Here to Stay. Understand the needs of different business units for security, validation, and monitoring. Frank Jacquette

Size: px
Start display at page:

Download "Here to Stay. Understand the needs of different business units for security, validation, and monitoring. Frank Jacquette"

Transcription

1 Now That The Cloud Is Here to Stay Understand the needs of different business units for security, validation, and monitoring Frank Jacquette Jacquette Consulting, Inc.

2 Who is this guy? Founder, CEO, janitor Jacquette Consulting Software developer by trade, validation practitioner by necessity Worked in pharmaceuticals, medical devices, animal health Disclaimers and caveats

3 My ygoal for you: don t be the Pointy-Haired Boss

4 What we ll cover Terminology and the meaning of cloud Which business units care and what they care about Questions you must ask a prospective cloud vendor Validation approach for cloud-based systems Audits involving cloud vendors

5 Terminology basics Vlidti Validation establishing documented d evidence that a process will consistently produce a product meeting its pre-determined specifications and quality attributes Qualification making sure the system behaves as expected in its actual production environment Verification making sure that the system continues to produce results as expected

6 Abusing the word cloud Cloud is not a technical term, it s a marketing term Has been used to mean many different things: Hosted infrastructure or platform (IaaS, PaaS) Hosted applications (SaaS) On-demand computing/high-performance computing Distributed computing Local servers administered by someone else

7 What cloud really means Somebody else s s problem

8 What cloud really means Somebody else s s problem until it fails.

9 The business units that t care Information technology (IT) the folks that normally manage the hardware and software systems Compliance, QA, validation the folks who make sure that the systems produce the desired results The business the users of the systems

10 IT cares about Security don t break my systems, don t steal my data, don t destroy my data Reliability gotta keep the systems running User happiness nobody likes to get yelled at

11 Compliance cares about Compliance does it fulfill regulatory requirements for a system of this kind? Accountability who is responsible for ensuring that the system does what it should? Testability how can I demonstrate that it fulfills its Testability how can I demonstrate that it fulfills its requirements?

12 The user cares about Productivity I need to do my job faster, easier, better Reliability I just expect it to be there Accessibility why do I have to carry two phones? Why can t I work from home? Why can t I use my ipad? The feeling of control nobody likes to feel powerless because of technology (Who do I call if it breaks?)

13 What everyone cares about Clarity what am I getting, how will it help me, what is expected of me Consistency I don t want to deal with something different every day Control if my job is on the line I d better be able to Control if my job is on the line, I d better be able to get problems addressed

14 The importance of questions When choosing a cloud vendor, you need answers So here are some questions you really need to ask

15 Questions: Hardware Where are my servers? Are they virtual? Do they share equipment with other customers? Can I visit my servers at any time? Can I take them if I want to? Are the servers yours or mine?

16 Questions: Security How are my servers secured against the outside world, physically and virtually? How are they secured from servers used/owned by other customers? How are they backed up? Where are my backups? Do you do recovery drills? Can I take backup copies? Do you have third parties do audits? Penetration Do you have third parties do audits? Penetration testing?

17 Questions: When Bad Things Happen What if there s a fire and your data center burns? What if there s a hurricane and the whole state loses power for days? What if the FBI shows up and seizes servers in the same room? How will I be notified if you detect a security breach or other issue? How do I access my data if your systems are down?

18 Questions: Data If you go bankrupt how do I get my data and systems? Who owns the data, you or me? How do you dispose of old equipment, especially primary or backup media? Can I sue you if you lose my data? Do you have insurance against the loss?

19 Questions: Validation How are your applications i validation-ready i d so that I, as the user, can validate them? How do you manage SOPs and other documents that support validation? How do you support system qualification? How do you manage user training records? Do you have a dedicated QA manager?

20 The Most Important t Question Do you TRUST this vendor to listen, understand, and respond competently to your concerns??

