The downturn and the cloud..challenge and solution?
|
|
|
- Ella McGee
- 10 years ago
- Views:
Transcription
1 The downturn and the cloud..challenge and solution? Dr Adrian Davis, MBCS, CITP Head, Leadership and Management Group Information Security Forum Research and Services Team
2 What the ISF provides for its Members and much more besides! 2
3 The downturn Challenge
4 Major drivers of change Social environment (demographics, attitudes, cultures) Business environment (activities, operations, markets) Economic environment (credit crunch, realignment of world economy, rise of China) Global environment (global warming, interconnectivity, competition for resources) Technological environment (cloud computing, nanotechnology, pervasiveness) 4
5 Possible future threats Political Legal More legislation Protectionism Government Interdependence Economic Less R&D Privacy vs. security 2011 Technical Cloud Corporate / Computing Home systems More outsourcing Crime Harsher penalties Socio-Technical Internet or Reality? Encryption Haves vs. Have nots Home working 5
6 It s a new world 6
7 The cloud Solution?
8 What is cloud computing? The development and provision of computer services and resources across networks such as the Internet Characterised by customers not having control or detailed knowledge of the technology or resources that provide the services or resource they purchase service outputs rather than inputs. 8
9 Characteristics of clouds 9
10 Characteristics of cloud computing 10
11 Cloud computing exists at many levels Clients Web browsers, thin clients, mobile phones (eg iphone, Google Android) Services Open ID, Google maps, Paypal Applications Facebook, salesforce.com CRM Platforms Force.com, Microsoft Azure, Web app frameworks (eg Ruby on Rails, Ajaz) Storage Amazon Simple Storage, Microsoft Skydrive, Google big table datastore Infrastructure Virtualisation and Grid computing (Sun Grids, GoGrid) 11
12 Issues Managing access to your information Lack of transparency Operational incidents Suspicious activity Supplier viability (short and long term) The Gaps 12
13 Final thoughts The downturn will impact information security - Organisations are looking to save costs - Whether through reduced headcount, investment or even innovation IT and related fields will have to take their share New (or re-packaged) technologies will be examined and adopted - Especially those that offer reduced investment, reduced through-life costs and value-add services - Cloud computing may be one such technology Understand the risks - Whether it s downturn or cloud computing - Prepare to manage your risks and those of the future 13
14 How the ISF can help material Managing Security in a Downturn Economy Profit Driven Attacks Insider Threats Threat Horizon 2010 Effective approaches to managing a security function Information security strategy Examining the needs of CISO RISE: role of information security in the enterprise The Insider view 14
15 Questions? Adrian Davis Senior Research Consultant Tel: +44 (0) Web: Social: 15
Information Security in a Downturn
Information Security in a Downturn Prof. Howard A. Schmidt, CISSP, CSSLP President and CEO Information Security Forum Ltd. Vice-Chair and Security Strategist (ISC)2 Board of Directors Agenda 1. The Information
Quick guide: Using the Cloud to support your business
Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Security Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
Cloud Computing for Small to Mid Size Businesses. Tech66, LLC William Burleson [email protected] www.tech66.com
Cloud Computing for Small to Mid Size Businesses Tech66, LLC William Burleson [email protected] www.tech66.com Why Tech66 and the Cloud? You want to focus on your core business, not on running your IT infrastructure
ADRIAN DAVIS INFORMATION SECURITY FORUM
Securing the Supply Chain: Guide to Risk Management ADRIAN DAVIS INFORMATION SECURITY FORUM Session ID: GRC-201B Session Classification: Intermediate Introduction Introduction Presentation based on research
Learning from the Cloud providers to use the CMDB to drive cost savings through automation
Smart Infrastructure Solutions London New York Singapore www.citihub.com etrading & Market Data Agile infrastructure Telecoms Data Centre Grid Learning from the Cloud providers to use the CMDB to drive
Cloud Computing: A Practical Approach
Cloud Computing: A Practical Approach Anthony T. Veite Toby J. Veite, Ph.D. Robert Elsenpeter Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
