Welcome!

News Feed Item

Cloud Security Alliance Presents Industry Leadership Award To Professor Udo Helmbrecht Of ENISA

Leader of European Union's Cyber Security Agency Honored

SAN FRANCISCO, Feb. 24, 2014 /PRNewswire-USNewswire/ -- RSA CONFERENCE -- The Cloud Security Alliance (CSA) has named Prof Udo Helmbrecht, Executive Director of the European Union Agency for Network and Information Security (ENISA), as the 2014 recipient of the CSA Industry Leadership Award. The CSA Industry Leadership Award is given to individuals in recognition of their contributions in advancing secure cloud computing initiatives. ENISA has been an affiliate member of CSA since its inaugural year of 2009. 

(Logo: http://photos.prnewswire.com/prnh/20130723/DC51526LOGO)

"Prof Helmbrecht has approached the issue of cloud computing adoption with a strategic vision and healthy skepticism," said Jim Reavis, CEO of the CSA. "The very diverse European market provides many unique challenges.  Prof Helmbrecht has not been a cheerleader for the industry, but has engaged with all key stakeholders to support responsible adoption of cloud computing based on solid security principles.  We have enjoyed a healthy partnership with ENISA that has included collaboration to create the Certificate of Cloud Security Knowledge (CCSK), our SecureCloud conferences and many other research projects. Prof Helmbrecht can take satisfaction in his role in driving a more secure cloud and greater privacy protection for European citizens."

In 2009, Helmbrecht was appointed as Executive Director of ENISA by its Management Board, following a presentation to the European Parliament's ITRE committee. Under Helmbrecht's leadership, ENISA has consolidated its role as a centre of network and information security expertise, and continued its work to facilitate cooperation in network and information security across Europe.

Helmbrecht has presided over many advancements in secure cloud computing, including the original cloud computing risk assessment research in 2009, as well as research on service level agreements, government clouds and incident reporting.

"As a business model, cloud computing offers many advantages over traditional computing and is revolutionising the way we use ICT," said Professor Helmbrecht. "ENISA believes there are important security opportunities as well, and we are working together with the public and the private sector to capitalize on these opportunities. Our goal is to ensure that  security of cloud computing surpasses that of traditional computing models. In this way we ensure that good security practices stimulate economic growth.

"I am honoured to receive this award from the Cloud Security Alliance and accept it on behalf of the entire staff at ENISA.  The success of ENISA's cloud security papers shows the power of collaboration between public sector, industry and industry associations. Without their engagement and support we would not be able to effectively promote better security practices in the EU. Collaborations with global industry associations, such as our partnership with CSA, are crucial for our mission: to be a centre of security expertise for the EU."

Prof Helmbrecht is the third recipient of the CSA Industry Leadership Award, following Microsoft Corporate Vice President of Trustworthy Computing Scott Charney in 2013 and Trend Micro CEO Evan Chen in 2012.

About the Cloud Security Alliance
The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

About the European Union Agency for Network and Information Security (ENISA)
The European Union Agency for Network and Information Security (ENISA) is providing expertise on cyber security issues for the EU and its Member States. ENISA is the EU's response to the cyber security issues of the European Union. As such, it is the 'pace-setter' for Information Security in Europe, and a centre of expertise.

Main areas of work:

  • Set up and training of Computer Emergency Response Teams
  • Critical information Infrastructure protection (CIIP)
  • Supporting other EU actors in the fight against cybercrime
  • Conducting Cyber Security Exercises
  • Adequate and consistent policy implementation
  • International cooperation

SOURCE Cloud Security Alliance

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
Docker containers have brought great opportunities to shorten the deployment process through continuous integration and the delivery of applications and microservices. This applies equally to enterprise data centers as well as the cloud. In his session at 20th Cloud Expo, Jari Kolehmainen, founder and CTO of Kontena, discussed solutions and benefits of a deeply integrated deployment pipeline using technologies such as container management platforms, Docker containers, and the drone.io Cl tool. H...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...