SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Chief Technology Officer Brainlink International, Inc. Head In The Clouds? Implications of Cloud Computing Public Forum Raj Goel, CISSP
First Cloud Application? ,[object Object],[object Object],[object Object]
The “Voicemail Cloud” Killer App ,[object Object],[object Object],[object Object],[object Object]
Are you Googling Your Privacy Away? ,[object Object],[object Object]
Pre-cursor to the Internet Cloud ,[object Object],[object Object],[object Object]
Could Diddy ,[object Object],[object Object],[object Object]
Modern Clouds ,[object Object],[object Object],[object Object],[object Object]
Business Continuity Challenges ,[object Object],[object Object],[object Object]
Facebook your country's security away... ,[object Object],[object Object],[object Object],[object Object]
Business Continuity Challenges ,[object Object],[object Object],[object Object]
Regulatory and Liability Challenges ,[object Object],[object Object],[object Object],[object Object]
Regulatory and Liability Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object]
Regulatory and Liability Challenges ,[object Object],[object Object],[object Object]
Crystal Ball ,[object Object],[object Object],[object Object],[object Object]
Next Steps ,[object Object],[object Object],[object Object],[object Object]
Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 20 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries.  Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues, addressing diverse audiences including technologists, policy-makers, front-line workers and corporate executives.  A nationally known expert, Raj has appeared in over 20 magazine and newspaper articles worldwide, including  Entrepreneur Magazine ,  Business2.0  and  InformationWeek , and on television including  CNNfn  and  Geraldo At Large .  Raj has been published in  Informatiion Security Magazine  and  Commercial Property News. raj@brainlink.com  917-685-7731 www.brainlink.com www.linkedin.com/in/rajgoel
Audience Questions ,[object Object],[object Object],[object Object]
Audience Questions ,[object Object],[object Object],[object Object]
Audience Questions ,[object Object],[object Object]
Panel Discussion ,[object Object],[object Object]
Audience Suggestion ,[object Object],[object Object],[object Object]
Audience Questions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 20 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries.  Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues, addressing diverse audiences including technologists, policy-makers, front-line workers and corporate executives.  A nationally known expert, Raj has appeared in over 20 magazine and newspaper articles worldwide, including  Entrepreneur Magazine ,  Business2.0  and  InformationWeek , and on television including  CNNfn  and  Geraldo At Large .  Raj has been published in  Informatiion Security Magazine  and  Commercial Property News. raj@brainlink.com  917-685-7731 www.brainlink.com www.linkedin.com/in/rajgoel

Mais conteúdo relacionado

Mais procurados

Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM
 
Navigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesNavigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesDATAVERSITY
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills GapStephen Cobb
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessGeorgian
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018Alex Manders
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theftDataGravity
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...ProductNation/iSPIRT
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 

Mais procurados (19)

Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021
 
Navigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesNavigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance Guidelines
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your Business
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018Blockchain - ISG Future Network Summit Presentation, 2018
Blockchain - ISG Future Network Summit Presentation, 2018
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theft
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 

Destaque

Convocatoria
ConvocatoriaConvocatoria
Convocatoriachajar
 
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...Raj Goel
 
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009Raj Goel
 
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1dRaj Goel
 
Grow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedInGrow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedInRaj Goel
 
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1cRaj Goel
 
2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer PrivacyRaj Goel
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1cRaj Goel
 
Pres Sormani Arosio
Pres Sormani ArosioPres Sormani Arosio
Pres Sormani Arosioluigisormani
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMARaj Goel
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3hRaj Goel
 

Destaque (17)

Convocatoria
ConvocatoriaConvocatoria
Convocatoria
 
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
 
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
JSD-RG HIPAA-EHR-BreachNotification Oct20-2009
 
A Market Stall
A Market StallA Market Stall
A Market Stall
 
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
2013-09-23-ASIS59-Raj_Goel_Lessons_Learned_From_Sandy_v1d
 
Ellinika Krati
Ellinika KratiEllinika Krati
Ellinika Krati
 
Grow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedInGrow your Law Practice Using LinkedIn
Grow your Law Practice Using LinkedIn
 
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
 
2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
2016-10-20-Growing_Your_MSP_with_SOPCulture_SMBTECHFEST_v1c
 
Pres Sormani Arosio
Pres Sormani ArosioPres Sormani Arosio
Pres Sormani Arosio
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMA
 
Jclouds Intro
Jclouds IntroJclouds Intro
Jclouds Intro
 
Planting a seed
Planting a seedPlanting a seed
Planting a seed
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
 

Semelhante a Cloud Computing Panel - NYCLA

The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 
Patternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase DeckPatternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase DeckMaryLudloff
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister
 
SQLSatOregon_kgorman_keynote_NIAIMLEC.pptx
SQLSatOregon_kgorman_keynote_NIAIMLEC.pptxSQLSatOregon_kgorman_keynote_NIAIMLEC.pptx
SQLSatOregon_kgorman_keynote_NIAIMLEC.pptxKellyn Pot'Vin-Gorman
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011Nathan Burke
 
The 10 most innovative google solution providers dec jan 2017
The 10 most innovative google solution providers dec jan 2017The 10 most innovative google solution providers dec jan 2017
The 10 most innovative google solution providers dec jan 2017Merry D'souza
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnil Kumar
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docxdurantheseldine
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 

Semelhante a Cloud Computing Panel - NYCLA (20)

The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 
Patternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase DeckPatternbuilders Founder Showcase Deck
Patternbuilders Founder Showcase Deck
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
 
SQLSatOregon_kgorman_keynote_NIAIMLEC.pptx
SQLSatOregon_kgorman_keynote_NIAIMLEC.pptxSQLSatOregon_kgorman_keynote_NIAIMLEC.pptx
SQLSatOregon_kgorman_keynote_NIAIMLEC.pptx
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
pearx ai.pdf
pearx ai.pdfpearx ai.pdf
pearx ai.pdf
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
The 10 most innovative google solution providers dec jan 2017
The 10 most innovative google solution providers dec jan 2017The 10 most innovative google solution providers dec jan 2017
The 10 most innovative google solution providers dec jan 2017
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
iri-highres
iri-highresiri-highres
iri-highres
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 

Cloud Computing Panel - NYCLA

  • 1. Chief Technology Officer Brainlink International, Inc. Head In The Clouds? Implications of Cloud Computing Public Forum Raj Goel, CISSP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 20 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries. Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues, addressing diverse audiences including technologists, policy-makers, front-line workers and corporate executives. A nationally known expert, Raj has appeared in over 20 magazine and newspaper articles worldwide, including Entrepreneur Magazine , Business2.0 and InformationWeek , and on television including CNNfn and Geraldo At Large . Raj has been published in Informatiion Security Magazine and Commercial Property News. raj@brainlink.com 917-685-7731 www.brainlink.com www.linkedin.com/in/rajgoel
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Raj Goel, CISSP, is an Oracle and Solaris expert and he has over 20 years of experience in software development, systems, networks, communications and security for the financial, banking, insurance, health care and pharmaceutical industries. Raj is a regular speaker on HIPAA, Sarbanes-Oxley,PCI-DSS Credit Card Security, Information Security and other technology and business issues, addressing diverse audiences including technologists, policy-makers, front-line workers and corporate executives. A nationally known expert, Raj has appeared in over 20 magazine and newspaper articles worldwide, including Entrepreneur Magazine , Business2.0 and InformationWeek , and on television including CNNfn and Geraldo At Large . Raj has been published in Informatiion Security Magazine and Commercial Property News. raj@brainlink.com 917-685-7731 www.brainlink.com www.linkedin.com/in/rajgoel