ETSI -Standards in the cloud Mobile internet and cloud computing. Adam Heywood Senior Director, Europe Technical Sales
|
|
- Robert Kenneth Rich
- 7 years ago
- Views:
Transcription
1 ETSI -Standards in the cloud Mobile internet and cloud computing Adam Heywood Senior Director, Europe Technical Sales
2 Presenter Biography Adam Heywood Adam Heywood is Senior Director of Technical Presales for CA Technologies security management business in EMEA. Adam has worked in the enterprise IT infrastructure market place for over 25 years, most recently he joined CA Technologies through the acquisition of Netegrityand has over 12 years experience in the IT security management marketplace. Internally to CA Adam provides detailed and trusted input to the development and product management organisations, influencing solution directions and plans. Adam also plays an active role in supporting CA Technologies customers and is able to provide honest and constructive input at many levels, from business requirements and drivers, through solution propositions, to technology details. Adam acts as a trusted advisor to many Fortune 100 companies and public sector agencies around their security strategy and technical architecture.
3 Event/Workshop background. As for all major technology shifts, Cloud computing offers a vast array of opportunities and poses a number of questions, from policy, technology, business and usage perspectives. The technology shift ('ubiquitous computing') poses the questions of new value chains and respective roles of market players both in the infrastructure segment as well as for the applications/services segments; The markets currently shaping up pose questions with regards to policy, regulation and standards: how to best enable the emergence of new ecosystems, support innovation while ensuring an adequate level of interoperability and consumer protection? The borderless nature of the cloud ('where is the data?') poses questions with regards to data security, data privacy, jurisdictions and liability. Standards are only part of the equation, but an essential one, because they contribute to creating an interoperable environment of transparency, reliability and accountability and ultimately confidence for all the agents in the process of cloud adoption. Yet cloud computing standards also need to take into account policy and regulatory requirements, which add to the challenge for all stakeholders involved in the process. The EU and the US are both engaged in large scale efforts to devise standards for cloud computing be it at infrastructure, service or application level. In order to support this dialogue, an EU-US event on standards for cloud computing is co-organized by the EC and ETSI in partnership with NIST, EuroCIO and Eurocloud. 3 October 3, 2011 [Insert PPT Name via Insert tab > Header & Footer] Copyright 2011 CA. All rights reserved.
4 Event/Workshop goals. GOALS OF THIS WORKSHOP Drill down the issues of standards for cloud computing from 3 major angles * Policy * Industry and markets (supply and demand side) * Standards and interoperability Gather elements to devise a standards roadmap for EU, including priorities, players and processes EXPECTED OUTCOMES AND DELIVERABLES Inventory of major policy issues and their impact on standards-making Inventory of Industry agenda/requirements Mapping of existing standards landscape Next steps and priorities for an EU/US cooperation on cloud standards WHO SHOULD ATTEND? Policy makers CIOs ITC industry and service companies Standardization strategists Business development leaders Public Affairs managers Minute speaking slot on Mobile internet and cloud computing in Stream #2 Services and Applications 4 October 3, 2011 [Insert PPT Name via Insert tab > Header & Footer] Copyright 2011 CA. All rights reserved.
5 Event/Workshop location The meeting willltake place at CICA 2229, route des Crêtes Valbonne Sophia Antipolis France Access map 5 October 3, 2011 [Insert PPT Name via Insert tab > Header & Footer] Copyright 2011 CA. All rights reserved.
6 Abstract Mobile internet and cloud computing Clearly clouding computing has arrived, impeding its adoption are concerns about security, and more specifically identity & access management; who owns the identity, how is it trusted, what can the identity access, etc. Another clear trend is consumerisationand mobile computing, no longer are access devices managed and wholly trusted, but their use needs to be allowed, understood, and controlled. Is traditional Identity and Access Management still relevant and sufficient to meet the demands of mobile internet and cloud computing? This presentation is intended to discuss these challenged and pose potential opportunities to address them.
7 I am going to discuss the elephant in the room Cloud Security
8 Cloud adoption concerns: *87.5% rate cloud security issues as very significant * IDC Survey
9 #1 area that needs focus for migration to the Cloud? Identity and Access Management (IAM)! The top five critical areas of focus for organizations migrating to the cloud environment Important & very important response for US and Europe combined Identity and access management 50% Business continuity and disaster recovery 47% Procedures for electronic discovery 46% Compliance and audit 40% Encryption and key management 39% 0% 10% 20% 30% 40% 50% Security of Cloud Computing Users A Study of US & EMEA IT Practitioners, Ponemon Institute.
