ETSI -Standards in the cloud Mobile internet and cloud computing. Adam Heywood Senior Director, Europe Technical Sales

Size: px
Start display at page:

Download "ETSI -Standards in the cloud Mobile internet and cloud computing. Adam Heywood Senior Director, Europe Technical Sales"

Transcription

1 ETSI -Standards in the cloud Mobile internet and cloud computing Adam Heywood Senior Director, Europe Technical Sales

2 Presenter Biography Adam Heywood Adam Heywood is Senior Director of Technical Presales for CA Technologies security management business in EMEA. Adam has worked in the enterprise IT infrastructure market place for over 25 years, most recently he joined CA Technologies through the acquisition of Netegrityand has over 12 years experience in the IT security management marketplace. Internally to CA Adam provides detailed and trusted input to the development and product management organisations, influencing solution directions and plans. Adam also plays an active role in supporting CA Technologies customers and is able to provide honest and constructive input at many levels, from business requirements and drivers, through solution propositions, to technology details. Adam acts as a trusted advisor to many Fortune 100 companies and public sector agencies around their security strategy and technical architecture.

3 Event/Workshop background. As for all major technology shifts, Cloud computing offers a vast array of opportunities and poses a number of questions, from policy, technology, business and usage perspectives. The technology shift ('ubiquitous computing') poses the questions of new value chains and respective roles of market players both in the infrastructure segment as well as for the applications/services segments; The markets currently shaping up pose questions with regards to policy, regulation and standards: how to best enable the emergence of new ecosystems, support innovation while ensuring an adequate level of interoperability and consumer protection? The borderless nature of the cloud ('where is the data?') poses questions with regards to data security, data privacy, jurisdictions and liability. Standards are only part of the equation, but an essential one, because they contribute to creating an interoperable environment of transparency, reliability and accountability and ultimately confidence for all the agents in the process of cloud adoption. Yet cloud computing standards also need to take into account policy and regulatory requirements, which add to the challenge for all stakeholders involved in the process. The EU and the US are both engaged in large scale efforts to devise standards for cloud computing be it at infrastructure, service or application level. In order to support this dialogue, an EU-US event on standards for cloud computing is co-organized by the EC and ETSI in partnership with NIST, EuroCIO and Eurocloud. 3 October 3, 2011 [Insert PPT Name via Insert tab > Header & Footer] Copyright 2011 CA. All rights reserved.

4 Event/Workshop goals. GOALS OF THIS WORKSHOP Drill down the issues of standards for cloud computing from 3 major angles * Policy * Industry and markets (supply and demand side) * Standards and interoperability Gather elements to devise a standards roadmap for EU, including priorities, players and processes EXPECTED OUTCOMES AND DELIVERABLES Inventory of major policy issues and their impact on standards-making Inventory of Industry agenda/requirements Mapping of existing standards landscape Next steps and priorities for an EU/US cooperation on cloud standards WHO SHOULD ATTEND? Policy makers CIOs ITC industry and service companies Standardization strategists Business development leaders Public Affairs managers Minute speaking slot on Mobile internet and cloud computing in Stream #2 Services and Applications 4 October 3, 2011 [Insert PPT Name via Insert tab > Header & Footer] Copyright 2011 CA. All rights reserved.

5 Event/Workshop location The meeting willltake place at CICA 2229, route des Crêtes Valbonne Sophia Antipolis France Access map 5 October 3, 2011 [Insert PPT Name via Insert tab > Header & Footer] Copyright 2011 CA. All rights reserved.

6 Abstract Mobile internet and cloud computing Clearly clouding computing has arrived, impeding its adoption are concerns about security, and more specifically identity & access management; who owns the identity, how is it trusted, what can the identity access, etc. Another clear trend is consumerisationand mobile computing, no longer are access devices managed and wholly trusted, but their use needs to be allowed, understood, and controlled. Is traditional Identity and Access Management still relevant and sufficient to meet the demands of mobile internet and cloud computing? This presentation is intended to discuss these challenged and pose potential opportunities to address them.

7 I am going to discuss the elephant in the room Cloud Security

8 Cloud adoption concerns: *87.5% rate cloud security issues as very significant * IDC Survey

9 #1 area that needs focus for migration to the Cloud? Identity and Access Management (IAM)! The top five critical areas of focus for organizations migrating to the cloud environment Important & very important response for US and Europe combined Identity and access management 50% Business continuity and disaster recovery 47% Procedures for electronic discovery 46% Compliance and audit 40% Encryption and key management 39% 0% 10% 20% 30% 40% 50% Security of Cloud Computing Users A Study of US & EMEA IT Practitioners, Ponemon Institute.