ISI INTERNATIONAL STRATEGY & INVESTMENT
ISI INTERNATIONAL STRATEGY & INVESTMENT Cloud Computing Information Security and Privacy Advisory Board Bill Whyman December 5, 2008 [email protected] Cloud Computing Is the BIG Change In I.T. Cloud applications
A Primer on Cloud Computing. By Anand Ganesan Byteonic.com
A Primer on Cloud Computing By Anand Ganesan Byteonic.com Background Cloud Computing Defined Taxonomy Value Proposition Cloud Providers Who uses it Opportunities for Improvement Agenda The Challenges Make
Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0
Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5
CLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
Cloud Computing. Relevance to Enterprise. Abstract
Cloud Computing Relevance to Enterprise G Lakshmanan Abstract Enterprises need to do more with less than never before. Cloud Computing is in the early stage for enterprise adoption. This paper illustrates
Using Cloud Computing to Drive Innovation: Technological Opportunities and
Using Cloud Computing to Drive Innovation: Technological Opportunities and Management Challenges Edgar A. Whitley Based on work with Leslie P Willcocks and Will Venters MSc Management, Information Systems
Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID
Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Why forensics in the cloud? Cloud market revenue will increase at a 36%
Platform Leadership in Software as a Service: How Platforms Facilitate Innovation
Platform Leadership in Software as a Service: How Platforms Facilitate Innovation Bartłomiej Kołakowski Judge Business School University of Cambridge Based on an MPhil dissertation for Technology Policy
Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public
Announcements TIM 50 Teaching Evaluations Open March 3 through 16 Final Exam Thursday, March 19, 4-7PM Lecture 19 20 March 12, 2015 Cloud Computing Cloud Computing: refers to both applications delivered
APPLICATION OF CLOUD COMPUTING IN EDUCATION. Achmad Benny Mutiara [email protected]
APPLICATION OF CLOUD COMPUTING IN EDUCATION Achmad Benny Mutiara [email protected] OUTLINE: WHAT IS CLOUD COMPUTING?? HISTORY WHY CLOUD COMPUTING??? PROPERTIES OF CLOUD COMPUTING TYPES OF
Abstract 1. INTRODUCTION
Abstract CLOUD COMPUTING GauravBawa & Sheena Girdhar DAV Institute of Engineering and Technology, Jalandhar Email: [email protected], [email protected] Contact Numbers: 09417614654,09914658188
Putchong Uthayopas, Kasetsart University
Putchong Uthayopas, Kasetsart University Introduction Cloud Computing Explained Cloud Application and Services Moving to the Cloud Trends and Technology Legend: Cluster computing, Grid computing, Cloud
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Management Consulting for Media and Telecoms. Cloud Service Trends. Solon TMT Industry Briefing. Munich, London, Budapest September 2012
Management Consulting for Media and Telecoms Cloud Service Trends Solon TMT Industry Briefing Munich, London, Budapest September 2012 Executive Summary More than 1/4 of companies are already spending money
U.S. Mobile Benchmark Report
U.S. Mobile Benchmark Report ADOBE DIGITAL INDEX 2014 80% 40% Methodology Report based on aggregate and anonymous data across retail, media, entertainment, financial service, and travel websites. Behavioral
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
Certified Cloud Computing Professional VS-1067
Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional Certification Code VS-1067 Vskills Cloud Computing Professional assesses the candidate for a company s cloud computing
Securing external suppliers and supply chains: the ISF approach
Securing external suppliers and supply chains: the ISF Dr. Adrian Davis, MBCS, CITP, CISMP Principal Research Analyst Information Security Forum Agenda Introduction The supply chain: business environment
Cloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher
Cloud Computing and Amazon Web Services CJUG March, 2009 Tom Malaher Agenda What is Cloud Computing? Amazon Web Services (AWS) Other Offerings Composing AWS Services Use Cases Ecosystem Reality Check Pros&Cons
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
The Cloud Opportunity: Italian Market 01/10/2010
The Cloud Opportunity: Italian Market 01/10/2010 Alessandro Greco @Easycloud.it In collaboration with easycloud.it Who is easycloud.it? Easycloud.it is a Consultant Company based in Europe with HQ in Italy.