10 Why is Identity and Access Management (IAM), cloud and mobile access more Important than ever? SaaS Adoption Mobile Workforce and IT Consumerisation Nearly 90 percent of organizations surveyed expect to maintain or grow their usage of software as a service (SaaS), citing cost-effectiveness and ease/speed of deployment By the end of 2013 mobile worker population is expected to exceed 75% and to 1.19bn globally. Tablet PCs will outsell Netbooks and Desktops by 2013 (ipads outsold Macs by 2 to 1 in ). Customer Confidence Over 70% people surveyed believe authentication effects the degree of customer trust in the security offered. Increasing ecrime Regulatory Pressures Information Explosion More than 11 million adult consumers became victims of identity fraud in 2009, up from nearly 10 million in The number of fraud victims rose for the second year in a row Organizations that regularly review and maintain regulatory and standards compliance spend about three times less annually than organizations that fall out of compliance. Cloud Data Volumes are increasing Exponentially at a factor of x250 per annum
11 Is Identity and Access Management sufficient for mobile Internet and cloud computing? What do we really mean by Identity and Access Management in a mobile internet and cloud computing context? Identity Management who are you? Do we trust you? Do we believe it is you this time? Does each provider need to have its own identity data/context? Access Management to what? To allow access does this mean we need to have your identity? Do we need to understand where you are? Do we need to understand what device you are using? Can Identity and Access Management deliver what is required of mobile Internet and cloud computing? IAM typically does not take into consideration geo-location/context, or the content of what is actually being accessed.
12 Identity and Access Management for mobile Internet and cloud computing questions Is Identity management in a cloud context sufficient? Does each provider need to maintain identity data? What about geo data compliance? Can Identity, credentials, location, device, be represented by level of trust (Risk score)? Is access management for access to a cloud resource still relevant? At a course level possibly However, the content of what is being accessed is probably more important than where it is located. Can management of Identity and Access be abstracted across all environments and providers?
13 Identity and Access Management for mobile Internet and cloud computing, a possible answer Consider building security frameworks/guidelines/standards: 1. for how identity/context trust is derived, where appropriate leveraging other trust frameworks, including Device Identity Credentials used Geo location Etc That defines level of trust -Risk 2. for how content of what can be accessed is classified - Classification These tools allow of the definition and management of policies that specifies that to access content classified as Secret the level of trust has to be greater than or equal to Security cleared.
14 ETSI -Standards in the cloud Mobile internet and cloud computing Questions
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationGOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
More informationUsing the Cloud for Business Resilience
Allen Downs IBM Business Continuity and Resiliency Services Using the Cloud for Business Resilience June 20, 2011 1 Agenda Why resiliency matters A successful cloud-based approach to resiliency Moving
More informationRemoving barriers to Cloud Computing in Europe Open Workshop
Removing barriers to Cloud Computing in Europe Open Workshop SMART 2011/0045 - Open workshop By David Bradshaw, Gabriella Cattaneo, Giuliana Folco, IDC Thursday May 10, 2012- Brussels Copyright IDC. Reproduction
More informationHYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA Executive Summary While a number of organizations are gaining experience and increased
More informationAre You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec
Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform
More informationCloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak
Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape
More informationAchieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs
Achieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationWhy & How Cloud computing is enabling the digital transformation of financial services institutions
Why & How Cloud computing is enabling the digital transformation of financial services institutions There s no one billion customer bank yet, because there s no way to do it without cloud. Next generation
More informationHow Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008
How Managed Services Has Changed Remote Infrastructure Management Presented by: Bill Whitney March 26, 2008 Why are businesses looking to partners such as Managed Service Providers (MSPs) for remote infrastructure
More informationCloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
More informationI D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s
I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive
More informationStandards in the Digital Single Market: setting priorities and ensuring delivery
Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information
More informationGlobal Efforts to Secure Cloud Computing
April 2012 Global Efforts to Secure Cloud Computing Jim Reavis Executive Director Cloud: ushering in IT Spring Technology consumerization and its offspring Cloud: Compute as a utility Smart Mobility: Compute
More informationCloud Vendor Benchmark 2015 A Comparison of Cloud Computing Vendors and Service Providers
Cloud Pervasive Computing Driver No.1 An The Overview digital world of is becoming German a reality, and Swiss and more Cloud so each Computing day. E-commerce, Market online advertising, mobile applications
More informationBerlin, 15 th November 2013. Mark Dunne SaaSAssurance
Berlin, 15 th November 2013 Mark Dunne SaaSAssurance SaaSAssurance guidance to Irish Government on Cloud Adoption Who are SaaSAssurance? Diverse multilingual European team Focus on the here and now Digital
More informationWhat you need to know about cloud backup: your guide to cost, security and flexibility.