21 Questions, questions, questions I don t have the answers for you, but your cloud vendor MUST if things are going to go smoothly Unwillingness or inability to answer these questions is a BIG RED FLAG This list of questions became so long that I ve created an entire guide Send me an at frank@jacquette.com and Send me an e mail at frank@jacquette.com and I ll be happy to send it to you

22 Validation approach for cloud-based d systems A cloud-based d application i is just like any other Differences are access to and control of the vendor s environment, but that s not that different from a distant server administered by an outsourced firm Walk away from a vendor who doesn t understand and Walk away from a vendor who doesn t understand and respond to regulatory concerns

23 Vlidti Validation Is the software yours (IaaS, PaaS) or theirs (SaaS)? S)? Does the vendor offer a software validation process to use as a starting point? If they do offer a validation process, what templates or services do they provide? Use your normal validation approach with an extra dose of skepticism

24 Qualification Vlidt Validate the applications, i but qualify the environment Qualification is different because the systems are at arm s length, but you still need to demonstrate access and control Make sure that the vendor understands that change Make sure that the vendor understands that change control matters in a qualified environment

25 Verification Regardless of what the vendor provides, your organization must still perform verification How do you test? Do you have test data? Is there a separate test environment? How do you log issues with the vendor? How do you confirm that issues have been addressed?

26 Red flags The vendor doesn t get validation, thinks it s just some document signoffs or a PowerPoint deck The vendor is unwilling to grant the needed access and control The vendor argues that your requests are impractical for technical reasons

27 More red flags Your systems or data share hardware with other customers You don t have the ability to walk away (with your data) at any time The vendor is unresponsive to regulatory and business needs The vendor seems hazy on the idea of change control

28 AUDITS

29 Interpreting vendor-supplied audit results Many cloud vendors, especially IaaS and PaaS providers, like to tout vendor-supplied audit results Some results are useful, some are not Make sure the audits are relevant to your situation Sometimes they provide their own audits to try and deflect you from performing yours

30 Vendor audits (example) There are LOTS of standards d out there, but they are often misapplied SAS 70 internal financial controls of service orgs ISO 9000 quality management systems 21 CFR 11 ERES in regulated settings Auditors measure compliance with the standard, not the appropriateness of the standard

31 Interpreting ti audits Does the standard d make sense for your organization s i needs? Do the audits show a well-run environment? Do the audits show an understanding of your regulatory environment? Most importantly, will the cloud vendor allow you to send in your own audit team?

32 Performing your own audits Auditing i a cloud vendor is just like auditing i any other third party Cloud vendors will sometimes throw up smokescreens to try and prevent you from visiting their sites or seeing their operations Insist on auditing things the way you want, not the way the vendor wants

33 If you are audited d An audit that involves a cloud-based d system is just like any other audit that involves a third-party vendor Inform the vendor, get your house in order together If the vendor can t hack it, you picked the wrong vendor so you need to select the right vendor, manage them carefully, and be ready to change if necessary

34 Conclusion The cloud is just the next evolution in information technology delivery It presents some new challenges in validation, but nothing that we can t handle In the end you need a vendor that is competent, customer-focused, and familiar with regulated environments It s a lot easier to select a good vendor up front than to deal with a bad vendor down the road

35 Thanks Frank Jacquette

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC.

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC. CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC. S EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD.

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

GAIN CLARITY CRITICAL ISSUES. Your Data in the Cloud : Benefits & Risks GAIN CONTROL. berrydunn.com

GAIN CLARITY CRITICAL ISSUES. Your Data in the Cloud : Benefits & Risks GAIN CONTROL. berrydunn.com GAIN CLARITY CRITICAL ISSUES Your Data in the Cloud : Benefits & Risks berrydunn.com AGENDA Defining Cloud Services Benefits and Risks Core Requirements Myths about Clouds Is Your Data in the Cloud Secure?

