Intro The Speaker. Raoul Chiesa
|
|
|
- Jeffrey Lucas
- 10 years ago
- Views:
Transcription
1 Cloud Security, from an Hacker s Perspective ( 从 专 业 视 角 看 云 安 全 ) Raoul Nobody Chiesa Founder, Partner, Security Brokers Principal, Cyberdefcon Ltd. Founder, Mediaservice.net Perugia, July 23, 2012
2 Agenda Introductions What s this cloud? History plays back Known issues First problems Unknown issues? Conclusions Contacts, Q&A
3
4 Intro The Speaker Raoul Chiesa Founder, Partner, Security Brokers Principal, CyberDefcon UK Senior Advisor & Strategic Alliances on UNICRI (United Nations Interregional Crime & Justice Research Institute) PSG Member, ENISA (Permanent Stakeholders Group, European Network & Information Security Agency) Founder, Memberof the Steering Committee and Technical Board, CLUSIT, Italian Information Security Association) Steering Committee, AIP/OPSI, Privacy & Security Observtory Board of Directors, ISECOM Board of Directors, OWASP Italian Chapter Founder, Mediaservice.net 4
5 Intro Security Brokers The Security Brokers Security Brokers (SB) wasestablishedin order to filla gap: the actualict Security just doesn t work SB è un marketplace globale dell Information Security avanzata e non convenzionale, Security Brokers (SB) was established after three year-long phase of «human start-up» and bootstrapping. SB s concept can be summarized as an agile IT and InfoSec marketplace provider with 360 visionand an unconventionalapproach, which uses a business model similiar to traditional brokerages: we locate the best «product»(expert, service, product), typically located in «niche» sectors to best serve our clients. The model itself is based chiefly upon personal relationships and networks cultivated over 20 years and tried & tested in the field over the past 10 years. This said, SB has as «input» its own key Suppliers(Associates) and its High-Level Independent Consulting Services as «output». The full listing of SB s Associates is not yet public (ETA: SEPT 2012), though it encompass many respected Ethical Hackers, IT Security Researchers and top-class experts. Some names: Andrea Zapparoli Manzoni, Elena Bassoli, Gianna Detoni, Fabio Massa, Selene Giupponi and many, many more! 5
6 Intro Security Brokers: what, how We focus on critical and interesting topics. Thanks to the know-how and specialization our 30+ global experts have gathered over 20 years of demonstrable field experiencein the Information Securityand Cyber Intelligencecommunities (and a few others!), we can claim over 600 combined references per year. Our main service areas can be summarized here: Proactive Security With a focus on mobile networks and devices, modern telco networks, SCADA/NCI security, Cloud, IA in the Transport, Space & Air sectors, Social Networks, proactive identification and mitigation of security issues. Post-Incident & Incident Response Attackerprofiling(MO, Behaviour, Motivations), Digital Forensics (Host, Network, Mobile, GPS, Cloud, etc..), Trainings Cyber Security Strategic Consulting (Technical, Legal, Compliance, PR, Strategy) On-demand «Ninja Teams» Security Incident PR Handling & Management Psychological, Behavioural and Social aspects of hacking and infosec Cybercrime Botnet takeovers and takedowns, Cybercriminal profiling and bounties, Cyber Intelligence reports, facilitator towards external CERTs and LEAs/LEOs,[ ] Information Warfare, Information Superiority & Cyber War(intended exclusively for MoD clients) 0-day vulnerabilites and digital munitions ; OSINT Trainings & Services; CNA/CND/CNE. 6
7 What s this cloud? The very official, serious term: Cloud Computing Wikipedia: Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Henry J. Sienkiewicz DISA (Defense Information Systems Agency) A style of computing where massively scalable (and elastic) IT-related capabilities are provided as a service to external customers using Internet technologies. 7
8 Cloud /2 IaaS: Infrastructure As-a-Service Processing, networking, storage, virtualization PaaS: Platform-As-a-Service Applications development, platforms to develop and test and study SaaS applications. Intended for sw developers communities. SaaS: Software-As-a-Service Pay-per-Use your application through the Web XaaS: Whatever-As-a-Service: Data-As-a-Service (on-line storage or DaaS) Cracking-As-a-Service? DDoS-aaS? Crime-As-a-Service (already existing!) 8
9 History plays back Traditional Data Center 9