What you need to know about cloud backup: your guide to cost, security and flexibility. Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective
More informationWhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
More informationDesign Authority Service
Service Service Definition Government Procurement Service - G-Cloud Services III - Q-LOT4-5 February 2013 Contact: GCloud@sapient.com Service Contents Contents 01 Executive Summary...3 02 Service...3 03
More informationtechuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption
techuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption Introduction Cloud computing is fundamental to the UK s digital future. The next wave of the digital revolution is being powered
More informationWHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
More informationKey Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 w_haskins-hafer@intuit.com Disclaimer Unless otherwise specified,
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationOptimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
More informationIdentity Relationship Management
November 2013 Identity Relationship Management Identity Relationship Management Identity Relationship Management Kantara Initiative, Believers of the World Unite. The Internet of Things is completely redefining
More informationUnified Communications and the Cloud
Unified Communications and the Cloud Abstract Much has been said of the term cloud computing and the role it will play in the communications ecosystem today. Undoubtedly it is one of the most overused
More informationW H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o
More informationEuroCloud Deutschland_eco e.v. Cloud Computing is the future! For sure! But secure!
Cloud Computing is the future! For sure! But secure! ISO/IEC JTC1 national day 2011 The EuroCloud Network EuroCloud Europe was founded on Jan., 22 nd 2010 in Paris Today EuroCloud is present in 27 European
More informationA Roadmap for Future Architectures and Services for Manufacturing. Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015
A Roadmap for Future Architectures and Services for Manufacturing Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015 Road4FAME in a nutshell Road4FAME = Development of a Strategic
More informationPerspectives. Employee voice. Releasing voice for sustainable business success
Perspectives Employee voice Releasing voice for sustainable business success Empower, listen to, and act on employee voice through meaningful surveys to help kick start the UK economy. 2 Releasing voice
More information3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
More informationPurpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.
Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM
More informationHow to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
More informationDEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement
More informationThe Challenges of Application Service Hosting
The Challenges of Application Service Hosting Ike Nassi, Joydip Das, and Ming-Chien Shan SAP America 3410 Hillview Avenue, Palo Alto, CA 94304 ming-chien.shan@sap.com Abstract. In this paper, we discuss
More informationEMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
More informationLeveraging the Cloud for your Business
Leveraging the Cloud for your Business Save money and time by moving to the cloud Learn how Moving to the Cloud 3 from small and mid-sized businesses (SMBs) to Enterprise Companies. What problems can cloud
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationSecurity It s an ecosystem thing
Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationWorking Group on. First Working Group Meeting 29.5.2012
Working Group on Cloud Security and Privacy (WGCSP) First Working Group Meeting 29.5.2012 1 Review of fexisting i Standards d and Best Practices on Cloud Security Security Standards and Status List of
More informationConcurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
More informationThe Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
More informationSymantec Security Program Assessment
Leverage security maturity to prioritize achievement of enterprise goals The Symantec Security Program Assessment evaluates the maturity of your information security program providing an understanding
More informationThe State of IT Transformation for Healthcare
The State of IT Transformation for Healthcare An Analysis by EMC and VMware EMC and VMware are helping IT groups at healthcare organizations transform to business-focused service providers. The State of
More informationKPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014
KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition
More informationFrom PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.
From PC to Workplace Productivity Chris Ingle Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda How Did We Get Here? Evolving Employee Expectations Rapidly Developing
More informationCLOUD COMPUTING - OPPORTUNITIES
CLOUD COMPUTING - OPPORTUNITIES White Paper Batoi Systems Pvt Ltd www.batoi.com BATOI SYSTEMS PVT LTD, 2016. Published by BATOI SYSTEMS (P) LIMITED of 421, Saheed Nagar, Bhubaneswar 751 007 (INDIA), registered
More informationCloud Consulting Services
Cloud Data Center Business Intelligence Enterprise Computing Solutions Services Cloud Consulting Services Service Overview Embarking on the road to cloud computing is not a simple journey and shouldn t
More informationCloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,
More informationSecurity of Cloud Computing Providers Study
Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More informationService Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
More informationEuropean Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT
European Cloud Computing Cloud standards Strategy Ken Ducatel DG CONNECT The Cloud Computing Strategy The European Commission's strategy 'Unleashing the potential of cloud computing in Europe' Adopted
More informationTECHNOLOGY STRATEGY AUDIT
TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series
More informationSecurity of Cloud Computing Providers Study
Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary
More informationBYOD(evice) without BYOI(nsecurity)
BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device
More informationAalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: 2013. Document Version Preprint (usually an early version)
Aalborg Universitet Cloud Governance Berthing, Hans Henrik Aabenhus Publication date: 2013 Document Version Preprint (usually an early version) Link to publication from Aalborg University Citation for
More informationSecure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
More informationQuadrennial Energy Review
