Cloud and data security practices at ISC 2014 (free admission)

Source: Internet
Author: User
Keywords Data security cloud security cloud Security ISC2014 Internet Security assembly

Oscar-winning actress photos of bulk leakage, UPS user information stolen, mobile devices have security vulnerabilities, many security risks caused people's concern. The development of the Internet, Google Glasses, smart watches, such as wearable equipment has been the advent of the industry's hot debate, they bring convenience at the same time also violate the user's privacy.

By the National Computer Network Emergency Management Coordination Center, China Information Security Evaluation Center, National Computer virus Emergency treatment center and China Internet Association guidance, 360 The China Internet Security Conference (ISC2014), sponsored by the Internet Security Center and the China Internet Association Network and Information Security Committee, will be held at the Beijing National Convention Center from 24 to 25th. As the most authoritative annual summit in the Asia-Pacific area of information security, the conference brings together top security experts from home and abroad, you will listen to the father of computer virus, the father of Chinese Internet security, the leading authority of China's information security to tell them the road of information security, and even have the opportunity to become the

In addition, as an important partner of the General Assembly, CSDN hosted the Software Security Forum and the cloud and data Security forum, and reserved some free tickets for the vast number of csdn users, if you are interested in and experts on platform-level cloud security practices, mixed cloud security, and cloud storage security and other technical exchanges, then seize the last limited places, Quick to sign up!

This ISC2014 Congress, 20,000 people, 3500 square meters, more than 100 lectures, you can not only have your own ears to hear hundreds of domestic and foreign security Daniel all-round perspective to share the latest industry trends and technology, but also to witness the six top hackers white Cap team's peak duel, more able to personally experience the mysterious hardware cracking process, Enjoy four arrows Qi to force the network crime is now the pleasure of the flesh.

The Forum on cloud and data security, one of the selected forums of this session, will be based on practice, inviting industry experts to conduct in-depth discussions and exchanges on the following issues:

platform-level cloud security practices: cloud services provide a full range of security solutions at the infrastructure level, with a special invitation to two representative public cloud providers to share cloud security technologies; Mixed cloud security: Migrating from traditional data centers to clouds, software definition networks and virtualization, new security issues arise, Specially invited to the mixed cloud technical experts to share on security issues; cloud storage data security issues: including user privacy, data integrity and other issues;

The specific schedule is as follows:

Time issues Speaker 9:00-9:35 Ali flexible Computing cloud security practices Alibaba Group Security senior security expert Weicheng (Cloud Shu) 9:35-10:10 based on Sdn Green and so security practice Qingyun Senior Research engineer Wang Yu 10:10-10:45 virtualization and hybrid cloud security practices Beijing Islab Information Technology Co., Ltd. Technical director Conron 10:45-11:20 data for the king of the Data Security Research Institute of Software, Chinese Academy of Sciences Trusted Computing and Information Security Laboratory Associate researcher Zhang 11:20-11:55 large data operation Security Qihoo 360 NetOps manager Li Hongliang


11:55-12:30 Building Secure PAAs Cloud services Sohu Network Operations Security Manager Wu Jianjiang

Let's go ahead and get to know the speakers of this forum and the topic of the speech:

Weicheng (Yun Shu)--senior security expert of security Department of Alibaba Group

10 Network security Industry experience, has worked in the Green Alliance, Yahoo, 2008 joined Alibaba Group, the current security senior experts, mainly responsible for cloud computing safety.

Topic: Ali Elastic Computing Cloud Security Practice

This paper introduces the security challenges of the flexible computing cloud compared with traditional IDC, such as network isolation, security responsibility range, and so on, and combined with Aliyun's practical experience, describes how to solve these problems in an open way to form a great security advantage over traditional IDC.

Wang Yu--Senior research and development engineer of Qingyun

Original Street side Jiepang.com founder team member, infrastructure platform leader. In the Linux operating system, computer network, distributed system, cloud computing and network security and other fields have more in-depth research.

Topic: The practice of Qingyun in data security and network security

Qingyun uses SDN technology to build a completely segregated private network of users, and this topic describes:

A typical topology network structure, how to use routers, VPNs and firewalls to provide protection for business systems; The distributed storage architecture of Qingyun provides better storage performance and real time backup and disaster recovery strategy in the context of ensuring user data security Using cloud computing load balancers and monitoring alarms to build highly available service architectures, how to apply the open API to the system automation, cloud computing users face the common security risks and solutions; Qingyun uses SDN technology to respond to cases of malicious attack, that is, dynamically modifying the link of the attacked object to the quarantine link, The link that the normal user is in is not affected; How does Qingyun cooperate with data center to deal with DDOS traffic attack.

Conron--Technical director of Beijing Islab Information Technology Co., Ltd.

Technical director of the original array China region, master, more than 10 years working experience as technical director of safety products manufacturer, participate in several national cloud construction and safety consulting projects, have deep understanding and practice on cloud/tube/End three security solutions, have deep understanding and project experience for virtualization security and mixed cloud security.

Topics: Virtualization and hybrid cloud security practices

This topic will share the security development and practice of virtualized applications, the security development and practice of hybrid cloud, when traditional data center is transferred to cloud and the original security mechanism needs to be changed.

Zhang-Associate researcher, trust computing and Information Guarantee Laboratory, Institute of Software, CAS

Ph. D, associate researcher, trust Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences. The main research interests include data security and privacy protection, and trusted computing technology.

Topic: Data security in the age of the King

This report will combine research advances in cryptography, this paper probes into the application of the technology of ciphertext retrieval, cipher calculation and ciphertext access control in the era of cloud computing, analyzes the ability of cloud server to provide data outsourcing and it computing service under the precondition of the secret data, and prospects the future of data users ' safe and flexible use of cloud data services.

Li Hongliang--NetOps manager of Qihoo 360

Qihoo 360 NetOps Team leader,10 years working experience in network security. With CISSP and CCNP certification.

Topic: Large Data transport Dimension security

This paper introduces the security practice of Qihoo 360 in network architecture design and daily maintenance, and the experience of using large data to protect security effectively.

Wu Jianjiang--the security manager of Sohu Network Operation Department

More than 10 years of information security experience, has worked in several well-known domestic security companies, is currently responsible for the management of Sohu security team.

Topic: Building Secure PAAs Cloud services

This presentation will mainly analyze the security architecture of Sohu cloud, including:

the security objectives that PAAs services should achieve and achieve, and the security principles of PAAs services in the design and implementation of networks, systems, applications, and data services. Advantages and disadvantages of various application security isolation (SandBox) scenarios in PAAs services. Monitor concurrent "malicious users" who are now abusing PAAs services.

China Internet Security Conference, enjoy the wonderful experience brought by the safety of Daniel, explore the mysterious journey of information security, more best-selling gifts, free places, wonderful succession, click for free enrollment.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.