Jericho Forum Report Back
|
|
|
- Raymond Fletcher
- 10 years ago
- Views:
Transcription
1 Jericho Forum Report Back What's been achieved through 2009, and how we will continue to make a difference in Paul Simmonds & Adrian Seccombe Board of Management, Jericho Forum
2 How we got to here a brief review of the decade 2001 The de-perimeterisation word coined [Royal Mail s Jon Measham] 2002 Discussion started among like minded CISO s who saw the upcoming problem 2003 Paul Simmonds & David Lacey present at RSA Europe, caused front page headlines 2004 January: Jericho Forum founded at The Open Group Office in Reading interim board formed, and agree to Open Group taking over day-to-day running 2004 December: Interim board form as a Jericho Forum membership group, with an elected Board of Managers 2005 February: White paper published 2005 April: First Jericho Conference held alongside Info Security & SC Awards 2005 Interim board agree to Open Group to take over day-to-day running Trade mark issued 2006 April: First position paper published 2006 April: Commandments published 2008 April: COA Published 2009 April: Cloud Paper Published 2009 De-perimeterisation an established concept, now accepted as relevant to the cloud 2009 Commandments seen to Stand up to the rigours of the Clouds In computing terms the Noughties was the decade of de-perimeterisation
3 Key Publications Business rationale for de-perimeterisation Jericho Forum Commandments White Paper Freely available at
4 Key Publications The need for Inherently Secure Protocols Collaboration Oriented Architectures Cloud Cube Freely available at
5 And it s not just us! Forrester Paul Stamp July 2005 ISSA Journal De-perimeterized Architecture The end to the edge August 2009 ISF Architectural Responses to the Disappearing Network Boundary February 2009
6 2009 & Up-coming work Self Assessment Scheme Cloud current work CSA memorandum of understanding Commandments still valid for cloud Identity & Access Management The cloud identity crisis - why cloud won't take off without Id & AM Risk based access
7 Self Assessment Scheme Rationale Based on the Commandments the set of nasty questions to ask your security vendors Check if they provide the security solutions you need and, Expose shortcomings in the features they may be claiming their offerings provide Can be used stand-alone, or relevant parts simply incorporated into an RFQ Release Timeline Beta Testing with vendors - Jan 2010 US Release, 1st RSA Europe, 27 th Info Security
8 From Connectivity to Collaboration Connectivity Full de-perimeterised working Today Effective Perimeter Breakdown Full Internet-based Collaboration Consumerisation [Cheap IP based devices] Limited Internet-based Collaboration External Working VPN based External collaboration [Private connections] Internet Connectivity Web, , Telnet, FTP Connectivity for Internet Connected LANs interoperating protocols Local Area Networks Islands by technology Stand-alone Computing [Mainframe, Mini, PC s] Time
9 Externalisation of Data Internal De-perimeterised COA Secured Cloud Old Data Then Data Now Data Near Future Data Future? Data The security of the network becomes increasingly irrelevant, and the security and integrity of the data becomes everything.
10 Jericho Forum Cloud Cube Model Dimension Four: Insourced / Outsourced The Cloud Location External Internal Perimeterised Proprietary Open Ownership - technology/services/code Architecture De-perimeterised
11 Cloud & the Cloud Cube model CSA memorandum of understanding Commandments still valid for the cloud Hybrid Computing will be the norm (A mix of traditional and various cloud computing) Private Clouds are Perimeterised Collaborative Clouds are best de-perimeterised Select the four types of either with care!
12 Identity & Access Management Key is to separate Identity Management from Access Management, and Audit the activities Identify: I am he/she! Authenticate: You are indeed! or not Access: I d like to do that Authorisation: Yes you are allowed or not Monitor: What did you do Audit: You did the right things, right! or not
13 The Cloud Identity Crisis The Cloud won't take off fully without appropriate Identity and Access Management Private Clouds will be able to take advantage of the old Perimeterised Identity and Access Management models Collaborative Clouds will need a significant shift from Enterprise Centric security to User Centric Security Clouds also will benefit greatly from the shift from Access by Lists to Access by Claims
14 Risk Based Access Current access methods Do not support business needs / granularity Do not support real cloud working Do not support the move the securing the data Trust but verify Basic trust models for devices & users exist But; How do you verify environments you do not own? How do you verify that environments you do not own are cleaned up after use?
