NIST Cloud Computing Forensic Science Working Group
|
|
- Blaise Dorsey
- 8 years ago
- Views:
Transcription
1 NIST Cloud Computing Forensic Science Working Group Dr. Martin Herman Information Technology Laboratory (ITL) National Institute of Standards and Technology
2 NIST Cloud Computing Forensic Science Working Group (NCC-FSWG): Who We are NIST Public Working Group -- Established in November 2012 Voluntary open membership (international) Active participants meet bi-weekly by conference call Cloud Forensics Practitioners Cloud Providers Academia US Government User Community International Participants NIST Leadership (Co-chairs Dr. Michaela Iorga and Eric Simmon, and Dr. Martin Herman, NIST Senior Advisor) About 190 members in mailing list, with about 10 bi-weekly participants Twiki Website: 4/15/ :59 PM 2
3 NCC-FSWG - Goals Gather inputs dealing with cloud forensic challenges Identify and aggregate published cloud forensic challenges Analyze challenges Prioritize the challenges Based on importance, urgency Based on whether solutions involve technology, standards, or measurement methods Choose the highest priority challenges and determine gaps in technology, standards and measurements to address these challenges Develop a roadmap to address these gaps 4/15/ :59 PM 3
4 NCC-FSWG Current Status Challenges spreadsheet aggregation of published challenges (~65) and analysis White paper describing preliminary analysis of cloud forensic challenges progress report NIST Cloud Computing Forensic Science Challenges First draft almost complete and will be released very shortly for public comments Authored collectively by NCC-FSWG bi-weekly participants 4/15/ :59 PM 4
5 Contributors to White Paper Michaela Iorga Martin Herman Eric Simmon Keyun Ruan Mike Salim Josiah Dykstra Kenneth Zatyko Bob Jackson Lon Gowen Ernesto Rojas Laura Taylor Scot Reemelin Ken Stavinoha Karla Holm Kristy Westphal Tony Rutkowski Fred Cohen Nancy Landreville Anil Karmel Pw Carey Mark Potter Ragib Hasan 4/15/ :59 PM 5
6 Cloud Computing Forensic Science Challenges Actor/Stakeholder identifies the stakeholder(s) who is affected by the challenge Action/Operation - identifies the activity that the stakeholder would like to perform Object of This Action identifies the specific item upon which the action is to be performed Reason identifies the primary challenges that the stakeholder faces in order to perform the specified action on the object 4/15/ :59 PM 6
7 Cloud Computing Forensic Science Challenges Each challenge needs to be relevant to the essential characteristics of the NIST Definition of Cloud Computing* Each challenge labeled with one or more relevant characteristic OD = On-demand self-service BNA = Broad network access RP = Resource pooling RE = Rapid elasticity MS = Measured service * Peter Mell, Timothy Grance, The NIST Definition of Cloud Computing. NIST SP , September /15/ :59 PM 7
8 Cloud Computing Forensic Science Challenges Patterns of aggregation (or categories ) emerged Challenges related to: Architecture Data collection Analysis of cloud forensic data Anti-forensics Incident first responders Role management Legal issues Standards Training 4/15/ :59 PM 8
9
10 Architecture Challenges Issues include diversity, complexity, provenance, multitenancy, data segregation, etc. Challenge examples Dealing with variability in cloud architectures between providers Tenant data compartmentalization and isolation during resource provisioning Proliferation of system, locations and endpoints that can store data Accurate and secure provenance for maintaining and preserving chain of custody Infrastructure to support seizure of cloud resources without disrupting other tenants 4/15/ :59 PM 10
11 Data Collection Challenges Issues include data integrity, data recovery, data location, imaging, etc. Challenge examples Locating forensic artifacts in large, distributed and dynamic systems Locating and collecting volatile data Data collection from virtual machines Data integrity in a multi-tenant environment where data are shared among multiple computers in multiple locations and accessible by multiple parties Inability to image all the forensic artifacts in the cloud Accessing the data of one tenant without breaching the confidentiality of other tenants Recovery of deleted data in a shared and distributed virtual environment 4/15/ :59 PM 11
12 Analysis Challenges Issues include correlation, reconstruction, time synchronization, logs, metadata, timelines, etc. Challenge examples Correlation of forensic artifacts across and within cloud providers Reconstruction of events from virtual images or storage Integrity of metadata Timeline analysis of log data including synchronization of timestamps 4/15/ :59 PM 12
13 Anti-forensics Challenges Issues include obfuscation, data hiding, malware, etc. Anti-forensics are a set of techniques used specifically to prevent or mislead forensic analysis Challenge examples The use of obfuscation, malware, data hiding, or other techniques to compromise the integrity of evidence Malware may circumvent virtual machine isolation methods 4/15/ :59 PM 13
14 Incident First Responder Challenges Issues include trustworthiness of cloud providers, response time, reconstruction, etc. Challenge examples Confidence, competence, and trustworthiness of the cloud providers to act as first-responders and perform data collection Difficulty in performing initial triage Processing a large volume of forensic artifacts collected 4/15/ :59 PM 14
