Cloud Security Architecture: Building a Software Defined Perimeter presented at CISOatlanta 2015

by Gram Ludlow,

Summary : Building a secure, risk managed network typically involves significant caveats: namely, restrictions on application flexibility, device usage and dependency on physical firewalls that block legitimate information flow in their attempt to stop threats. Gram Ludlow of Flowers Foods will present a more innovative approach that retains a cloud security boundary without unnecessary restrictions — allowing BYOD, flexible user interaction and mobility by moving from a physical to a software defined perimeter. With this evolved model, Ludlow demonstrates how an organization’s cloud network can be secure without overbearing restrictions on access.