Building an Effective
|
|
|
- Sabina Ray
- 10 years ago
- Views:
Transcription
1 Building an Effective Cloud Security Program Becky Swain Co-Founder/Chair, CSA CCM Board Member, CSA Silicon Valley Chapter Partner, EKKO Consulting Marlin Pohlman Co-Chair, CSA CCM Co-Chair/Founder, CSA GRC Stack Chief Governance Officer, EMC CTO Office
2 What are the Cloud risks? Shadow & Consumerizationof IT Security, Trust & Assurance Jurisdictional Data Governance 2
3 Is Cloud worth it? YES! Platform for Innovation with Utility IT Any Device, Anywhere, Anytime Collaboration & Social Media 3
4 What is GRC? 4
5 The W s of Cloud Security WHO are cloud supply chain stakeholders (internal or external)? WHAT assets (data, credentials, software, hardware) or compliance requirements are impacted? WHERE are assets hosted (data flows)? HOW is the environment secured and compliant (architecture security)? WHY? because customers expect it! 5
6 CSA GRC Stack Family of 4 research projects: Cloud Controls Matrix (CCM) Consensus Assessments Initiative Questionnaire (CAIQ) Cloud Trust Protocol (CTP) Cloud Audit Tools for governance, risk and compliance management. Enabling automation and continuous monitoring of GRC. 6
7 CSA GRC Stack (cont.) 7
8 CSA GRC Stack (cont.) 8
9 CSA Cloud Reference Model 9
10 Control Ownership Clarity 10
11 Who is accountable for what? 11
12 Cloud Controls Matrix (CCM) 12
13 What is the CCM? First ever baseline control framework specifically designed for managing risk in the Cloud Supply Chain: Addressing the inter and intra-organizational challenges of persistent information security by clearly delineating control ownership. Providing an anchor point and common language for balanced measurement of security and compliance postures. Providing the holistic adherence to the vast and ever evolving landscape of global data privacy regulations and security standards. Serves as the basis for new industry standards and certifications. 13
14 Optimal & Holistic Compliance 14
15 CCM v1.1 Industry Participation This grass roots movement continues to grow with over 100 volunteer industry experts in the recent release of v1.2! 15
16 CCM 11 Domains 16
17 CCM 98 Controls 17
18 CCM 98 Controls (cont.) 18
19 CCM 98 Controls (cont.) 19
20 CCM 98 Controls (cont.) 20
21 Consensus Assessments Initiative Questionnaire (CAIQ) 21
22 What is the CAIQ? Cloud Supply Chain risk management and due diligence questionnaire (148 questions) Enables 1 or more Cloud service providers to demonstrate compliance with the CSA CCM. Forms the basis for establishing Cloud specific Service Level Objectives that can be incorporated into supplier agreements. Along with CSA CCM, integrated into third party GRC solution providers. 22
23 CloudAudit (formerly A6) Provides an open, extensible and secure interface for automation of Audit, Assertion, Assessment, and Assurance (A6) of cloud computing environments A structure for organizing assertions and supporting documentation for specific controls across different compliance frameworks in a way that simplifies discovery by humans and tools. Define a namespace that can support diverse frameworks. Expressed in namespace CSA CCM, ISO/IEC 27001, COBIT, HIPAA, NIST SP , PCI DSS. Defines the mechanisms for requesting and responding to queries relating to specific controls. Integrates with portals and AAA systems. 23
24 Sample Implementation CSA Compliance Pack 24
25 Sample Implementation CSA Compliance Pack 25
26 Sample Implementation CSA Compliance Pack 26
27 Cloud Trust Protocol (CTP) Mechanism by which Cloud service consumers ask providers for and receive information about the elements of transparency as applied to cloud service providers to liberate Cloud consumers to bring more sensitive and valuable business functions to the cloud. Details a mechanism to communicate enhanced SCAP CYBEX/RID/CEE exchanges, offers a Representational State Transfer (REST) mechanism with Hypermedia as the Engine of Application State (HATEOAS), and interfaces with CloudAudit. 27
28 What is CTP? 28
29 Transparency as a Service (TaaS) 29
30 Elements of Transparency 30
31 CSA Security Trust & Assurance Registry (STAR) Public and free registry of Cloud Provider self assessments, demonstrating adoption of: Cloud Controls Matrix (CCM) Consensus Assessments Initiative Questionnaire (CAIQ) Voluntary industry action promoting transparency. Free market competition to provide quality assessments. Available October