15 Role Management Challenges Issues include data owners, identity management, users, access control, etc. Challenge examples Uniquely identifying the owner of an account Decoupling between cloud user credentials and physical users Ease of anonymity and creating fictitious identities online Determining exact ownership of data Authentication and access control 4/15/ :59 PM 15
16 Legal Challenges Issues include jurisdictions, laws, service level agreements, contracts, subpoenas, international cooperation, privacy, ethics, etc. Challenge examples Identifying and addressing issues of jurisdictions for legal access to data Lack of effective channels for international communication and cooperation during an investigation Data acquisition that relies on the cooperation of cloud providers, as well as their competence and trustworthiness Missing terms in contracts and service level agreements Issuing subpoenas without knowledge of the physical location of data Seizure and confiscation of cloud resources may interrupt business continuity of other tenants 4/15/ :59 PM 16
17 Standards Challenges Issues include standard operating procedures, interoperability, testing, validation, etc. Challenge examples Standards challenges in cloud forensics include lack of even minimum/basic SOPs, practices, and tools Lack of interoperability among cloud providers Lack of test and validation procedures 4/15/ :59 PM 17
18 Training Challenges Issues include forensic investigators, cloud providers, qualification, certification, etc. Challenge examples Misuse of digital forensic training materials that are not applicable to cloud forensics Lack of cloud forensic training and expertise for both investigators and instructors Limited knowledge by record-keeping personnel in cloud providers about evidence 4/15/ :59 PM 18
19 Cloud Computing Forensic Science Challenges Aggregation led to Mind Map Visual representation of Groups of challenges Relationships between challenges Categories and sub-categories of challenges E.g., Category: data collection Subcategories: Data Integrity and Data Recovery Primary and related categories Every challenge could be placed into a primary category Many challenges could also be placed in related categories 4/15/ :59 PM 19
20 Mindmap (PRIMARY) 4/15/ :59 PM 20
21 Mindmap (RELATED) 4/15/ :59 PM 21
22 Complete Mindmap 4/15/ :59 PM 22
23 Future WG Activity Publish White Paper draft very shortly for public comment Further analyze the cloud forensics challenges Prioritize the challenges Choose the highest priority challenges and determine gaps in technology, standards and measurements to address these challenges Develop a roadmap to address these gaps 4/15/ :59 PM 23
24 We welcome new members to the WG! Send me if interested. Dr. Martin Herman NIST Working Group Twiki web site: 4/15/ :59 PM 24
Draft NISTIR 8006 NIST Cloud Computing Forensic Science Challenges
1 Draft NISTIR 8006 2 NIST Cloud Computing Forensic Science Challenges 3 4 NIST Cloud Computing Forensic Science Working Group Information Technology Laboratory 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
More informationWhen Security, Privacy and Forensics Meet in the Cloud
When Security, Privacy and Forensics Meet in the Cloud Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG March 26,
More informationCloud Computing A NIST Perspective and Beyond. Robert Bohn, PhD Advanced Network Technologies Division
Cloud Computing A NIST Perspective and Beyond Robert Bohn, PhD Advanced Network Technologies Division CASC Fall Meeting 2014 17 September 2014 Federal IT Strategies 2 The NIST Cloud Computing Program Goal
More informationKEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS
Chapter 12 KEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS Keyun Ruan, Joshua James, Joe Carthy and Tahar Kechadi Abstract As the adoption of cloud services increases, the importance
More informationCloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division
Cloud Computing A NIST Perspective & Beyond Robert Bohn, PhD Advanced Network Technologies Division ISACA National Capital Area Chapter Arlington, VA, USA 17 March 2015 Cloud Program Overview Launch &
More informationIncident Management & Forensics Working Group. Charter
Incident Management & Forensics Working Group Charter February 2013 2013 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print,
More informationCybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013
Cybersecurity and the Cloud 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013 Well, I'll hazard I can do more damage on my laptop sitting in my
More informationKey Management Challenges in a Cloud Ecosystem
Key Management Challenges in a Cloud Ecosystem A Discussion Starter Based on the Cloud Security WG s Research - Dr. Michaela Iorga, NIST (presenting) Anil Karmel, C2 Lab, Inc. (presenting) Juanita Koilpilai,
More informationSurvey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Keyun Ruan, Ibrahim Baggili (PhD), Prof Joe Carthy, Prof Tahar Kechadi University College Dublin, Zayed
More informationITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING
ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
More informationStandardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,
More informationKeyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie
Chapter 2 CLOUD FORENSICS Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie Abstract Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud
More informationCloud Computing, and REST-based Architectures Reid Holmes
Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Cloud Computing, and REST-based Architectures Reid Holmes Cloud precursors Grid Computing:
More informationCloud Forensics: an Overview. Keyun Ruan Center for Cyber Crime Investigation University College Dublin
Cloud Forensics: an Overview Keyun Ruan Center for Cyber Crime Investigation University College Dublin Cloud Futures 2011, Microsoft Research Redmond, June 3, 2011 Co-authors Mark Crosbie, IBM Ireland
More informationNIST Cloud Computing Security Reference Architecture (SP 500-299 draft)
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST
More informationComputer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
More informationCloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
More informationEXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD
White Paper EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD Explaining UFED Cloud Analyzer Extraction and Analysis Processes With data privacy a major topic of discussion among consumers and service
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
More informationThe NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
More informationSecurity & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationTen Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
More informationPerspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Standardization and Cloud Computing Cloud computing is a convergence of many technologies Some
More informationCloud Forensic Investigation using Digital Provenance Scheme
Cloud Forensic Investigation using Digital Provenance Scheme Nay Aung Aung, and Myat Myat Min Abstract In recent year, Cloud computing has become popular as a cost-effective and efficient computing paradigm.
More informationPerspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationCloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology
Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG Cloudy with Showers of Business Opportunities and a Good Chance of
More informationSecuring The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
More informationUS Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft)
Special Publication 500-293 (Draft) US Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft) Useful Information for Cloud Adopters Lee Badger, Robert Bohn, Shilong Chu, Mike Hogan,
More informationInformation Security Guideline: Cloud Computing Services. Information Security and Privacy Committee Draft version 8/1/2012
Information Security Guideline: Cloud Computing Services Information Security and Privacy Committee Draft version 8/1/2012 Table of Contents Introduction... 1 Purpose... 2 Scope... 2 Risks and Concerns
More informationSECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING
SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING Karin Bernsmed, Martin Gilje Jaatun SINTEF Information and Communication Technology, Trondheim, Norway Karin.Bernsmed@sintef.no, Martin.G.Jaatun@sintef.no
More informationLegal Issues of Forensics in the Cloud
Legal Issues of Forensics in the Cloud About Me Owner, Titan Info Security Group, LLC A Risk Management and Cyber Security Law Firm Partner, OnlineIntell, LLC Protecting online brands and reputation while
More informationClouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
More informationADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
More informationCloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
More informationNIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
More informationCloud Computing Reference Architecture and its Forensic Implications: A Preliminary Analysis
Cloud Computing Reference Architecture and its Forensic Implications: A Preliminary Analysis Keyun Ruan, Joe Carthy Center for Cybersecurity and Cybercrime Investigation University College Dublin {keyun.ruan,
More informationISACA Presentation. Cloud, Forensics and Cloud Forensics
ISACA Presentation Cloud, Forensics and Cloud Forensics Agenda What is the Cloud What is Forensics Challenges Cloud poses to Information Security and Forensic Investigations Using Cloud technologies to
More informationInformation and Infrastructure Viewpoints
National Human Services Interoperability Architecture (NHSIA) NHSIA Webinar Series Overview Key Concepts Capability & Business Viewpoints Information & Infrastructure Viewpoints Systems Viewpoint and Wrap-Up
More informationPCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
More informationStrategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationCloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
More informationCloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationTop 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
More informationJohn Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
More informationHow To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
More informationThe Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
More informationSECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
More informationPerspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
More informationSession 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP
Session 334 Incident Management Jeff Roth, CISA, CGEIT, CISSP SPEAKER BIOGRAPHY Jeff Roth, CISA, CGEIT Jeff Roth has over 25 years experience in IT audit, security, risk management and IT Governance experience
More informationThe Keys to the Cloud: The Essentials of Cloud Contracting
The Keys to the Cloud: The Essentials of Cloud Contracting September 30, 2014 Bert Kaminski Assistant General Counsel, Oracle North America Ken Adler Partner, Loeb & Loeb LLP Akiba Stern Partner, Loeb