More information

a guide to the cloud Understanding the cloud and recreation management understanding the cloud and recreation management a guide to the cloud 683_14

a guide to the cloud Understanding the cloud and recreation management understanding the cloud and recreation management a guide to the cloud 683_14 understanding the cloud and recreation management a guide to the cloud Understanding the cloud and recreation management 672_14 Introduction 1n 1969, Joni Mitchell sang I ve looked at Clouds from both

More information

Pharma CloudAdoption. and Qualification Trends

Pharma CloudAdoption. and Qualification Trends Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for

More information

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

All can damage or destroy your company s computers along with the data and applications you rely on to run your business. All can damage or destroy your company s computers along with the data and applications you rely on to run your business. Losing your computers doesn t have to disrupt your business if you take advantage

More information

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu 2 If cloud computing is so simple, then what s the big deal? What is the

More information

Secure Your Cloud and Outsourced Business with Privileged Identity Management

Secure Your Cloud and Outsourced Business with Privileged Identity Management Secure Your Cloud and Outsourced Business with Privileged Identity Management Table of Contents Executive Summary... 3 Understanding Privilege... 3 Do All Service Providers Get It?... 5 Managing Privilege

More information

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC Main Types of Cloud Environments: - Public Cloud: A service built on an external platform run by a cloud service provider such as IBM, Amazon Web Services or Microsoft Azure. Subscribers can get access

More information

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Member Town Hall Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4

More information

The Elephant in the Room: What s the Buzz Around Cloud Computing?

The Elephant in the Room: What s the Buzz Around Cloud Computing? The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton

More information

Clinical Trials in the Cloud: A New Paradigm?

Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand

More information

{Moving to the cloud}

{Moving to the cloud} {Moving to the cloud} plantemoran.com doesn t mean outsourcing your security controls. Cloud computing is a strategic move. Its impact will have a ripple effect throughout an organization. You don t have

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer Agenda 1. Introduction to Configuration Management 2. Importance of Configuration Management 3. Should we care? 4.

More information

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies

More information

Compliance and the Cloud. Guiding principles and architecture for addressing Life Science compliance in the cloud

Compliance and the Cloud. Guiding principles and architecture for addressing Life Science compliance in the cloud Compliance and the Cloud Guiding principles and architecture for addressing Life Science compliance in the cloud Life Sciences Industry Unit Microsoft Corporation June 2012 ii Legal Disclaimers The information

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

22 Questions You Should Ask Your Computer Consultant

22 Questions You Should Ask Your Computer Consultant 22 Questions You Should Ask Your Computer Consultant BEFORE HIRING THEM TO SUPPORT YOUR NETWORK Stuart J. Bryan I-M TECHNOLOGY, LLC 131 PROVIDENCE STREET, TAFTVILLE, CT 06380 22 Questions You Should Ask

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

How To Understand Cloud Computing

How To Understand Cloud Computing CLOUD COMPUTING Jillian Raw Partner, Kennedys http://www.kennedys-law.com/jraw/ Cloud Computing- what they say about it the cloud will transform the information technology industry profoundly change the

More information

Cloud Computing Security Issues

Cloud Computing Security Issues Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,

More information

Designing an Identity Theft Prevention Program

Designing an Identity Theft Prevention Program The Federal Trade Commission has indicated that mortgage brokers are covered by the Red Flags Rule and must design identity theft prevention programs to comply with the law. The FTC has published a How-To

More information

Is a Cloud ERP Solution Right for You?

Is a Cloud ERP Solution Right for You? Is a Cloud ERP Solution Right for You? By Spencer Arnesen, CPA There s been a lot of hype recently about how cloud software solutions are the wave of the future. In the consumer environment, you can use

More information

Cloud Services. More agility. More freedom. More choice.

