Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia

Size: px
Start display at page:

Download "Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia"

Transcription

1 Helix Nebula: Secure Brokering of Cloud Resources for escience Dr. Jesus Luna Garcia

2 Outline Background The Blue-Box architecture Security Goals and Requirements

3 Let s imagine

4

5 Why a Public-Private Partnership for escience? The scale and complexity of services needed to satisfy Europe s IT-intense scientific research & space organizations are beyond what can be provided by any single company. European escience requires the collaboration of a variety of service providers and SMEs!

6 Helix Nebula: big science teams up with big business Strategic Plan Establish a federated multi-tenant, multiprovider cloud infrastructure To support the computing capacity needs for the ATLAS experiment Setting up a new service to simplify analysis of large genomes, for a deeper insight into evolution and biodiversity To create an Earth Observation platform, focusing on earthquake and volcano research Identify and adopt policies for trust, security and privacy Create governance structure Define funding schemes Adopters

7 Long Term Goal To create a multi-tenant Open Market Place for Science, where data, scientists, funding bodies, SMEs and downstream industry meet to work towards common interests An ecosystem to transform data into valuable information

8 Timeline Endorse the Common Strategy Agree on the Partnership Select flagships use cases Define governance model Pilot Phase Deploy flagships, Analysis of functionality, performance & financial model Towards an open market for Science

9 Broker-based architecture: the Blue Box Each customer and supplier have a single connection to the Blue Box resulting in M + N relationships

10 What is a Cloud Broker? According to Gartner, Cloud Brokers may be classified 3 different categories as intermediaries between Cloud Providers and Cloud Consumers: 1) Cloud Service Intermediation: The broker provides added value to a cloud service, enhancing some capabilities or guaranties offered by the underlying cloud provider to cloud consumers. 2) Aggregation: The broker acts as an integrator, combining several Cloud Provider services into one, ensuring security and governance of data circulating between the composing services. 3) Cloud Service Arbitrage: The broker continuously attempts to select the best cloud provider based on price/feature considerations, potentially changing and migrating data between providers frequently.

11 Blue Box: Security Goals Baseline security policy across the HN federation. Secure data transfer between providers. Well-defined security service levels. Security assurance/transparency for cloud services. Centralized (continuous) security monitoring and incident response.

12 Security Service Levels "If you can not measure it, you can not improve it. Lord Kelvin ( ) It is uncommon for cloud providers to specify the security level associated with their products and services. This limits informed customer decisions on security offerings: Despite the belief that my cloud provider seems secure, is it actually secure enough for my needs? Is my (confidential) data in the cloud more secure than in my data center? How do I compare different cloud offers with regards to security and price? If it s so important, then why is cloud security not measured?

13 Security Service Levels What makes it hard to measure cloud security? All the possible threats are not known. Quantitative vs. Qualitative vs. Uncertainty Technology-specificity: measuring security in cloud computing has several challenges e.g., IaaS-PaaS-SaaS supply chains. How to reason about measured cloud security? Security aggregation: drawing (useful) conclusions based on 100+ security controls. Security negotiation and adaptation (e.g., automated incident response). Specifying/standardizing security parameters in Cloud SLA s.

14 Security Assurance/Transparency The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers.

15 CSA STAR: Security, Trust & Assurance Registry Launched in 2011, the CSA STAR is the first step in improving transparency and assurance in the cloud. The STAR is a publicly accessible registry that documents the security controls provided by cloud computing offerings Helps users to assess the security of cloud providers Searchable registry to allow cloud customers to review the security practices of providers, accelerating their due diligence and leading to higher quality procurement experiences. It is based on a multilayered structure defined by Open Certification Framework Working Group

16 Continuous Security Monitoring Confidentiality level Uptime consumer CTP provider = Reports + Commitments + Alerts

17 Blue Box: Security requirements (at a glance) Authentication, Authorization and Accountability Role Based Access Control e.g. for remote management interface. Accountability security-related logging, signed timestamping, WORM functionality. Data lifecycle Secure de-provisioning/deletion/decommissioning (degauss etc ) Specific data export/portability requirements (formats, time limits) Cryptography Key management Crypto hardware/acceleration Entropy/randomness sources. Incident and vulnerability management Incident response services and service levels Testing requirements (e.g. external pen-testing) Third party security services used, interfaces required. Legal/Policy/Compliance Certifications Sector-specific laws applicable (e.g. for healthcare data). Processing of personal data Location/jurisdiction-limitations Third parties/subcontractors Breach notification requirements Maximum, minimum data retention Purpose limitation.