32 CSA STAR Listing Process Provider fills out CAIQ or customizes CCM Uploads document at /star CSA performs basic verification Authorized listing from provider Delete SPAM, poisoned listing Basic content accuracy check CSA digitally signs and posts at /star 32
33 CSA STAR FAQ Where? /star/ Help?Special LinkedIn support group and private mailbox moderated by CSA volunteers Costs? Free to post, free to use Is this a new hacker threat vector? No, it is responsible disclosure of security practices Will CSA police STAR?Initial verification and maintenance of Abuse mailbox Do listings expire? Yes, 1 year limit 33
34 Why Not Certification or 3 rd Party Assessment? Complex to do certification right Many uses of cloud, many customer needs Different risk profiles for each CSA supporting broad industry consortia and standards bodies ISO/IEC, ITU-T Common Assurance Maturity Model (CAMM 3rd Party assessment) GRC Stack aligns with common requirements (e.g. PCI/DSS, HIPAA, FedRAMP, 27001, CoBIT, etc) Self assessment & transparency complements all STAR could be part of SSAE 16 SOC 2 report (SAS 70 Type II replacement) 34
35 Is CSA STAR a temporary or ultimate assurance solution? Neither Permanent effort to drive transparency, competition, innovation and self regulation with agility crowdsourcing cloud security Does not provide automation, 3 rd party assessment, relative/absolute scoring, real-time controls monitoring, etc. Ultimate assurance is real time GRC (enabled by CloudAudit) complemented by CSA STAR and 3rd party attestation CSA will look to solution providers to deliver this integration. 35
36 CSA STAR What You Should Do Providers Start filling out CAIQ and/or CCM Ask us for help Customers Put your providers on notice, point them to CAIQ and/or CCM Make CSA STAR entries a standard part of procurement & assessment Get ready for October! 36
37 CSA Guidance 37
38 CSA Collaboration with SBOs 38
39 About the Cloud Security Alliance (CSA) Non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Promoting a common level of understanding between the consumers and providers of cloud computing regarding the security requirements and attestation of assurance Promoting independent research into best practices for cloud computing security Launching awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions Creating consensus lists of issues and guidance for cloud security assurance 39
40 CSA Organization & Operations 40
41 CSA Silicon Valley Chapter Mission:Foster education and transparency of emerging and innovative technologies supporting best in class solutions for Cloud Security. Join and look for chapter announcements from LinkedIn subgroup Monthly chapter meetings, free to attend in person or via conference call (scheduled using the Meetup app) Hosted inaugural CSA Innovation Conference 2011 on October 6 th in Silicon Valley 41
42 Contact CSA Help us secure cloud computing! LinkedIn: Join your local CSA Chapter: 42
43 THANK YOU! 43
GRC Stack Research Sponsorship
GRC Stack Research Sponsorship Overview Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary
TOOLS and BEST PRACTICES
TOOLS and BEST PRACTICES Daniele Catteddu Managing Director EMEA, Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within
Cloud Audit and Cloud Trust Protocol. By David Lingenfelter 2011
Cloud Audit and Cloud Trust Protocol By David Lingenfelter 2011 Background > MaaS360 SaaS Cloud Model > Mobile Device Management > FISMA Moderate Certified > SAS-70/SOC-2 Cloud Adoption Obstacles Planning
Global Efforts to Secure Cloud Computing. Jason Witty President, Cloud Security Alliance Chicago
Global Efforts to Secure Cloud Computing Jason Witty President, Cloud Security Alliance Chicago Cloud: Ushering in IT Spring Technology consumerization and its offspring Cloud: Compute as a utility Smart
The Cloud Security Alliance
The Cloud Security Alliance Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing
Building an Effec.ve Cloud Security Program
Building an Effec.ve Cloud Security Program Laura Posey Senior Security Strategist, Microso3 Corpora6on Co- Chair, CSA CAIQ Programming Chair, NY Metro CSA Chapter Is Cloud worth it? Yes! Pla?orm for Innova.on
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 2015 CloudeAssurance Page 1 Table of Contents Copyright and Disclaimer... 3 Appendix A: Introduction... 4 Appendix
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
A view from the Cloud Security Alliance peephole