10 Cloud s fans and opponents (PROs/CONs) Cloud sucks because... It doesn t has security I want to manage my stuff on my own I don t go for cloud cause I don t have any stuff on cloud and I never will I don t cloud cause I already have my cloud: it s my datacenter, close to my town Cloud is cool because... IDC/Gartner/whoever said it s the future It s SO trendy I save money on electricity I got a lot of CPU power The son of a friend of mine runs a Facebook page with friends and told me that cloud is a must-have Because everything is on the Internet If it s gonna rain, I ll lose my data On cloud they would steal my data and the USA would read my s They already screwed up MegaUpload! 10
11 Known issues/1 Recording Logging? Which type of logs? And what about the data-retention laws? Where s my data, in which country?? -> EU vs rest-of-the-world Privacy Laws Access Who can access my data? What if I CAN T access my own data?? Backups and safeties What is backuped? When? How long (data retention, again) Compliance Which kind of Security Audits are allowed to be run? Despite the «compliances» What about Penetration Tests? Who will legally authorise the pentesters? 11
12 Known issues/2 Lawful Interception TLC Service providers must be compliance with LIS/LIG laws In this case laws are pretty similar, both into UE and extra-eu countries Legal Where is the datacenter physically located? Local laws (i.e. Privacy) Cloud Provider VS data management (privacy, once again) Transferring this data abroad.? DLP (Data Loss Prevention) How can I monitor what is happening to my boxes/applications/services? what about Digital Forensics?!? Insurance s aspect (break-ins)?? We ll check this out later thanks to Eng. Selene Giupponi Hidden costs Is there anything billed in an hidden way? CPU? Data Traffic? Disk space & Backups quotas? 12
13 First problems September 8, 2001 Google Docs stopped working. 30 minutes black-out Those data people was working on, just got lost And, people wasn t able to work btw!! 13
14 Be secure? A good start from the folks at NIST, ENISA & CSA NIST Releases Secure Cloud Computing Guidelines (September 15, 2011) Read the articles on Infosec Island! NIST Cloud Computing Standards Roadmap (NIST SP ): The full document: computing/pub/cloudcomputing/standardsroadmap/nist_sp_ _jul5a.pdf ENISA, Cloud Computing - Benefits, risks and recommendations for information security, November ENISA, Cloud Computing - SME Survey, November ENISA, Cloud Computing Information Assurance Framework, November CSA Cloud Security Alliance
15 Unknown issues?/1 DDoS attacks Running on cloud can be extremely helpful when mitigating DDoS attacks These attacks would not be as much easy to mitigate within your standard infrastructure On the other hand, from an attacker s point of view, the cloud infrastructure itself would represent a very powerful shotgun 15
16 Unknown issues?/2 Password cracking Attackers already have abused Cloud s ISPs resources in order to run password cracking software: Cracking-WPA-Protected-WiFi-in-Six-Minutes.html Roth was able to crack passwords per second 2/security/client-security/ /researcherovercomes-legal-setback-over-cloud-crackingsuite.html Apparent mis-translation by a German newspaper of English-speaking reports on researcher's Amazon EC2- based password-cracking tool led to raid, frozen bank account 11 Jan 2011 Researcher cracks Wi-Fi passwords with Amazon cloud... computers available for 28 cents per minute, the cost of the crack came to just $ d_wifi_cracking/ 16
17 Unknown issues?/3 17
18 Unknown issues?/4 Hosting mass-template configurations Just like those mass-hacks at ISPs: 1 hole, data breaches in one shot! Cheap Cloud Providers [choose_your_cheap_service-provider]-like: no grant of security if you pay them 5 EUR/month «Not CSA» (OSSTMM, OWASP, ISO/IEC, NIST,..) compliance Providers Compliance means something! BGP attacks Remember China VS USA? Mass-attacks i.e. recent Linkedin break-in followed by mass spearphishing attacks (Yahoo! and others will follow!) 18
19 Conclusions Cloud is a tool now available to us. It s not the final panacea aka the very one solution to everything. It can help us, tough. Ahead to going cloud, please run: Cost analysis IT infrastructure analysis Network and OS Security Testing (don t bring your holes into the cloud!) Web Applications penetration testing!!! Legal advisoring When gone into the cloud, please run: Web Applications penetration testing (at least!) Social Engineering tests towards the physical access? 19
20 Questions? Thanks for your attention! Raoul «nobody» Chiesa GPG Key: 20
Managing Security of the Grid in the Cloud
Managing Security of the Grid in the Cloud Raoul Chiesa, Senior Advisor on Cybercrime ECU Emerging Crimes Unit, UNICRI United Nations Interregional Crime and Justice Research Institute (UNICRI) Disclaimer
Data Breaches, Data Leaks, Web Defacements: why secure coding is important.