10 Why is Identity and Access Management (IAM), cloud and mobile access more Important than ever? SaaS Adoption Mobile Workforce and IT Consumerisation Nearly 90 percent of organizations surveyed expect to maintain or grow their usage of software as a service (SaaS), citing cost-effectiveness and ease/speed of deployment By the end of 2013 mobile worker population is expected to exceed 75% and to 1.19bn globally. Tablet PCs will outsell Netbooks and Desktops by 2013 (ipads outsold Macs by 2 to 1 in ). Customer Confidence Over 70% people surveyed believe authentication effects the degree of customer trust in the security offered. Increasing ecrime Regulatory Pressures Information Explosion More than 11 million adult consumers became victims of identity fraud in 2009, up from nearly 10 million in The number of fraud victims rose for the second year in a row Organizations that regularly review and maintain regulatory and standards compliance spend about three times less annually than organizations that fall out of compliance. Cloud Data Volumes are increasing Exponentially at a factor of x250 per annum

11 Is Identity and Access Management sufficient for mobile Internet and cloud computing? What do we really mean by Identity and Access Management in a mobile internet and cloud computing context? Identity Management who are you? Do we trust you? Do we believe it is you this time? Does each provider need to have its own identity data/context? Access Management to what? To allow access does this mean we need to have your identity? Do we need to understand where you are? Do we need to understand what device you are using? Can Identity and Access Management deliver what is required of mobile Internet and cloud computing? IAM typically does not take into consideration geo-location/context, or the content of what is actually being accessed.

12 Identity and Access Management for mobile Internet and cloud computing questions Is Identity management in a cloud context sufficient? Does each provider need to maintain identity data? What about geo data compliance? Can Identity, credentials, location, device, be represented by level of trust (Risk score)? Is access management for access to a cloud resource still relevant? At a course level possibly However, the content of what is being accessed is probably more important than where it is located. Can management of Identity and Access be abstracted across all environments and providers?

13 Identity and Access Management for mobile Internet and cloud computing, a possible answer Consider building security frameworks/guidelines/standards: 1. for how identity/context trust is derived, where appropriate leveraging other trust frameworks, including Device Identity Credentials used Geo location Etc That defines level of trust -Risk 2. for how content of what can be accessed is classified - Classification These tools allow of the definition and management of policies that specifies that to access content classified as Secret the level of trust has to be greater than or equal to Security cleared.

14 ETSI -Standards in the cloud Mobile internet and cloud computing Questions

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

Using the Cloud for Business Resilience

Using the Cloud for Business Resilience Allen Downs IBM Business Continuity and Resiliency Services Using the Cloud for Business Resilience June 20, 2011 1 Agenda Why resiliency matters A successful cloud-based approach to resiliency Moving

More information

Removing barriers to Cloud Computing in Europe Open Workshop

Removing barriers to Cloud Computing in Europe Open Workshop Removing barriers to Cloud Computing in Europe Open Workshop SMART 2011/0045 - Open workshop By David Bradshaw, Gabriella Cattaneo, Giuliana Folco, IDC Thursday May 10, 2012- Brussels Copyright IDC. Reproduction

More information

HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA

HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA Executive Summary While a number of organizations are gaining experience and increased

More information

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform

More information

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape

More information

Achieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs

Achieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs Achieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Why & How Cloud computing is enabling the digital transformation of financial services institutions

Why & How Cloud computing is enabling the digital transformation of financial services institutions Why & How Cloud computing is enabling the digital transformation of financial services institutions There s no one billion customer bank yet, because there s no way to do it without cloud. Next generation

More information

How Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008

How Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008 How Managed Services Has Changed Remote Infrastructure Management Presented by: Bill Whitney March 26, 2008 Why are businesses looking to partners such as Managed Service Providers (MSPs) for remote infrastructure

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive

More information

Standards in the Digital Single Market: setting priorities and ensuring delivery

Standards in the Digital Single Market: setting priorities and ensuring delivery Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information