A view from the Cloud Security Alliance peephole Cloud One million new mobile devices - each day! Social Networking Digital Natives State Sponsored Cyberattacks? Organized Crime? Legal Jurisdiction & Data
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Robert Brammer. Senior Advisor to the Internet2 CEO [email protected]. Internet2 NET+ Security Assessment Forum. 8 April 2014
Robert Brammer Senior Advisor to the Internet2 CEO [email protected] Internet2 NET+ Security Assessment Forum 8 April 2014 INTERNET2 NET+ Security Initiative Primary objective -- develop guidance to
Cloud Security Certification
Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible
Cloud Security Alliance: Industry Efforts to Secure Cloud Computing
Cloud Security Alliance: Industry Efforts to Secure Cloud Computing Jim Reavis, Executive Director September, 2010 Cloud: Dawn of a New Age Art Coviello - the most overhyped, underestimated phenomenon
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
2011 Cloud Security Alliance, Inc. All rights reserved.
Vast Landscape of Cloud Standards Development Organizations (SDOs) 2 4 Mission Statement (Non-Profit) Promote common level of understanding Consumers Providers Security Requirements Attestation of Assurance
Open Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR Michael de Crespigny, CEO Information Security Forum Session ID: GRC R02B Session Classification: General Interest KEY ISSUE Our
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
IIA Conference. September 18, 2015. Paige Needling Director, Global Information Security Recall, Inc.
IIA Conference September 18, 2015 Paige Needling Director, Global Information Security Recall, Inc. IT SECURITY UMBRELLA Compliance for IT Data Privacy Protection Privacy Risk Assessment Vulnerability
Cloud Channel Summit 2015 @rhipecloud #RCCS15
Cloud Channel Summit 2015 @rhipecloud #RCCS15 About the Cloud Security Alliance Global, not-for-profit organisation 300 member driven organization with over 56,000 individual members in 65 chapters worldwide
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors
1 Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors Scott Woodison Executive Director, Compliance and Enterprise Risk Office of Internal Audit and Compliance
Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli
Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli Vice President, IT Risk Management McKesson Corpora-on What is Your Business Model? Economic Moats In business, I look
Hans Bos Microsoft Nederland. [email protected]
Hans Bos Microsoft Nederland Email: Twitter: [email protected] @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party
How To Protect Your Cloud From Attack
SESSION ID: CDS-R03 Security Lessons Learned: Enterprise Adoption of Cloud Computing Jim Reavis Chief Executive Officer Cloud Security Alliance @cloudsa Agenda What we are going to cover The current &
Consolidated Audit Program (CAP) A multi-compliance approach
Consolidated Audit Program (CAP) A multi-compliance approach ISSA CONFERENCE Carlos Pelaez, Director, Coalfire May 14, 2015 About Coalfire We help our clients recognize and control cybersecurity risk,
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak
Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape
HIPAA and HITRUST - FAQ
A COALFIRE WHITE PAPER HIPAA and HITRUST - FAQ by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead Coalfire February 2013 Introduction Organizations are
Privacy Compliance and Security SLA: CSA addressing the challenges
Privacy Compliance and Security SLA: CSA addressing the challenges Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director - Cloud Security Alliance Arthur van der Wees, Managing Director
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
Close-Up on Cloud Security Audit
Close-Up on Cloud Security Audit Douglas W. Barbin 2014 BrightLine CPAs & Associates, Inc. All Rights Reserved 1 About Me Partner at BrightLine 17 years experience in security, assessments, forensics,
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports
SERVICE ORGANIZATION CONTROL REPORTS SM Formerly SAS 70 Reports SAS No. 70, Service Organizations Standard for reporting on a service organization s controls affecting user entities financial statements
9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania
Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
SAS No. 70, Service Organizations
