Data Center World is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Data Center World will be in Austin in March 2022 - Sign up for notifications. 

Earn (ISC)² Continuing Professional Education (CPE) Credits

We partner with (ISC)² to provide credits for Data Center World. 1 credit is awarded per one hour of security-themed sessions attended, with a maximum of 8 per day. CISSP certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security.

It’s simple: enter your (ISC)² member number on the Data Center World registration profile page. If you have already registered for Data Center World you can log back in to your profile and add it. Following the event, we'll submit your security-themed session attendance to (ISC)² so the credits can be added directly to your account. All educational opportunities offered by the submitter as eligible for CPE credits shall be of the highest quality, directly related to at least one (1) domain of information security as recognized by (ISC)².

Sessions addressing Security in the Data Center

The Impact of Disruption on the Future of Data Centers - Edward Henigin, Data Foundry

Monday, August 16 | 1:00pm - 2:00pm

The world of data centers is constantly adapting and evolving to complement technology and business. With new applications come new enterprise demands, and with new security rules for end user requirements come new IT architectures to support them. Digital business and data ecosystems are changing by the day. The global COVID-19 pandemic has expedited and redefined this path to the future. Here are the critical trends:

  • The Future Relies on Secure Networks
  • The newly remote workforce has also created an acute focus on robust networks that are capable of securely handling a dramatic increase in traffic.
  • To solve this challenge, many non-corporate networks are now being leveraged to ensure adequate connectivity and overall business efficacy. The data center industry will see a focus on network-centric services, and demand for network management and assessment, private data networks, and transport and other customizable services.
  • Safety Remains Paramount. With data centers serving as critical enablers of digital and data-intensive business strategies and requiring on-site essential staff to provision 24x7x365 care, including bulletproof security, it's important that these individuals can perform their duties and keep customers supported — all while remaining safe.

 ###

Case Study: Creating Standard Security Frameworks for Improving Data Center Security Posture - Joey Arato, Facebook; John Little, Google

Monday, August 16 | 3:50pm - 4:50pm

The Industrial Control Systems (ICS) including Cooling and Building Management Systems (BMS), Power Monitoring Systems (PMS), and Electrical Protection and Control Systems (EPC) that run our Data Centers are frequently designed with availability as the focus rather than to mitigate security risks or vulnerabilities. This has presented a unique security challenge across multiple industries from Manufacturing to Data Centers. We find this type of equipment is often lacking security fundamentals, such as modern communication, authentication and authorization mechanisms we would expect in critical equipment attached to a network. By combining efforts across multiple organizations and industries we can begin to drive a marked increase in the security of these systems and environments.
As part of the Open Compute Project, we are working together with community partners ranging from hyperscalers, manufacturing industry partners and data center construction companies to help create and drive adoption of common security baselines and frameworks necessary to improve security posture in the Industrial Control System Space. The initiatives we are spearheading focus on three key areas, such as, defining what a baseline physical security standard would look like for a data center, what types of communications standards and protocols would best enable secure communication for this gear and how we best monitor this equipment for security issues.

  ###

Colocation: Low Risk Solutions for Network, Hybrid IT and Edge Services - Alan Howard, Omdia

Tuesday, August 17 | 12:40pm - 1:40pm

In a pandemic world, or even a regular world, evolving IT workload architectures often require near-real-time solutions to be effective. This session will cover workload replacement trends, colocation adoption feasibility, cost analysis, services availability including interconnection options, colocation as an edge solution, and enterprise colocation assessment criteria. Colocation market stability and data center construction trends will be covered.

  ###

The Key to Securing your Data Center? Open Source - Philippe Humeau, CrowdSec

Thursday, August 19 | 1:20pm - 2:20pm

Even though worldwide spending on cybersecurity is predicted to reach $1 trillion in 2021 according to Forbes, the game will still be asymmetrical and all companies will keep being hacked regardless of their security budgets. Expensive security doesn't mean better security. A new approach is needed.
In the past 15 years, we all witnessed the rise of the social era leveraging crowd power, embodied by the climax of dozens and dozens of social media platforms, Waze, Airbnb, and many other very successful tech giants. Communications, booking vacations, funding ventures, driving, day-to-day business tasks were taken to a whole new level thanks to a crowd approach. Why not security? If people were willing to take advantage of this new togetherness to bring ideas and projects to unprecedented heights, why wouldn't they be keen to unite to defend their privacies, companies, and personal data against cyberattacks? Today, there is a way to rebalance the odds and protect your resources through crowdsourced security and open source.
Join us for this talk so we can explore how a collaborative approach to security will make your data centers safer.

  ###

Implementing a PMO Model for Precise Execution of Data Center Security Systems - Grace Li, Convergint Technologies

Thursday, August 19 | 2:40pm - 3:40pm

The session is designed to provide an overview about implementing a programmatic approach to deliver security system integration projects to meet enterprise level Data Center companies' standards and expectations. This session will include three section, common challenges of executing security system integration projects in Data Center environment, Project Management Office (PMO) goals, features and structure, and Case Study of implementing PMO model to support a global Cloud/Data Center customer across multiple continent consistently.

 ### 

Balancing Safety, Security and Convenience in Colocations - Derek Arcuri, Genetech

Thursday, August 19 | 2:40pm - 3:40pm

A single minute of downtime costs your data center $8000 (Source Business Insider). All data center departments must play a role in supporting data center operations. This is particularly true for your security practice. Data centers must keep up with evolving regulations and security threats while ensuring their customers' needs are consistently met.
Whether you face a physical security breach or cyber-attacks, a cease in operations can cost your business millions in reputational damage, loss of customer contracts, and noncompliance fees. How do you secure a growing number of assets across multiple sites while staying ahead of new threats and regulations? How do you ensure that your security team operates within the regulatory bounds, and how quickly can you share evidence with stakeholders? How is security helping define policies that guide customers to access the tenant's equipment and nothing more?
Your security must help keep your operations running smoothly and stay ahead of the curve as new regulations emerge. During this session, we will discuss the role that security plays in co-location from visitor management to effectively securing racks/cages and showing how technology can be used to ensure that customers have access to the correct locations within the co-location data center.