The Trusted Cloud: Introduction to Security in a Cloud-Enabled World




Taste of Premier   (MP4) - Channel 9 show

Summary: To realize the benefits of the cloud, you must be willing to entrust your cloud provider with one of your most valuable assets — your data. If you invest in a cloud service, you must be able to trust that your customer data is safe, that the privacy of your data is protected, and that you retain ownership of and control over your data. Join Lex Thomas, John Rodriguez and Dmitii Lezine as they have a candid discussion around cloud security and how it can impact your daily operation and overall IT organization. [1:23] How should IT organizations approach cloud security coming from a mostly On-Premise datacenter environment?[6:01] From a customer perspective who's responsible for cloud security? Is it the cloud provider's sole responsibility? [13:49] What additional things does Cloud Security bring to smaller organizations?[15:48] What are some actionable items customers need to do with regards to cloud security?[35:26] Where can people go for Best Practices or new information on Cloud Security?Need more info? Check out http://aka.ms/SecureCustomer or the Azure Security Center Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with