More information

Global Efforts to Secure Cloud Computing

Global Efforts to Secure Cloud Computing April 2012 Global Efforts to Secure Cloud Computing Jim Reavis Executive Director Cloud: ushering in IT Spring Technology consumerization and its offspring Cloud: Compute as a utility Smart Mobility: Compute

More information

Cloud Vendor Benchmark 2015 A Comparison of Cloud Computing Vendors and Service Providers

Cloud Vendor Benchmark 2015 A Comparison of Cloud Computing Vendors and Service Providers Cloud Pervasive Computing Driver No.1 An The Overview digital world of is becoming German a reality, and Swiss and more Cloud so each Computing day. E-commerce, Market online advertising, mobile applications

More information

Berlin, 15 th November 2013. Mark Dunne SaaSAssurance

Berlin, 15 th November 2013. Mark Dunne SaaSAssurance Berlin, 15 th November 2013 Mark Dunne SaaSAssurance SaaSAssurance guidance to Irish Government on Cloud Adoption Who are SaaSAssurance? Diverse multilingual European team Focus on the here and now Digital

More information

What you need to know about cloud backup: your guide to cost, security and flexibility.

What you need to know about cloud backup: your guide to cost, security and flexibility. What you need to know about cloud backup: your guide to cost, security and flexibility. Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

Design Authority Service

Design Authority Service Service Service Definition Government Procurement Service - G-Cloud Services III - Q-LOT4-5 February 2013 Contact: GCloud@sapient.com Service Contents Contents 01 Executive Summary...3 02 Service...3 03

More information

techuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption

techuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption techuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption Introduction Cloud computing is fundamental to the UK s digital future. The next wave of the digital revolution is being powered

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

More information

Key Considerations of Regulatory Compliance in the Public Cloud

Key Considerations of Regulatory Compliance in the Public Cloud Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 w_haskins-hafer@intuit.com Disclaimer Unless otherwise specified,

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Optimizing the Data Center for Today s State & Local Government

Optimizing the Data Center for Today s State & Local Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this

More information

Identity Relationship Management

Identity Relationship Management November 2013 Identity Relationship Management Identity Relationship Management Identity Relationship Management Kantara Initiative, Believers of the World Unite. The Internet of Things is completely redefining

More information

Unified Communications and the Cloud

Unified Communications and the Cloud Unified Communications and the Cloud Abstract Much has been said of the term cloud computing and the role it will play in the communications ecosystem today. Undoubtedly it is one of the most overused

More information

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o

More information

EuroCloud Deutschland_eco e.v. Cloud Computing is the future! For sure! But secure!

EuroCloud Deutschland_eco e.v. Cloud Computing is the future! For sure! But secure! Cloud Computing is the future! For sure! But secure! ISO/IEC JTC1 national day 2011 The EuroCloud Network EuroCloud Europe was founded on Jan., 22 nd 2010 in Paris Today EuroCloud is present in 27 European

More information

A Roadmap for Future Architectures and Services for Manufacturing. Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015

A Roadmap for Future Architectures and Services for Manufacturing. Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015 A Roadmap for Future Architectures and Services for Manufacturing Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015 Road4FAME in a nutshell Road4FAME = Development of a Strategic

More information

Perspectives. Employee voice. Releasing voice for sustainable business success

Perspectives. Employee voice. Releasing voice for sustainable business success Perspectives Employee voice Releasing voice for sustainable business success Empower, listen to, and act on employee voice through meaningful surveys to help kick start the UK economy. 2 Releasing voice

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public. Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement

More information

The Challenges of Application Service Hosting

The Challenges of Application Service Hosting The Challenges of Application Service Hosting Ike Nassi, Joydip Das, and Ming-Chien Shan SAP America 3410 Hillview Avenue, Palo Alto, CA 94304 ming-chien.shan@sap.com Abstract. In this paper, we discuss

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

Leveraging the Cloud for your Business

Leveraging the Cloud for your Business Leveraging the Cloud for your Business Save money and time by moving to the cloud Learn how Moving to the Cloud 3 from small and mid-sized businesses (SMBs) to Enterprise Companies. What problems can cloud

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Security It s an ecosystem thing

Security It s an ecosystem thing Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Working Group on. First Working Group Meeting 29.5.2012

Working Group on. First Working Group Meeting 29.5.2012 Working Group on Cloud Security and Privacy (WGCSP) First Working Group Meeting 29.5.2012 1 Review of fexisting i Standards d and Best Practices on Cloud Security Security Standards and Status List of

