technology developed at the Alexandra Institute in collaboration with world-leading cryptographers.