18 The road ahead Solving the security challenges associated with cloud brokers. Legacy security services. Don t forget high performance!

19 Thank you! All Helix Nebula public documents are held in an open access repository: https://cds.cern.ch/search?cc=helix+nebula&ln=en&jrec=1

A public-private partnership building a multidisciplinary cloud platform for data intensive science

A public-private partnership building a multidisciplinary cloud platform for data intensive science This document produced by Members of the Helix Nebula consortium is licensed under a Creative Commons Attribution 3.0 Unported License. Permissions beyond the scope of this license may be available at

More information

Cloud Competency Programme Workshop [1] Secure cloud services in a regulated environment

Cloud Competency Programme Workshop [1] Secure cloud services in a regulated environment Cloud Competency Programme Workshop [1] Secure cloud services in a regulated environment Rob Price Member, Cloud Industry Forum www.cloudindustryforum.org Last 2 years in Public Sector Cloud Public Cloud

More information

The ODCA, Helix Nebula and Federated Identity Management. Mick Symonds Principal Solutions Architect Atos Managed Services NL

The ODCA, Helix Nebula and Federated Identity Management. Mick Symonds Principal Solutions Architect Atos Managed Services NL The ODCA, Helix Nebula and Federated Identity Management Principal Solutions Architect Atos Managed Services NL Agenda The Open Data Center Alliance Helix Nebula Federated Identity Management as a service

More information

Helix Nebula, the Science Cloud

Helix Nebula, the Science Cloud Helix Nebula, the Science Cloud e-irg strategy workshop 11 & 12 June 2012 Maryline Lengert, ESA From Requirement Collection to Strategic Plan & Proof of Concept End 2010: ESA started collecting Cloud Computing

More information

Ontwikkelingen binnen cloud services (in het Engels)

Ontwikkelingen binnen cloud services (in het Engels) Ontwikkelingen binnen cloud services (in het Engels) DNB cloud computing symposium 20 juni 2013 More cloud services Summary Most organisations are currently thinking, maybe cloud, but but the world is

More information

A public-private partnership building a multidisciplinary cloud platform for data intensive science

A public-private partnership building a multidisciplinary cloud platform for data intensive science A public-private partnership building a multidisciplinary cloud platform for data intensive science Bob Jones Head of openlab IT dept CERN 3 September 2013 This document produced by Members of the Helix

More information

Scientific Cloud Computing Infrastructure for Europe. Bob Jones,

Scientific Cloud Computing Infrastructure for Europe. Bob Jones, Scientific Cloud Computing Infrastructure for Europe Bob Jones, IT department, CERN Origin of the initiative Conceived by ESA as a prospective for providing cloud services to the space sector in Europe

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

AGENDA. Trends 2014 De toekomst van ICT: wat is de impact van deze trends Onze visie op de toekomst van ICT. Onze aanpak & wat omvat OCC Q&A

AGENDA. Trends 2014 De toekomst van ICT: wat is de impact van deze trends Onze visie op de toekomst van ICT. Onze aanpak & wat omvat OCC Q&A 1 AGENDA Trends 2014 De toekomst van ICT: wat is de impact van deze trends Onze visie op de toekomst van ICT Onze oplossing: One Care Cloud (OCC) Onze aanpak & wat omvat OCC Q&A 2 3 The most interesting

More information

CERN s Scientific Programme and the need for computing resources

CERN s Scientific Programme and the need for computing resources This document produced by Members of the Helix Nebula consortium is licensed under a Creative Commons Attribution 3.0 Unported License. Permissions beyond the scope of this license may be available at

More information

The Cloud Security Alliance

The Cloud Security Alliance The Cloud Security Alliance Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Scientific Cloud Computing Infrastructure for Europe Strategic Plan. Bob Jones,

Scientific Cloud Computing Infrastructure for Europe Strategic Plan. Bob Jones, Scientific Cloud Computing Infrastructure for Europe Strategic Plan Bob Jones, IT department, CERN Origin of the initiative Conceived by ESA as a prospective for providing cloud services to space sector