Data Breaches, Data Leaks, Web Defacements: why secure coding is important. Raoul «Nobody» Chiesa Founder, President, Security Brokers The speaker President, Founder, The Security Brokers Principal, CyberDefcon
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Managing your Information Assets in the Cloud
Managing your Information Assets in the Cloud Nick Loy, Director, Portfolio Management Documents BancTec Certified Information Professional Enterprise Content Management Practioner Prior to BancTec, was
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Cloud Security An Overview OWASP. The OWASP Foundation http://www.owasp.org
Cloud Security An Overview Presented by, Ezhil Arasan Babaraj [email protected] CSS Corp Labs CSS Corp Pvt Ltd. Copyright The Foundation Permission is granted to copy, distribute and/or modify
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Novel Network Computing Paradigms (I)
Lecture 4 Novel Network Computing Paradigms (I) Part B Cloud Computing Graduate Course, Hosei U., J. Ma 1 Computing Paradigm Evolution Personal PC Client Server Cloud Computing Hardware Centric Software
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor [email protected]
Cloud Security & Risk Adam Cravedi, CISA Senior IT Auditor [email protected] Agenda About Compass Overcast - Cloud Overview Thunderheads - Risks in the Cloud The Silver Lining - Security Approaches
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Walking the talk. Marnix Dekker. about the EC as cloud customer. CISO team, European Commission
Walking the talk about the EC as cloud customer Marnix Dekker CISO team, European Commission ENISA: "Security is a driver for cloud" Many technical security opportunities when "going cloud" 1. Geographic
About me & Submission details
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
CLOUD COMPUTING OVERVIEW
2110414 - Large Scale Computing Systems 1 CLOUD COMPUTING OVERVIEW 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Cloud Approaches Real-World Case Study 2110414 - Large
Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak
Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape
Cloud Computing Now and the Future Development of the IaaS
2010 Cloud Computing Now and the Future Development of the IaaS Quanta Computer Division: CCASD Title: Project Manager Name: Chad Lin Agenda: What is Cloud Computing? Public, Private and Hybrid Cloud.
Guideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen
What Is The Cloud And How Can Your Agency Use It Tom Konop Mark Piontek Cathleen Christensen Video Computer Basics: What is the Cloud What is Cloud Computing Cloud Computing Basics The use of the word
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )
23.11.2015 Jan Philipp Manager, Cyber Risk Services Enterprise Architect Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) Purpose today Introduction» Who I am
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Privacy, Security and Identity in the Cloud. Giles Hogben ENISA
Privacy, Security and Identity in the Cloud Giles Hogben ENISA What s new about Cloud Computing? Isn t it just old hat? Larry Ellison, CEO, Oracle The interesting thing about cloud computing is that we
Cloud Storage: Where Does It Fit Into Tomorrow s IT?
Cloud Storage: Where Does It Fit Into Tomorrow s IT? Vincent Franceschini CTO Distributed Data Storage Solutions Hitachi Data Systems Corporation [email protected] Constant, increasing reliance
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
ASK PC Certified Information Systems Security Expert - CISSE
Course Description As part of our mission to spread the awareness of IT security in the Middle East, we understand that an Arabic course will be valuable for native speakers. This is a comprehensive course
Cloud Computing Guide & Handbook. SAI USA Madhav Panwar
Cloud Computing Guide & Handbook SAI USA Madhav Panwar Background 2010 WGITA approved the cloud computing project with SAI USA as lead and Canada & India as members 2011 A status report was presented and
How To Understand Cloud Computing
Capacity Management for Cloud Computing Chris Molloy Distinguished Engineer Member, IBM Academy of Technology October 2009 1 Is a cloud like touching an elephant? 2 Gartner defines cloud computing as a
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing
Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing Yinong Chen 2 Big Data Big Data Technologies Cloud Computing Service and Web-Based Computing Applications Industry Control
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom
Cloud Architecture and Management M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom Cloud Computing Architecture Reference Architecture, Terminology and Definitions Akaza Cloud Architecture
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
The SMB Cyber Security Survival Guide
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
24/11/14. During this course. Internet is everywhere. Frequency barrier hit. Management costs increase. Advanced Distributed Systems Cloud Computing
Advanced Distributed Systems Cristian Klein Department of Computing Science Umeå University During this course Treads in IT Towards a new data center What is Cloud computing? Types of Clouds Making applications
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
CLOUD COMPUTING. Dana Petcu West University of Timisoara http://web.info.uvt.ro/~petcu
CLOUD COMPUTING Dana Petcu West University of Timisoara http://web.info.uvt.ro/~petcu TRENDY 2 WHY COINED CLOUD? Ask 10 professionals what cloud computing is, and you ll get 10 different answers CC is
Introduction to Computer Networking: Trends and Issues
Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Indo-US Collaboration in Engineering Education (IUCEE) Webinar,
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
The Cloud Computing Revolution: Beyond the Hype
The Cloud Computing Revolution: Beyond the Hype KEN ADLER Partner and Chair, Technology and Outsourcing Practice Group Loeb & Loeb LLP Outsourcing in Financial Services Program October 19, 2010 Overview
Introduction to Ethical Hacking and Network Defense. Objectives. Hackers
Introduction to Ethical Hacking and Network Defense January 14, 2010 MIS 4600 - Abdou Illia Objectives Describe the role of an ethical hacker Describe what can an ethical hacker legally do Describe what
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Demystifying the Cloud Computing 02.22.2012
Demystifying the Cloud Computing 02.22.2012 Speaker Introduction Victor Lang Enterprise Technology Consulting Services Victor Lang joined Smartbridge in early 2003 as the company s third employee and currently
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
Cloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
Cloud Computing Summary and Preparation for Examination
Basics of Cloud Computing Lecture 8 Cloud Computing Summary and Preparation for Examination Satish Srirama Outline Quick recap of what we have learnt as part of this course How to prepare for the examination