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
Cloud Computing. Relevance to Enterprise G Lakshmanan. Abstract
Cloud Computing Relevance to Enterprise G Lakshmanan Abstract Enterprises need to do more with less than never before. Cloud Computing is in the early stage for enterprise adoption. This paper illustrates
Security Issues In Cloud Computing And Their Solutions
Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers
Cloud Platforms Today: The Big Picture
Cloud Platforms Today: The Big Picture David Chappell Chappell & Associates www.davidchappell.com Mobile Workforce Big Data Cloud Computing Social Enterprise Privacy and Security The traditional world
Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015
How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015 Contact Information Laura Leist Eliminate Chaos [email protected] 425.670.2551 877.342.8592 Author:
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Cloud Computing. Technologies and Types
Cloud Computing Cloud Computing Technologies and Types Dell Zhang Birkbeck, University of London 2015/16 The Technological Underpinnings of Cloud Computing Data centres Virtualisation RESTful APIs Cloud
Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013
Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013 1 The Cloud We all use it as consumers But I m going to talk about cloud computing in an enterprise
PwC Cybersecurity Briefing
www.pwc.com/cybersecurity Cybersecurity Briefing June 25, 2014 The views expressed in these slides are solely the views of the presenters and do not necessarily reflect the views of the PCAOB, the members
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP www.evolutionaryit.com
Cloud Computing A Plain English Introduction to the Cloud Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP www.evolutionaryit.com Objectives Explore what the
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
CRM, Student Communication and Student Relationship Management in the Cloud. Case Study
CRM, Student Communication and Student Relationship Management in the Cloud Case Study 2 Case Study Colleges and Projects Brockenhurst College, City College Coventry Gloucestershire College Cloud Student
Welcome to the Force.com Developer Day
Welcome to the Force.com Developer Day Sign up for a Developer Edition account at: http://developer.force.com/join Nicola Lalla [email protected] n_lalla nlalla26 Safe Harbor Safe harbor statement under
DATA ANALYTICS@DT. Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels. re3rerererewr
DATA ANALYTICS@DT Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels re3rerererewr SMART DATA MARKET SMART DATA BENEFITS ECONOMY AS A WHOLE Use Case Spectrum Enterprise
Public Cloud Offerings and Private Cloud Options. Week 2 Lecture 4. M. Ali Babar
Public Cloud Offerings and Private Cloud Options Week 2 Lecture 4 M. Ali Babar Lecture Outline Public and private clouds Some key public cloud providers (More details in the lab) Private clouds Main Aspects
Informations- und Kommunikationsinstitut der Landeshauptstadt Saarbrücken. European local Government Conference, Berlin, June 7th 9th
Informations- und Kommunikationsinstitut der Landeshauptstadt Saarbrücken European local Government Conference, Berlin, June 7th 9th These are the good old days we ll be longing for in ten years time.
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber
Think STRENGTH. Think Chubb. Cyber Insurance Andrew Taylor Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber The World Has Changed Then Now 1992 first text message More txt s that the entire
Zoho Projects. Social collaborative project management platform
Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its
HRG Assessment The Cloud Computing Challenge
HRG Assessment The Cloud Computing Challenge What is Cloud Computing? Cloud Computing can be described as application services provided to end users through the web and managed by a third party. The services
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
How to Use YourPrintCloud Wireless Printing for Xerox Copiers & Printers. revised 30 Jan 2015 1
How to Use YourPrintCloud Wireless Printing for Xerox Copiers & Printers revised 30 Jan 2015 1 WIRELESS PRINTING SMARTPHONES YourPrintCloud Mobile smartphone apps support PDF s, Microsoft Word, PowerPoint,
Program. Maria Fiore Business Development Manager Hartco. Hugo Boutet igovirtual. Introduction to MicroAge. SME and «cloud computing» 2006 MicroAge
A presentation from and October 19th 2010 Program Introduction to MicroAge Maria Fiore Business Development Manager Hartco SME and «cloud computing» Hugo Boutet igovirtual 2006 MicroAge Introduction to
white paper Cloud computing: resilience is the key to success
Our 21st century society has become so used to change and new developments that genuinely progressive concepts are initially not recognised by many people. There is then a rush to implementation once the
INFORMATION SECURITY BRIEFING 01/2010 CLOUD COMPUTING
INFORMATION SECURITY BRIEFING 01/2010 CLOUD COMPUTING MARCH 2010 This briefing note is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
Pharma CloudAdoption. and Qualification Trends
Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for
How To Understand Cloud Computing
Cloud Computing Bible Barrie Sosinsky WILEY Wiley Publishing, Inc. About the Author Preface Acknowledgments viii xi xiii Part I: Examining the Value Proposition 1 Chapter 1: Defining Cloud Computing 3
DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite
DATA BREACH RISK INTELLIGENCE FOR HIGHER ED Financial prioritization of data breach risk in the language of the C-suite WHY? Slow, disruptive to students & staff Almost 1 million records were False positives,
A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services
A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services Department of Computer Science presented at the 1 st International Workshop on Pervasive Web Mapping, Geoprocessing