Cloud Services. More agility. More freedom. More choice. Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud

More information

Three Attributes of Every Successful Merchant Services Program-20140604 1602-1

Three Attributes of Every Successful Merchant Services Program-20140604 1602-1 Three Attributes of Every Successful Merchant Services Program-20140604 1602-1 [Start of recorded material] [Starts Mid Sentence] thank everyone that s joined the call today. I know everybody is busy with

More information

GAMP 5 as a Suitable Framework for Validation of Electronic Document Management Systems On Premise and 'In the Cloud' Keith Williams CEO GxPi

GAMP 5 as a Suitable Framework for Validation of Electronic Document Management Systems On Premise and 'In the Cloud' Keith Williams CEO GxPi GAMP 5 as a Suitable Framework for Validation of Electronic Document Management Systems On Premise and 'In the Cloud' Keith Williams CEO GxPi Disclaimer The views and opinions expressed in the following

More information

21 Questions you should ask your IT service provider Before hiring them to support your network

21 Questions you should ask your IT service provider Before hiring them to support your network 21 Questions you should ask your IT service provider Before hiring them to support your network Customer Service: Q1: Do they answer their phones live or do you always have to leave a voice mail and wait

More information

Regulated Applications in the Cloud

Regulated Applications in the Cloud Keith Williams CEO Regulated Applications in the Cloud Aspects of Security and Validation Statement on the Cloud and Pharma s added Complexity Clouds already make sense for many small and mediumsize businesses,

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

On-premises vs. cloud

On-premises vs. cloud Visma.net Guide On-premises vs. cloud What you need to consider to make the right choice for your business On-premises vs. cloud Today s dilemma demystified! Contents Introduction... 2 What is an on-premises

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278 Hospitality Cloud+Plus How Technology Can Benefit Your Hotel LIMOTTA IT LIMOTTAIT.com/hospitality 888 884 6278 Content + + About Us PCI Compliance + Virtualization + + + Unified Technology Single Sign

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

Vendor Management. Donald Cristan, VP ISO First United Bank Lubbock, TX

Vendor Management. Donald Cristan, VP ISO First United Bank Lubbock, TX Vendor Management Donald Cristan, VP ISO First United Bank Lubbock, TX About Me Donald Cristan Broad Background - Experience Banking Industry since 2002 Information Technology since 1996 CISSP since 2007

More information

Private vs. Public Cloud Solutions

Private vs. Public Cloud Solutions Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper

More information

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) cloud@dlt.com www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions

More information

5 Things to Look for in a Cloud Provider When it Comes to Security

5 Things to Look for in a Cloud Provider When it Comes to Security 5 Things to Look for in a Cloud Provider When it Comes to Security In This Paper Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud Understand the

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

Cloud Computing for Business and Non-Profits

Cloud Computing for Business and Non-Profits Page1 Cloud Computing for Business and Non-Profits You may have heard about Cloud Computing which is gathering momentum and benefitting many organizations. If you have not heard of it, you will very soon

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com Cloud Security & Risk Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com Agenda About Compass Overcast - Cloud Overview Thunderheads - Risks in the Cloud The Silver Lining - Security Approaches

More information

Whitepaper: Cloud Computing for Credit Unions

Whitepaper: Cloud Computing for Credit Unions Whitepaper: Cloud Computing for Credit Unions A new twist on an old strategy MYCU SERVICES December 29, 2011 Authored by: Lingle, Linda Table of Contents Introduction... 2 Cloud Providers... 3 Cloud Components...

More information

Cloud Computing Secured. Thomas Mitchell CISSP. A Technical Communication

Cloud Computing Secured. Thomas Mitchell CISSP. A Technical Communication Cloud Computing Secured Thomas Mitchell CISSP A Technical Communication Abstract With the migration to Cloud Computing underway in many organizations IT infrastructure, this will cause a paradigm shift

More information

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Cloud Computing Risks & Reality Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from

More information

Cloud Computing. Following the American Psychological Association s Guidelines. Dustin Self. The University of North Texas

Cloud Computing. Following the American Psychological Association s Guidelines. Dustin Self. The University of North Texas Running Head: CLOUD COMPUTING 1 Cloud Computing Following the American Psychological Association s Guidelines Dustin Self The University of North Texas 2 Cloud Computing by Dustin Self ABSTRACT According

More information

Is Cloud ERP Really Cheaper?