SAS No. 70, Service Organizations A standard for reporting on a service organization s controls affecting user entities' financial statements. Only for use by service organization management, existing
Selecting a Cloud Service Provider (CSP)
Selecting a Cloud Service Provider (CSP) Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud Essentials Principal, ncontrol, LLC Adjunct Professor President, Cloud Security
Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1
Data Risk Management: ISM Ground to Cloud Summit accelerate your ambition 1 John Jones Branch Practice Manager Networking, Communications & Security Solutions [email protected] Justin Evans
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
The Webcast will begin at 1:00pm EST. www.gig-werks.com
SharePoint 2013 & SharePoint Online Security, Compliance & ediscovery The Webcast will begin at 1:00pm EST Today s Presentation: Introduction & About Gig Werks Gig Werks Experience with SharePoint Office
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY
PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY The healthcare industry is facing unprecedented challenges as it evolves. New legislation and advances in technology are leading to obstacles and opportunities
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
Amazon Web Services: Risk and Compliance January 2013
Amazon Web Services: Risk and Compliance January 2013 (Please consult http://aws.amazon.com/security for the latest version of this paper) Page 1 of 59 This document intends to provide information to assist
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
Microsoft Azure. White Paper Security, Privacy, and Compliance in
White Paper Security, Privacy, and Compliance in Security, Privacy, and Compliance in Executive Summary The adoption of cloud services worldwide continues to accelerate, yet many organizations are wary
Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Introduction to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and
14 October 2015 ISACA Curaçao Conference By: Paul Helmich
Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Cloud Card Compliance Checklist
Cloud Card Compliance Checklist An efficient tool for securing deployment Card Solutions on the Cloud Hassan El Alloussi, Laila Fetjah, Abdelhak Chaichaa Department of Mathematics and Computer Science
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
I&IT Strategy & Cyber Security
I&IT Strategy & Cyber Security Cloud Computing: Finding the Silver Lining AMCTO Information, Access, & Privacy Forum, Oct. 29 th 2015 UNCLASSIFIED Topic Why do I care about security in the Cloud? How do
Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment
2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director
Leveraging the Cloud for Smarter Development On Oilfields; What Does that Entail? Kevin Wagner, Director - Energy
Leveraging the Cloud for Smarter Development On Oilfields; What Does that Entail? Kevin Wagner, Director - Energy Covisint Overview Cloud platform enabling organizations with complex business relationships
Responsible Big Data Governance: Preventing Regulatory Overreaction
Responsible Big Data Governance: Preventing Regulatory Overreaction Paulo Pereira Chief Data Architect and Governance Leader March 22th, 2015 Imagination at work The Industrial Internet What happened when
Digi Device Cloud: Security You Can Trust
Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a
IT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
Data Intensive Storage Services for Cloud Environments
Data Intensive Storage Services for Cloud Environments Dimosthenis Kyriazis National Technical University of Athens, Greece Athanasios Voulodimos National Technical University of Athens, Greece Spyridon
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Cloud Computing Security Audit
Cloud Computing Security Audit Teddy Sukardi [email protected] Indonesia IT Consultant Association IKTII Chairman Agenda The data center and the cloud Concerns with cloud implementation The role of cloud
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected]. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected] Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
How Safe are you in your Cloud?
Nov Nov 4-5, 4-5, 2014 2014 Monarch Monarch Beach, Beach, CA CA How Safe are you in your Cloud? Security Intelligence and Regulatory Compliance in the Cloud November 2014 Heather Hinton, Ph.D. IBM Distinguished
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