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

The Need for Service Catalog Design in Cloud Services Development

The Need for Service Catalog Design in Cloud Services Development The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental

More information

Symantec Security Program Assessment

Symantec Security Program Assessment Leverage security maturity to prioritize achievement of enterprise goals The Symantec Security Program Assessment evaluates the maturity of your information security program providing an understanding

More information

The State of IT Transformation for Healthcare

The State of IT Transformation for Healthcare The State of IT Transformation for Healthcare An Analysis by EMC and VMware EMC and VMware are helping IT groups at healthcare organizations transform to business-focused service providers. The State of

More information

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014 KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition

More information

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. From PC to Workplace Productivity Chris Ingle Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda How Did We Get Here? Evolving Employee Expectations Rapidly Developing

More information

CLOUD COMPUTING - OPPORTUNITIES

CLOUD COMPUTING - OPPORTUNITIES CLOUD COMPUTING - OPPORTUNITIES White Paper Batoi Systems Pvt Ltd www.batoi.com BATOI SYSTEMS PVT LTD, 2016. Published by BATOI SYSTEMS (P) LIMITED of 421, Saheed Nagar, Bhubaneswar 751 007 (INDIA), registered

More information

Cloud Consulting Services

Cloud Consulting Services Cloud Data Center Business Intelligence Enterprise Computing Solutions Services Cloud Consulting Services Service Overview Embarking on the road to cloud computing is not a simple journey and shouldn t

More information

Cloud Computing Security Issues

Cloud Computing Security Issues Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,

More information

Security of Cloud Computing Providers Study

Security of Cloud Computing Providers Study Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,

More information

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT European Cloud Computing Cloud standards Strategy Ken Ducatel DG CONNECT The Cloud Computing Strategy The European Commission's strategy 'Unleashing the potential of cloud computing in Europe' Adopted

More information

TECHNOLOGY STRATEGY AUDIT

TECHNOLOGY STRATEGY AUDIT TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series

More information

Security of Cloud Computing Providers Study

Security of Cloud Computing Providers Study Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary

More information

BYOD(evice) without BYOI(nsecurity)

BYOD(evice) without BYOI(nsecurity) BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device

More information

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: 2013. Document Version Preprint (usually an early version)

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: 2013. Document Version Preprint (usually an early version) Aalborg Universitet Cloud Governance Berthing, Hans Henrik Aabenhus Publication date: 2013 Document Version Preprint (usually an early version) Link to publication from Aalborg University Citation for

More information

Secure Data Transmission Solutions for the Management and Control of Big Data

Secure Data Transmission Solutions for the Management and Control of Big Data Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE

More information

Quadrennial Energy Review

Quadrennial Energy Review Quadrennial Energy Review Comments by FirstFuel Software, Inc. May 4, 2016 FirstFuel Software, Inc. respectfully submits the following comments as a participant in the U.S. Department of Energy s (DOE)

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

Cloud email Security solutions

Cloud email Security solutions Cloud email Security solutions THE MARKET OPPORTUNITY KEY MESSAGES The security market is a very dynamic and evolving market - Threats are rapidly increasing in sophistication and severity - New technologies,

More information

Supporting information technology risk management

Supporting information technology risk management IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management

More information

20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in

20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in ho2099@sib.co.in A monthly publication from South Indian Bank 20 th Year of Publication Experience

More information

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS Security solutions for patient and provider access AT A GLANCE Healthcare organizations of all sizes are responding to the demands of patients, physicians,

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

The Hybrid Cloud Security Professional

The Hybrid Cloud Security Professional The Hybrid Cloud Security Professional As cloud computing continues to evolve, the role of the hybrid cloud security professional provides an interesting study in enterprise operations and individual education

More information

Enhancing Security for Next Generation Networks and Cloud Computing

Enhancing Security for Next Generation Networks and Cloud Computing V1.0 Enhancing Security for Next Generation Networks and Cloud Computing Tony Rutkowski Yaana Technologies Georgia Tech ITU-T Q.4/17 Rapporteur ETSI Workshop 19-20 January 2011 Sophia Antipolis, France

More information

Accenture and Oracle: Leading the IoT Revolution

Accenture and Oracle: Leading the IoT Revolution Accenture and Oracle: Leading the IoT Revolution ACCENTURE AND ORACLE The Internet of Things (IoT) is rapidly moving from concept to reality, as companies see the value of connecting a range of sensors,