More information

TOOLS and BEST PRACTICES

TOOLS and BEST PRACTICES TOOLS and BEST PRACTICES Daniele Catteddu Managing Director EMEA, Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within

More information

PICSE survey. (PICSE: Procurement Innovation for Cloud services in Europe)

PICSE survey. (PICSE: Procurement Innovation for Cloud services in Europe) PICSE survey (PICSE: Procurement Innovation for Cloud services in Europe) To ensure that Europe reaps the benefits of the shift to cloud computing, there is the need to focus on new ways of procuring cloud

More information

ITIL v3 Service Manager Bridge

ITIL v3 Service Manager Bridge ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

D:C-3.1 Requirements for cloud interoperability

D:C-3.1 Requirements for cloud interoperability Deliverable Number: D33.1 Work Package: WP 33 Version: Final Deliverable Lead Organisation: CSA Dissemination Level: PU Contractual Date of Delivery (release): 30 th September, 2013 Date of Delivery: 5

More information

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012 Cloud Security Alliance and Standards Jim Reavis Executive Director March 2012 About the CSA Global, not for profit, 501(c)6 organization Over 32,000 individual members, 120 corporate members, 60 chapters

More information

Synergies between the Big Data Value (BDV) Public Private Partnership and the Helix Nebula Initiative (HNI)

Synergies between the Big Data Value (BDV) Public Private Partnership and the Helix Nebula Initiative (HNI) Synergies between the Big Data Value (BDV) Public Private Partnership and the Helix Nebula Initiative (HNI) Sergio Andreozzi Strategy & Policy Manager, EGI.eu The Helix Nebula Initiative & PICSE: Towards

More information

A view from the Cloud Security Alliance peephole

A view from the Cloud Security Alliance peephole A view from the Cloud Security Alliance peephole Cloud One million new mobile devices - each day! Social Networking Digital Natives State Sponsored Cyberattacks? Organized Crime? Legal Jurisdiction & Data

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures

Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures Workprogramme 2013 objective 1.2 Sandro D Elia Software & Service Architectures and Infrastructures Target Outcomes Delivering services in an effective, efficient and reliable manner across the future

More information

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations

More information

Helix Nebula. by Johan Louter

Helix Nebula. by Johan Louter Helix Nebula by Johan Louter What happens in the Cloud Industry in Europe? Digital energy is an economic and strategic challenge. Europe should aim to be the world's leading trusted cloud region The fundamental

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD. Cloud Forward 2015 October 7 th

Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD. Cloud Forward 2015 October 7 th Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD Cloud Forward 2015 October 7 th WE CAN DIGITIZE ALMOST EVERYTHING. WE CAN CONNECT/ANALYZE EVERYTHING DIGITIZED 2 The

More information

Helix Nebula The Science Cloud

Helix Nebula The Science Cloud Helix Nebula The Science Cloud Abstract: This document outlines the current knowledge of the Helix Nebula Supplyside regarding the need for a structured. It introduces why such an architecture is needed.

More information

SPECS Secure Provisioning of Cloud Services based on SLA Management

SPECS Secure Provisioning of Cloud Services based on SLA Management SPECS Secure Provisioning of Cloud Services based on SLA Management SPECS Project CeRICT, Italy (coordinator) TUD, Germany IeAT, Romania CSA, United Kingdom FP7-ICT-10-610795 Project Start: 1/11/2013 Project

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

WHITEPAPER. Data Security for Office 365 Balancing control & usability

WHITEPAPER. Data Security for Office 365 Balancing control & usability WHITEPAPER Data Security for Office 365 Balancing control & usability Contents Executive Summary... 2 Top Security Issues for Office 365... 4 Compelled Disclosures... 4 Unauthorized Sharing... 4 External

More information

White Paper. Cloud Vademecum

White Paper. Cloud Vademecum White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route

More information

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive

More information

SixSq Cloud Capabilities

SixSq Cloud Capabilities SixSq Cloud Capabilities SlipStream: Mutli-cloud Management Platform Marc-Elian Bégin, CEO, Co-founder, SixSq HEPIA Cloud Masters, Lausanne, 2015 Locations Global Headquarters Geneva, Switzerland North