Quadrennial Energy Review Comments by FirstFuel Software, Inc. May 4, 2016 FirstFuel Software, Inc. respectfully submits the following comments as a participant in the U.S. Department of Energy s (DOE)
More informationManaging Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify
More informationCloud email Security solutions
Cloud email Security solutions THE MARKET OPPORTUNITY KEY MESSAGES The security market is a very dynamic and evolving market - Threats are rapidly increasing in sophistication and severity - New technologies,
More informationSupporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
More information20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in ho2099@sib.co.in A monthly publication from South Indian Bank 20 th Year of Publication Experience
More informationRSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS
RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS Security solutions for patient and provider access AT A GLANCE Healthcare organizations of all sizes are responding to the demands of patients, physicians,
More informationThe problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
More informationThe Hybrid Cloud Security Professional
The Hybrid Cloud Security Professional As cloud computing continues to evolve, the role of the hybrid cloud security professional provides an interesting study in enterprise operations and individual education
More informationEnhancing Security for Next Generation Networks and Cloud Computing
V1.0 Enhancing Security for Next Generation Networks and Cloud Computing Tony Rutkowski Yaana Technologies Georgia Tech ITU-T Q.4/17 Rapporteur ETSI Workshop 19-20 January 2011 Sophia Antipolis, France
More informationAccenture and Oracle: Leading the IoT Revolution
Accenture and Oracle: Leading the IoT Revolution ACCENTURE AND ORACLE The Internet of Things (IoT) is rapidly moving from concept to reality, as companies see the value of connecting a range of sensors,
More informationThe changing role of the IT department in a cloud-based world. Vodafone Power to you
The changing role of the IT department in a cloud-based world Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends,
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationChapter 2. Migrating into a Cloud
(a) Introduction Chapter 2. Migrating into a Cloud - Cloud computing: a disruptive model of IT * Part technology and part business model * Raised the IT expectations of small and medium enterprises * Large
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d f o r E d g e D a t a P r o t e c t i o n w i t
More informationGovernance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
More informationAdding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud
Adding value as a Cloud Broker Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner Dell.com/Cloud Overview A. Added Value Brokers in all industries in Digital Era B. Experience of Cloud Marketplace
More informationKey Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
More informationCloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu 2 If cloud computing is so simple, then what s the big deal? What is the
More informationSecuring and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
More informationEnabling Integrated Care
Enabling Integrated Care Harnessing personal health systems for better outcomes across the care continuum Briefing Note for a SmartPersonalHealth Workshop WoHIT, Thursday 18 March 2010, 13:00-17:00, Barcelona
More informationThe Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service
The Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service Introduction and overview of the workshop Alex Delis and Michael Pantazoglou, University of Athens www.sucreproject.eu
More information6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
More informationSecurity Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
More informationCIOs: How to Become the CEO s Business Partner
CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate
More informationCYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
More informationwww.cloudcomputingintelligence.com PREDICTIONS FOR 2016
Cloud Computing Intelligence www.cloudcomputingintelligence.com PREDICTIONS FOR 2016 The data race is on for 2016 Tableau s Bob Middleton spells out his top ten trends for 2016, from cloud price wars to
More informationCelsius CELSIUS HELPS IMPLEMENT LENOVO S MARKETING STRATEGY SHIFT. International INTRODUCTION. Background BACKGROUND
CELSIUS HELPS IMPLEMENT LENOVO S MARKETING STRATEGY SHIFT INTRODUCTION Lenovo, the world s largest manufacturer of PCs, laptops and tablets and now a major force in servers and storage, approached, their
More informationCloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
More informationDeveloping the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
More informationMobility in Claims Management
January 2014 Mobility in Claims Management Aparna Krishnan, SENIOR BUSINESS ANALYST, BFSI-Insurance Practice 2 CONTENTS CLAIMS TRANSFORMATION IS THE WAY TO GO 3 BUSINESS DRIVERS FOR ADOPTING MOBILE SOLUTIONS
More informationnew services: the next step the group strategy is about new usages explosion of volumes and new usages emerging
new services: the next step Thierry ZYLBERBERG executive VP strategic marketing the group strategy is about new usages explosion of volumes and new usages emerging administration transport education citizen
More informationCloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
More informationInformation Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
More informationMigrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services
Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT
More informationCloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
More informationSOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible
SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible You don t. But you can get complete visibility to the cloud
More informationRECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our
More informationThe Digital Identity Ecosystem of the States: Securing the Enterprise
The Digital Identity Ecosystem of the States: Securing the Enterprise Security Industry Alliance September 28, 2011 Doug Robinson, Executive Director National Association of State Chief Information Officers
More informationWHITE PAPER. IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources
WHITE PAPER IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources Table of Contents IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources... 3 Cloud
More informationFUJITSU SPECIAL FEATURE. Transforming Retail with the Power of Cloud Mike Goodwin, CIO, Hallmark Cards
FUJITSU SPECIAL FEATURE Transforming Retail with the Power of Cloud Mike Goodwin, CIO, Hallmark Cards ADVERTISEMENT Transferring our experience to you Ask the experts Whether you want to benefit from the
More information