15 2010 Planned / Proposed Work Publish Self Assessment Scheme for RSA Represent Jericho Forum thinking in 2010 RSA Conference Refine linkages to CSA and ENISA, and develop new linkages to other bodies (like ISSA) Identity and Access Management De-perimeterised wireless network implications
16 A reminder of how we work De-perimeterisation COA Cloud Few people 100% occupied More people, some vendors 60/40 split Thought Leaders Many people, users & vendors User Members Widest Jericho forum community and non-members Vendor Members IT / Business Leaders
17 Conclusions De-perimeterisation still a relevant topic with plenty to be highlighted and addressed Commandments are both relevant and still relevant as we move to cloud issues There is a shift from Enterprise Centric to User Centric IAM There needs to be a shift from ACL s to Claims based access
18 Questions & Comments omments Questions & Com Questions & Comments Questions & Comments ions & Comments
19 Shaping security for tomorrow s world
Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration
Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Problem Cloud computing offers massive scalability - in virtual computing power, storage, and applications resources - all at almost
IT Audit and Compliance
Problem IT Audit and Compliance IT audit is about the formal verification and validation of the quality and effectiveness of IT controls to support the overall business control objectives. From a security
Fundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
Cloud Computing and Security Models: A Survey
Cloud Computing and Security Models: A Survey Ritesh G. Anantwar, Dr. P.N. Chatur, Swati G. Anantwar M tech., HOD, GCOE Amravati (MH) (INDIA), ME SGBAU Amravati (MH) Abstract-- Cloud computing is introducing
A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey
A Comparison of IT Governance & Control Frameworks in Cloud Computing Jack D. Becker ITDS Department, UNT & Elana Bailey ITDS Department, UNT MS in IS AMCIS 2014 August, 2014 Savannah, GA Presentation
BYOD(evice) without BYOI(nsecurity)
BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device
Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services
Standard Information Communications Technology January2013 Version 1.4 Corporate and Information Services Document details Document Title Contact details File name Version 1.4 Document Control Information
Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures
Workprogramme 2013 objective 1.2 Sandro D Elia Software & Service Architectures and Infrastructures Target Outcomes Delivering services in an effective, efficient and reliable manner across the future
Sofware Engineering, Services and Cloud Computing
Work Programme 2013 Objective ICT-2013.1.2: Sofware Engineering, Services and Cloud Computing DG CONNECT Unit E2: Software and Service, Cloud Target Outcomes Delivering services in an effective, efficient
Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2213812/ Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Description: The auditor's guide to ensuring
Parametric Analysis of Various Cloud Computing Security Models
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506 International Research Publications House http://www. irphouse.com Parametric Analysis
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
How To Integrate Identity And Security With A Network-Based Business Process
INFORMATION SECURITY BRIEF Business Enablement Demands Tight Identity and Security Integration Date: April 2009 Author: Jon Oltsik, Principal Analyst Abstract: Identity management and security were once
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, 2015. Brian Grayek CISSP, CCSK, ITILv3
Cloud Security Are you on the train or the tracks? ISSA CISO Executive Forum April 18, 2015 Brian Grayek CISSP, CCSK, ITILv3 1 Agenda: Facts Opinions (based on experience) A little humor Some gold nuggets
Standard Information Communications Technology. Multifunction Device. January 2013 Version 2.2. Department of Corporate and Information Services
Standard Information Communications Technology January 2013 Version 2.2 Corporate and Information Services Document details Document Title Contact details File name Version 2.2 Date issued January 2013
REVIEW ARTICLE. Received 21 February 2015 / Accepted 16 March 2015 1. INTRODUCTION
International Journal of Advances in Engineering, 2015, 1(3), 141-145 ISSN: 2394-9260 (printed version); ISSN: 2394-9279 (online version); url:http://www.ijae.in Security Models and Issues in Cloud Computing
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
Securing external suppliers and supply chains: the ISF approach
Securing external suppliers and supply chains: the ISF Dr. Adrian Davis, MBCS, CITP, CISMP Principal Research Analyst Information Security Forum Agenda Introduction The supply chain: business environment
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE
BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE The future trend is towards a universal access control model, one which inverts the network so that the protective perimeter is concentrated
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
System to System Interface Guide
System to System Interface Guide Overview What does this guide cover? This guide describes the interface definition to firms intending to submit their TRS Product Sales Data (PSD) or Securities Trades
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Using SMI-S for Management Automation of StarWind iscsi SAN V8 beta in System Center Virtual Machine Manager 2012 R2
Using SMI-S for Management Automation of StarWind iscsi SAN V8 beta in System Center Virtual Machine Manager 2012 R2 September 2013 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind
Using certificates as authentication method for VPN connections between Netgear ProSafe Routers and the ProSafe VPN Client
Using certificates as authentication method for VPN connections between Netgear ProSafe Routers and the ProSafe VPN Client This document describes how to use certificates as an authentication method when
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Security of Cloud Computing Providers Study
Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
The Best Security Solutions combine excellence in design, application and customer insight
The Best Security Solutions combine excellence in design, application and customer insight Kahl Betham Global Product Manager Gallagher Security The evolution of physical security Business Policy End customer
Mobile Device Management
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
Survey Questionnaire for IT Applications. General instructions for filling the forms of survey questionnaire:
Survey Questionnaire for IT Applications General instructions for filling the forms of survey questionnaire: There are three forms in the survey questionnaire. For each IT Application all the forms of
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson
Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization
Welcome to IBM SmartCloud Notes!