Is Cloud ERP Really Cheaper? Is Cloud ERP Really Cheaper? A Simple Guide to Understanding the Differences Between Cloud and On- Premise Distribution Software This guide attempts to outline all of the principal considerations that

More information

Strategies for Secure Cloud Computing

Strategies for Secure Cloud Computing WHITE PAPER Cloud Basics Strategies for Secure Cloud Computing An Introduction to Exploring the Cloud There is a lot of buzz these days about cloud computing and how it s going to revolutionize the way

More information

WELCOME TO SECURE360 2013

WELCOME TO SECURE360 2013 WELCOME TO SECURE360 2013 Don t forget to pick up your Certificate of Attendance at the end of each day. Please complete the Session Survey front and back, and leave it on your seat. Are you tweeting?

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GETTING THE MOST FROM THE CLOUD. A White Paper presented by GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are

More information

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of

More information

CJIS in the Cloud. Oregon State Police CJIS Statewide Training September 23 & 24, 2015

CJIS in the Cloud. Oregon State Police CJIS Statewide Training September 23 & 24, 2015 CJIS in the Cloud Oregon State Police CJIS Statewide Training September 23 & 24, 2015 Stephen Exley, CISSP Senior Consultant/Technical Analyst FBI CJIS ISO Program Cloud Computing Famous Quotes on Cloud

More information

Shaping the Cloud for the Healthcare Industry

Shaping the Cloud for the Healthcare Industry Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as

More information

Cloud Computing (In Plain English)

Cloud Computing (In Plain English) Cloud Computing (In Plain English) Application Service Provider, Software as a Service, Grid Computing, Utility Computing, Platform as a Service......all these terms and more, at one time or another have

More information

How To Run A Cloud Based Data Centre

How To Run A Cloud Based Data Centre CAPA in the Cloud Keith Williams CEO GXPi 12 th June 2013 Controlling Pharma data in the Cloud- Overview Example of a CAPA from 3 years ago (2010) Example of a CAPA today (2013) Example of CAPA in Azure(2014)

More information

3 Ways to Restore Salesforce Data

3 Ways to Restore Salesforce Data White Paper 3 Ways to Restore Salesforce Data LEARN MORE AT WWW.SPANNING.COM OR CALL 512.236.1277 3 Ways to Restore Salesforce Data How do you know when you need to do more to protect your Salesforce data?

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

How to navigate the world of managed services and outsourcing

How to navigate the world of managed services and outsourcing - How to navigate the world of managed services and outsourcing A publication of : Introduction 3-5 The State of the Cloud 6-10 Navigating the In-between 11-17 The Managed Services Edge 18-23 Getting your

More information

FIVE GOLDEN RULES FOR A SUCCESSFUL UBUNTU DESKTOP MIGRATION. An Ubuntu workbook from Canonical

FIVE GOLDEN RULES FOR A SUCCESSFUL UBUNTU DESKTOP MIGRATION. An Ubuntu workbook from Canonical FIVE GOLDEN RULES FOR A SUCCESSFUL UBUNTU DESKTOP MIGRATION An Ubuntu workbook from Canonical 2 INTRODUCTION So, you like the idea of deploying an Ubuntu desktop to all or some of your users. You like

More information

How To Decide If You Should Move To The Cloud

How To Decide If You Should Move To The Cloud Can security conscious businesses really adopt the Cloud safely? January 2014 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Executive overview The varied Cloud security landscape How risk assessment

More information

Disaster Recovery Planning Save Your Business

Disaster Recovery Planning Save Your Business Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack

More information

BUSINESS MANAGEMENT SUPPORT

BUSINESS MANAGEMENT SUPPORT BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan info@bm-support.org 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing

More information

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A Best Practices for Validation of a Software as a Service (SaaS) Customer Relationship Management (CRM) Solution Presented By: Gregg Mauriello Validation Manager Elise Miner Associate Validation Manager

More information

Cloud vs On-Premise Software: And the Winner is

Cloud vs On-Premise Software: And the Winner is Cloud vs On-Premise Software: And the Winner is QR Code Presenters: Moderator, Micah Myers, Information Technology Director, City of St. Cloud, MN Speakers: Greg Jonsen, SaaS Leader, State of Minnesota

More information

DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two)

DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two) DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two) By Amy Terry Sheehan Vendors and other third parties are vital to

More information

5 Group Policy Management Capabilities You re Missing

5 Group Policy Management Capabilities You re Missing 5 Group Policy Management Capabilities You re Missing Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

How Data-Centric Protection Increases Security in Cloud Computing and Virtualization

How Data-Centric Protection Increases Security in Cloud Computing and Virtualization How Data-Centric Protection Increases Security in Cloud Computing and Virtualization Executive Overview Cloud services and virtualization are driving significant shifts in IT spending and deployments.

More information

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should

More information

Pioneering Cloud Computing for Clinical Trials

Pioneering Cloud Computing for Clinical Trials Pioneering Cloud Computing for Clinical Trials Marc Desgrousilliers, Chief Technology Officer at Clinovo Olivier Roth, Marketing & Communication Coordinator 1208 E. Arques Avenue, Suite 114 Sunnyvale,

More information

( and how to fix them )

( and how to fix them ) THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.

More information

How cloud computing can transform your business landscape.

How cloud computing can transform your business landscape. How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about

More information

THINGS YOU NEED IN DOCUMENT MANAGEMENT SOFTWARE. Presented By:

THINGS YOU NEED IN DOCUMENT MANAGEMENT SOFTWARE. Presented By: THINGS YOU NEED IN DOCUMENT MANAGEMENT SOFTWARE Presented By: With over 15 years experience with document management solutions OnPoint DMS and Cabinet Paperless are pleased to offer you some insight on

More information

Auditing Cloud Computing and Outsourced Operations

Auditing Cloud Computing and Outsourced Operations Session 136 Auditing Cloud Computing and Outsourced Operations Monday, May 7, 2012 3:30 PM 5:00 PM Mike Schiller Director of Sales & Marketing IT, Texas Instruments Co Author, IT Auditing: Using Controls

More information

ATS. The. The Staffing Agency s Guide to Buying an Applicant Tracking System

ATS. The. The Staffing Agency s Guide to Buying an Applicant Tracking System ATS The Advantage: The Staffing Agency s Guide to Buying an Applicant Tracking System 87 % of North American recruiting professionals agree that using ATS/CRM technology is important to the success of

More information

The CFO s Guide to Document Retention: What Records to Keep and How Long?

The CFO s Guide to Document Retention: What Records to Keep and How Long? The CFO s Guide to Document Retention: What Records to Keep and How Long? Abstract Chief Financial Officers must organize all of a business financial paperwork in order to protect the business from penalties,

More information

12/1/2014. Cybersecurity and Cloud Services Compliance Considerations. Community Medical Centers. Cedars-Sinai. Dec. 5, 2014 San Francisco

12/1/2014. Cybersecurity and Cloud Services Compliance Considerations. Community Medical Centers. Cedars-Sinai. Dec. 5, 2014 San Francisco Cybersecurity and Cloud Services Compliance Considerations Dec. 5, 2014 San Francisco Katie Gorris, CHC,CHPS,CHPC Privacy Manager, Corporate Integrity Program Cedars-Sinai Health System gorrisk@cshs.org

More information

Well-Grounded Approach to the Cloud:

Well-Grounded Approach to the Cloud: Well-Grounded Approach to the Cloud: Defining and Delivering on the Promise of an Enterprise Cloud Val Bercovici Cloud Czar, NetApp Chair, SNIA Cloud Storage Initiative Cloud Computing Industrial Revolution