More information

Cloud & Trust. Dr. Jesus Luna, CSA Research Director EMEA. Copyright 2014 Cloud Security Alliance. www.cloudsecurityalliance.org

Cloud & Trust. Dr. Jesus Luna, CSA Research Director EMEA. Copyright 2014 Cloud Security Alliance. www.cloudsecurityalliance.org Cloud & Trust Dr. Jesus Luna, CSA Research Director EMEA Copyright 2014 Cloud Security Alliance Enter the cloud The cloud can deliver a net gain of 2.5 million new European jobs, and an annual boost of

More information

Enabling multi-cloud resources at CERN within the Helix Nebula project. D. Giordano (CERN IT-SDC) HEPiX Spring 2014 Workshop 23 May 2014

Enabling multi-cloud resources at CERN within the Helix Nebula project. D. Giordano (CERN IT-SDC) HEPiX Spring 2014 Workshop 23 May 2014 Enabling multi-cloud resources at CERN within the Helix Nebula project D. Giordano (CERN IT-) HEPiX Spring 2014 Workshop This document produced by Members of the Helix Nebula consortium is licensed under

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Sofware Engineering, Services and Cloud Computing

Sofware Engineering, Services and Cloud Computing Work Programme 2013 Objective ICT-2013.1.2: Sofware Engineering, Services and Cloud Computing DG CONNECT Unit E2: Software and Service, Cloud Target Outcomes Delivering services in an effective, efficient

More information

B2B Cloud Services. Transforming the B2B Integration Landscape. 2011 IBM Corporation

B2B Cloud Services. Transforming the B2B Integration Landscape. 2011 IBM Corporation B2B Cloud Services Transforming the B2B Integration Landscape Agenda Business Trends and Your Dynamic Business Network B2B and the Cloud A Vision for B2B Cloud Services 2 Disclaimer IBM s statements regarding

More information

Dr. Jesus Luna Garcia

Dr. Jesus Luna Garcia Cloud Accountability and SLAs: research challenges and opportunities Dr. Jesus Luna Garcia jluna@cloudsecurityalliance.org Outline Cloud SLA s one year ago Open Research Challenges: Standardization/certification

More information

ECONOMICS, SECURITY MANAGEMENT AND THE FUTURE INTERNET. Simon Shiu HP Labs 15 th April 2010

ECONOMICS, SECURITY MANAGEMENT AND THE FUTURE INTERNET. Simon Shiu HP Labs 15 th April 2010 ECONOMICS, SECURITY MANAGEMENT AND THE FUTURE INTERNET Simon Shiu HP Labs 15 th April 2010 1 Copyright Copyright 2010 Hewlett-Packard 2010 Development Development Company, Company, L.P. L.P. SYNOPSIS OF

More information

Making Sure Cloud Security is Not Up in Smoke: Integrating Protection in the Acquisition Process Digital Government Institute Cloud-Enabled

Making Sure Cloud Security is Not Up in Smoke: Integrating Protection in the Acquisition Process Digital Government Institute Cloud-Enabled Making Sure Cloud Security is Not Up in Smoke: Integrating Protection in the Acquisition Process Digital Government Institute Cloud-Enabled Government Conference & Expo September 22, 2011 Disclaimer This

More information

Ironside Group Rational Solutions

Ironside Group Rational Solutions Ironside Group Rational Solutions IBM Cloud Orchestrator Accelerate the pace of your business innovation Richard Thomas IBM Cloud Management Platforms thomas1@us.ibm.com IBM Cloud Orchestrator Business

More information

SOA and API Management

SOA and API Management SOA and API Management Leveraging Your Investment in Service Orientation Version 1.0 December 2013 John Falkl General Manager, Technology, Strategy & Integration Haddon Hill Group, Inc. Contents Introduction...