Introduction Welcome to IBM SmartCloud Notes! This project template has been created to assist IT Project Managers tasked with planning and executing a Proof of Concept for IBM SmartCloud Notes Hybrid.
The Standard. of Good Practice. for Information Security
The Standard of Good Practice for Information Security 2007 Information for Non-ISF Members The Standard of Good Practice for Information Security (the Standard) has been produced by the Information Security
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
The TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
The Ethics of Cloud Computing A Conceptual Review
The A Conceptual Review Job Timmermans, TU Delft, Department of Philosophy, The Netherlands Bernd Carsten Stahl, De Montfort, Critical Research in Technology, UK Veikko Ikonen, VTT, Finland Engin Bozdag,
10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN
10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Lesson s From the Granddaddy of Federation
Lesson s From the Granddaddy of Federation A SAML Centric Discussion Matthew Gardiner Matthew Gardiner Security Management BU & Bill Taub CISO What You are Going to Hear About Today > Mostly topics on
BPO 2.0 Redefining The Very Basics of Business Process Outsourcing
Telegenisys Outsourcing Excellence White Paper BPO 2.0 Refining the Very Basics of Business Process Outsourcing BPO 2.0 Redefining The Very Basics of Business Process Outsourcing Table of Contents INTRODUCTION
Cloud Security. Let s Open the Box. Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
Cloud Security Alliance: Industry Efforts to Secure Cloud Computing
Cloud Security Alliance: Industry Efforts to Secure Cloud Computing Jim Reavis, Executive Director September, 2010 Cloud: Dawn of a New Age Art Coviello - the most overhyped, underestimated phenomenon
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 September 2011 Changes Date September 2011 Version Description 1.0 To introduce PCI DSS ROC Reporting Instructions
Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited
Firewall Audit Techniques K.S.Narayanan HCL Technologies Limited Firewall Management Technology Network Security Architecture Firewall Placement Firewall Appliance Rule base compliance with security policy
Dispelling the Myths about Cloud Computing Security
Dispelling the Myths about Cloud Computing Security security is no longer an hinderance to the cloud! Leo F. Howell, CISSP CISA CCSK Knowledge MYTH we are all talking about the same cloud Discussion cloud
UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved
18570909 CPA SECURITY CHARACTERISTIC REMOTE DESKTOP Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for CPA Security Characteristic Remote Desktop 1.0 Document History
PROGRESS THROUGH PARTNERSHIP MAKING A DIFFERENCE GUIDANCE PERFORMANCE MANAGEMENT FRAMEWORK AND CONTINUOUS IMPROVEMENT
PROGRESS THROUGH PARTNERSHIP MAKING A DIFFERENCE GUIDANCE PERFORMANCE MANAGEMENT FRAMEWORK AND CONTINUOUS IMPROVEMENT July 2014 Contents Page Introduction 3 What is continuous improvement? 4 Why do we
Configure ISE Version 1.4 Posture with Microsoft WSUS
Configure ISE Version 1.4 Posture with Microsoft WSUS Document ID: 119214 Contributed by Michal Garcarz, Cisco TAC Engineer. Aug 03, 2015 Contents Introduction Prerequisites Requirements Components Used
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
Networking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Knowledgebase Solution
Knowledgebase Solution Goal Enable coexistence of a 3 rd -party VPN / Firewall with an EdgeMarc appliance. Describe characteristics and tradeoffs of different topologies. Provide configuration information
How To Make Money On Security For A Large Organization
SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
IT Forum 2-11-2013 UW-Madison Records Management Program. UW Archives and Records Management
IT Forum 2-11-2013 UW-Madison Records Management Program Records facilitate and sustaining day-to-day university operations. Records support organizational activities such as student admissions, research
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
A Secure and Open Solution for Seamless Transit Systems
A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation
Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Jim Wittry HP Cloud Partner Business Manager [email protected] http://www8.hp.com/us/en/cloud/helion-overview.html Copyright 2014
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