More information

The changing role of the IT department in a cloud-based world. Vodafone Power to you

The changing role of the IT department in a cloud-based world. Vodafone Power to you The changing role of the IT department in a cloud-based world Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends,

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Chapter 2. Migrating into a Cloud

Chapter 2. Migrating into a Cloud (a) Introduction Chapter 2. Migrating into a Cloud - Cloud computing: a disruptive model of IT * Part technology and part business model * Raised the IT expectations of small and medium enterprises * Large

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d f o r E d g e D a t a P r o t e c t i o n w i t

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud Adding value as a Cloud Broker Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner Dell.com/Cloud Overview A. Added Value Brokers in all industries in Digital Era B. Experience of Cloud Marketplace

More information

Key Management Best Practices

Key Management Best Practices White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult

More information

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu 2 If cloud computing is so simple, then what s the big deal? What is the

More information

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable

More information

Enabling Integrated Care

Enabling Integrated Care Enabling Integrated Care Harnessing personal health systems for better outcomes across the care continuum Briefing Note for a SmartPersonalHealth Workshop WoHIT, Thursday 18 March 2010, 13:00-17:00, Barcelona

More information

The Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service

The Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service The Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service Introduction and overview of the workshop Alex Delis and Michael Pantazoglou, University of Athens www.sucreproject.eu

More information

6 Cloud computing overview

6 Cloud computing overview 6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

CIOs: How to Become the CEO s Business Partner

CIOs: How to Become the CEO s Business Partner CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

www.cloudcomputingintelligence.com PREDICTIONS FOR 2016

www.cloudcomputingintelligence.com PREDICTIONS FOR 2016 Cloud Computing Intelligence www.cloudcomputingintelligence.com PREDICTIONS FOR 2016 The data race is on for 2016 Tableau s Bob Middleton spells out his top ten trends for 2016, from cloud price wars to

More information

Celsius CELSIUS HELPS IMPLEMENT LENOVO S MARKETING STRATEGY SHIFT. International INTRODUCTION. Background BACKGROUND

Celsius CELSIUS HELPS IMPLEMENT LENOVO S MARKETING STRATEGY SHIFT. International INTRODUCTION. Background BACKGROUND CELSIUS HELPS IMPLEMENT LENOVO S MARKETING STRATEGY SHIFT INTRODUCTION Lenovo, the world s largest manufacturer of PCs, laptops and tablets and now a major force in servers and storage, approached, their

More information

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

Mobility in Claims Management

Mobility in Claims Management January 2014 Mobility in Claims Management Aparna Krishnan, SENIOR BUSINESS ANALYST, BFSI-Insurance Practice 2 CONTENTS CLAIMS TRANSFORMATION IS THE WAY TO GO 3 BUSINESS DRIVERS FOR ADOPTING MOBILE SOLUTIONS

More information

new services: the next step the group strategy is about new usages explosion of volumes and new usages emerging

new services: the next step the group strategy is about new usages explosion of volumes and new usages emerging new services: the next step Thierry ZYLBERBERG executive VP strategic marketing the group strategy is about new usages explosion of volumes and new usages emerging administration transport education citizen

More information

Cloud computing: benefits, risks and recommendations for information security

Cloud computing: benefits, risks and recommendations for information security Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation

More information

Information Technology: This Year s Hot Issue - Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.

More information

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible

SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible You don t. But you can get complete visibility to the cloud

More information

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our

More information

The Digital Identity Ecosystem of the States: Securing the Enterprise

The Digital Identity Ecosystem of the States: Securing the Enterprise The Digital Identity Ecosystem of the States: Securing the Enterprise Security Industry Alliance September 28, 2011 Doug Robinson, Executive Director National Association of State Chief Information Officers

More information

WHITE PAPER. IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources

WHITE PAPER. IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources WHITE PAPER IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources Table of Contents IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources... 3 Cloud

More information

FUJITSU SPECIAL FEATURE. Transforming Retail with the Power of Cloud Mike Goodwin, CIO, Hallmark Cards

FUJITSU SPECIAL FEATURE. Transforming Retail with the Power of Cloud Mike Goodwin, CIO, Hallmark Cards FUJITSU SPECIAL FEATURE Transforming Retail with the Power of Cloud Mike Goodwin, CIO, Hallmark Cards ADVERTISEMENT Transferring our experience to you Ask the experts Whether you want to benefit from the

More information