More information

Remind you of anything when it comes to data backup? Guide

Remind you of anything when it comes to data backup? Guide Remind you of anything when it comes to data backup? The buildings, vehicles and equipment your business relies on; are t hey all insured? Of course they are! It s vital that your business can continue

More information

How Much is the Sky? Cloud Services Reduce Costs. White Paper. Evaluating the Monetary Aspects of Moving to the Cloud

How Much is the Sky? Cloud Services Reduce Costs. White Paper. Evaluating the Monetary Aspects of Moving to the Cloud How Much is the Sky? Evaluating the Monetary Aspects of Moving to the Cloud Expected savings from lower up-front capital costs, more predictable operational costs, and economies of scale are driving the

More information

Ways Cloud Computing Benefits Your Business

Ways Cloud Computing Benefits Your Business 10 Ways Cloud Computing Benefits Your Business SPONSORED BY 2 10 WAYS CLOUD COMPUTING BENEFITS YOUR BUSINESS Do you know what cloud computing is and how it can help you run and grow your business? If you

More information

Cloud Computing Survey Perception of the companies. DPDP - Macedonia

Cloud Computing Survey Perception of the companies. DPDP - Macedonia Cloud Computing Survey Perception of the companies DPDP - Macedonia Survey regarding the awareness of the companies in relation to Cloud computing in Macedonia Executive summary The survey was conducted

More information

Cloud Computing and SaaS Environments

Cloud Computing and SaaS Environments Regulatory Considerations for Use of Cloud Computing and SaaS Environments Institute of Validation Technology Conference Qualifying and Validating Cloud and Virtualized IT Infrastructure Philadelphia PA

More information

Reports on Service Organizations Where we ve been?

Reports on Service Organizations Where we ve been? Reports on Service Organizations Where we ve been? What s changing? How does this impact Internal Audit? Eric Wright Shareholder Frank Dezort Senior Manager Schneider Downs & Co., Inc. May 2, 2011 Overview

More information

The Sumo Logic Solution: Security and Compliance

The Sumo Logic Solution: Security and Compliance The Sumo Logic Solution: Security and Compliance Introduction With the number of security threats on the rise and the sophistication of attacks evolving, the inability to analyze terabytes of logs using

More information

DECIDING WHICH CRM SOLUTION IS RIGHT FOR YOU

DECIDING WHICH CRM SOLUTION IS RIGHT FOR YOU Book 4 of 4 DECIDING WHICH CRM SOLUTION IS RIGHT FOR YOU PART OF THE CRM SUCCESS SERIES Introduction It s Time for a CRM Solution Congratulations. Your business is growing and you ve decided the time is

More information

Cloud Computing in Banking

Cloud Computing in Banking Financial Services the way we see it Cloud Computing in Banking What banks need to know when considering a move to the cloud Contents 1 Overview 3 2 Why Cloud Computing for Banks? 4 2.1 Cost Savings and

More information

a Disaster Recovery Plan

a Disaster Recovery Plan Construction of a Disaster Recovery Plan David Godwin, Sr. Sales Engineer March 18, 2014 Objectives Understand What Disaster Recovery is? Why is Disaster Recovery Needed? Effectively assist customers or

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By

More information

Why choose cloud computing? A case study

Why choose cloud computing? A case study Why choose cloud computing? A case study Tools palette Webinar space This session! Length: 60 minutes! Questions! Forum: www.ala.asn.au/forum! Session scope Poll time! Which of the following best describes

More information

Free Legal Consumer Guide Series www.southernmarylandlaw.com

Free Legal Consumer Guide Series www.southernmarylandlaw.com Free Legal Consumer Guide Series Brought To You By Meeting All Your Legal Needs for 50 Years 2 How to Do An Annual Review of Your Legal & Financial Situation HOW TO USE THIS GUIDE If you read this guide,

More information