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com info@distology.com detecting the unknown Integrity

More information

Helix Nebula, the Science Cloud: Potential for Earth Science Franco-British Workshop on Big Data in Science 6-7 November 2012

Helix Nebula, the Science Cloud: Potential for Earth Science Franco-British Workshop on Big Data in Science 6-7 November 2012 Helix Nebula, the Science Cloud: Potential for Earth Science 6-7 November 2012 Strategic Goal Helix Nebula, the Science Cloud is a partnership that has been created to support the massive IT requirements

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

Achieve ITIL Compliance with APTARE. Leveraging the Information Technology Infrastructure Library for Managed Services Providers (MSPs)

Achieve ITIL Compliance with APTARE. Leveraging the Information Technology Infrastructure Library for Managed Services Providers (MSPs) Leveraging the Information Technology Infrastructure Library for Managed s Providers (MSPs) Contents 1. What is ITIL?... 3 2. APTARE & ITIL... 4 2.1. Level... 5 2.2. Asset & Configuration... 6 2.2.1. Capacity...

More information

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015 NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

Making SLA s Useful for Security

Making SLA s Useful for Security Making SLA s Useful for Security Neeraj Suri www.deeds.informatik.tu-darmstadt.de 11/15/2013 Suri/CIRRUS 1 Service Level Agreement (SLA) Contract which describes the Service, the associated quality levels

More information

Public Cloud Workshop Offerings

Public Cloud Workshop Offerings Cloud Perspectives a division of Woodward Systems Inc. Public Cloud Workshop Offerings Cloud Computing Measurement and Governance in the Cloud Duration: 1 Day Purpose: This workshop will benefit those

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2014 through September 30, 2015 Independent SOC 3 Report for the Security and Availability Trust

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Secure HIPAA Compliant Cloud Computing

Secure HIPAA Compliant Cloud Computing BUSINESS WHITE PAPER Secure HIPAA Compliant Cloud Computing Step-by-step guide for achieving HIPAA compliance and safeguarding your PHI in a cloud computing environment Step-by-Step Guide for Choosing

More information

Redesigning IT Service Organization for Digital Era

Redesigning IT Service Organization for Digital Era 1 28/11/2014 Redesigning IT Service Organization for Digital Era Digital Era 3 28/11/2014 IT Organization redesign drivers 4 28/11/2014 Business Model Transformation General approach Performance bottlenecks

More information

Cloud Channel Summit 2015 @rhipecloud #RCCS15

Cloud Channel Summit 2015 @rhipecloud #RCCS15 Cloud Channel Summit 2015 @rhipecloud #RCCS15 About the Cloud Security Alliance Global, not-for-profit organisation 300 member driven organization with over 56,000 individual members in 65 chapters worldwide

More information

Complete Database Security. Thomas Kyte http://asktom.oracle.com/

Complete Database Security. Thomas Kyte http://asktom.oracle.com/ Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright

More information

Building an Effective

Building an Effective Building an Effective Cloud Security Program Becky Swain Co-Founder/Chair, CSA CCM Board Member, CSA Silicon Valley Chapter Partner, EKKO Consulting Marlin Pohlman Co-Chair, CSA CCM Co-Chair/Founder, CSA

More information

Nine Network Considerations in the New HIPAA Landscape

Nine Network Considerations in the New HIPAA Landscape Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant

More information

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise

More information

Global Efforts to Secure Cloud Computing

Global Efforts to Secure Cloud Computing April 2012 Global Efforts to Secure Cloud Computing Jim Reavis Executive Director Cloud: ushering in IT Spring Technology consumerization and its offspring Cloud: Compute as a utility Smart Mobility: Compute

More information

3 rd -party Security Risk Assessment

3 rd -party Security Risk Assessment 3 rd -party Security Risk Assessment Understanding Supplier Chain Risks. Presented by: Nasser Fattah CISSP, CISM, CISA, CGEIT Email: nasser.fattah@gmail.com Linkedin: www.linkedin.com/in/nasserfattah April

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

Defining Generic Architecture for Cloud Infrastructure as a Service Model

Defining Generic Architecture for Cloud Infrastructure as a Service Model Defining Generic Architecture for Cloud Infrastructure as a Service Model Yuri Demchenko 1 University of Amsterdam Science Park 904, Amsterdam, The Netherlands E-mail: y.demchenko@uva.nl Cees de Laat University

More information

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better

More information

SAFECode Security Development Lifecycle (SDL)

SAFECode Security Development Lifecycle (SDL) SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group akarmel@c2labs.com @anilkarmel Emerging Technologies

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Adopting Cloud Computing with a RISK Mitigation Strategy

Adopting Cloud Computing with a RISK Mitigation Strategy Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines

More information

Why & How Cloud computing is enabling the digital transformation of financial services institutions

Why & How Cloud computing is enabling the digital transformation of financial services institutions Why & How Cloud computing is enabling the digital transformation of financial services institutions There s no one billion customer bank yet, because there s no way to do it without cloud. Next generation

More information

Managing Cloud Data Security in Regulated Industries for 2016

Managing Cloud Data Security in Regulated Industries for 2016 Managing Cloud Data Security in Regulated Industries for 2016 November, 2015 Table of Contents I. Introduction: Security challenges in regulated industries...1 II. Cloud adoption rates by industries...1

More information

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation

More information

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a

More information

CIO SUMMIT l LAS VEGAS

CIO SUMMIT l LAS VEGAS CIO SUMMIT l LAS VEGAS Copyright 2014 EMC Corporation. All rights reserved. 1 IT Transformation Facilitator: Tom Roloff, SVP Global Services, EMC Many Industries Face Structural Change 3 Today s Business

More information

Agenda. What is cloud? Cloud based services The Good bad and Ugly.. Anatomy of a cloud Guidelines for you

Agenda. What is cloud? Cloud based services The Good bad and Ugly.. Anatomy of a cloud Guidelines for you Agenda What is cloud? Cloud based services The Good bad and Ugly.. Anatomy of a cloud Guidelines for you What is Cloud Computing? Compute as a utility: third major era of computing Cloud enabled by Moore

More information

Best Practices in Contract Migration

Best Practices in Contract Migration ebook Best Practices in Contract Migration Why You Should & How to Do It Introducing Contract Migration Organizations have as many as 10,000-200,000 contracts, perhaps more, yet very few organizations

More information

Why companies in the EU are adopting more and more cloud-based security solutions?

Why companies in the EU are adopting more and more cloud-based security solutions? Transforming IT Security & Compliance Why companies in the EU are adopting more and more cloud-based security solutions? Jörg Vollmer, Qualys GmbH jvollmer@qualys.com Itsa Nürnberg, Forum Rot 09. November

More information

Improving Health through Information:

Improving Health through Information: Improving Health through Information: The Future of e-business in Hospitals Jeffrey D. Miller Vice President WW Public Sector, Health, and Education Hewlett-Packard Company 2006 Hewlett-Packard Development

More information

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014 CAS8489 Delivering Security as a Service (SIEMaaS) November 2014 Usman Choudhary Senior Director usman@netiq.com Rajeev Khanolkar CEO SecurView Agenda What is Security Monitoring? Definition & concepts

More information

The Copernicus Value Chain Workshop

The Copernicus Value Chain Workshop The Copernicus Value Chain Workshop Panelist: Mick Symonds Atos and Helix Nebula 26 27 April 2016 Brussels, Belgium DG GROW Slide 1-2: introduction about yourself and your organisation Atos is a leader

More information

Team A SaaS Strategy

Team A SaaS Strategy Team A SaaS Strategy What is a strategy? Strategy is the direction and scope of an organization over the long-term term: : which achieves advantages for the organization through its configuration of resources

More information

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications

More information

Technology Strategy Board Driving Innovation. Digital

Technology Strategy Board Driving Innovation. Digital Technology Strategy Board Driving Innovation Digital October 2010 02 Technology Strategy Board Digital Digital Working with business to tackle digital challenges Digital technologies are now an essential

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Security and Cloud Computing

Security and Cloud Computing Martin Borrett, Lead Security Architect, Europe, IBM 9 th December 2010 Outline Brief Introduction to Cloud Computing Security: Grand Challenge for the Adoption of Cloud Computing IBM and Cloud Security

More information

Securing SharePoint 101. Rob Rachwald Imperva

Securing SharePoint 101. Rob Rachwald Imperva Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal

More information

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.

More information

CITY UNIVERSITY OF HONG KONG

CITY UNIVERSITY OF HONG KONG CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

Delivery date: 18 October 2014

Delivery date: 18 October 2014 Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group

More information

Six Steps to SSL Certificate Lifecycle Management

Six Steps to SSL Certificate Lifecycle Management Six Steps to SSL Certificate Lifecycle Management Why you need an SSL certificate management solution and how to get started +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Consequences

More information