More informationAn Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
More informationCybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
More informationCyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
More information6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
More informationBig Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
More informationConcurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
More informationTop 10 Risks in the Cloud
A COALFIRE PERSPECTIVE Top 10 Risks in the Cloud by Balaji Palanisamy, VCP, QSA, Coalfire March 2012 DALLAS DENVER LOS ANGELES NEW YORK SEATTLE Introduction Business leaders today face a complex risk question
More informationA New Era of Cybersecurity Neil Mohammed, Sales Engineer
A New Era of Cybersecurity Neil Mohammed, Sales Engineer Copyright 2015 Raytheon Company. All rights reserved. R W Market Advantages Strong Financial Backing Accelerated Innovation Increased Breadth and
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationCLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
More informationWhat Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.
What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model
More informationThe problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
More informationHands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
More informationWorking Group on. First Working Group Meeting 29.5.2012
Working Group on Cloud Security and Privacy (WGCSP) First Working Group Meeting 29.5.2012 1 Review of fexisting i Standards d and Best Practices on Cloud Security Security Standards and Status List of
More informationAssessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
More informationAllison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation
More informationThe NIST Cloud Computing Program
The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program
More informationCybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
More informationOverview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
More informationCompliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
More informationIdentity in the Cloud Use Cases Version 1.0
Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)
More informationCloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
More informationSupporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
More informationDelivery date: 18 October 2014
Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationArchival Approach to IaaS Cloud Services
Central Page 216 of 344 Archival Approach to IaaS Cloud Services Hrvoje Stančić, Adam Al-Hariri Faculty of Humanities and Social Sciences University of Zagreb Ivana Lučića 3, 10000 Zagreb, Croatia {hstancic,
More informationCloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
More informationResidual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)
Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening
More informationCompliance and the Cloud: What You Can and What You Can t Outsource
Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick
More informationIBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
More informationDigital Forensics for IaaS Cloud Computing
Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or
More informationSELECTING AN ENTERPRISE-READY CLOUD SERVICE
21 Point Checklist for SELECTING AN ENTERPRISE-READY CLOUD SERVICE Brought to you by Introduction The journey to the cloud is well underway, and it s easy to see why when 84% of CIOs report cutting application
More informationRetention & Disposition in the Cloud Do you really have control?
InterPARES Trust Retention & Disposition in the Cloud Do you really have control? Franks Patricia, San Jose State University, San Jose, USA and Alan Doyle, University of British Columbia, Canada October
More informationDOE Cyber Security Policy Perspectives
DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationEast African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
More informationFeature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008
Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationSecuring Big Data in the Cloud: Towards a More Focused and Data Driven Approach. Ragib Hasan, UAB Anthony Skjellum, Auburn 2014 NSF Big Data Workshop
Securing Big Data in the Cloud: Towards a More Focused and Data Driven Approach Ragib Hasan, UAB Anthony Skjellum, Auburn 2014 NSF Big Data Workshop [Cloud Computing] is a security nightmare and it can't
More informationStrategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
More informationPurpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.
Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM
More informationHKITPC Competency Definition
HKITPC Competency Definition for the Certification copyright 2011 HKITPC HKITPC Competency Definition Document Number: HKCS-CD-L1L2 Version: 1.0 Date: June 2011 Prepared by Hong Kong IT Professional Certification
More informationThe NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
More informationBreakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements
Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University
More informationNIST Cloud Computing Reference Architecture & Taxonomy Working Group
NIST Cloud Computing Reference Architecture & Taxonomy Working Group Robert Bohn Information Technology Laboratory June 21, 2011 2 Outline Cloud Background Objective Working Group background NIST Cloud
More information