Validating Cloud. June 2012 Merry Danley
|
|
|
- Hubert Harmon
- 10 years ago
- Views:
Transcription
1 Validating Cloud June 2012 Merry Danley
2 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
3 Introduction My background includes implementation and support of various laboratory, clinical, statistical and environmental applications including: Cloud Applications (SaaS) COTS Cloud Infrastructure In-House COTS In-House Customized In-House Developed Integrated Websites Internal Non-Cloud Infrastructure In-House COTS In-House Customized In-House Developed
4 Celerion Celerion is a CRO that provides clinical research solutions with the following services: Clinical Conduct Over 730 Beds in clinics in US and Northern Ireland Bioanalytical Services in US and Zurich, Switzerland Clinical Pharmacology Sciences Drug Development/Regulatory Services
5 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
6 Environments Infrastructure (VM Ware & Hardware) Platform Platform Platform Application Application Application Application Application
7 Components of Cloud Computing Management Console Storage Options Fiber, SATA, etc. Hypervisor SAN, DAS, or NAS Physical Machines Virtual Machines Database Servers for Production Application Machines
8 Environments
9 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
10 Definitions Cloud computing is the distribution of computing infrastructure, applications, or services internally or externally Infrastructure routers, hardware, firewalls, security (physical and logical), disaster recovery, HVAC, fire suppression, environmental monitoring Applications hosting software, upgrades, installation qualification, operational qualification, logical security, backups, Services helpdesk, hardware/software monitoring, NIST Defines Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
11 Definitions: Different type of Clouds Private cloud: Here, the cloud hardware is provided solely for a single organization. The private cloud can be owned, managed, and operated by either the organization or a thirdparty provider and can be located on-site or off-site. Public cloud: Access to the cloud infrastructure is for any customer willing to pay the fees. Because of the open access, this delivery model requires careful consideration due to security requirements. Hybrid cloud: combination of different hardware/software options
12 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
13 Manage Risk by Designation of Systems Computerized System A combination of computer hardware, firmware, operating system(s) and utilities, application software, databases, networking component(s) and interface(s), equipment, instrument or instrumentation supported by operating procedures, methods and work or business processes used by trained personnel. This includes Commercial Off-the- Shelf System (COTS) systems and software bought from an external vendor, developed internally, or by a third party for specific purposes.
14 Manage Risk by Designation of Systems Tools A program or application used to create, debug, maintain, or otherwise support or automate other computerized programs and applications. Tools may also be applications used to support GxP activities (such as incident management).
15 Manage Risk by Designation of Systems Regulated Application A computerized system used to generate, produce and report data generated for or in support of GxP studies.
16 Manage Risk by Designation of Systems Storage or Archiving A storage area network (SAN) in various speeds with different special-purposes that interconnects different kinds of data storage devices with associated data platforms on behalf of a larger network of users. May be local to the hardware and computerized systems, but may also extend to remote locations for backup and/or archival storage
17 Manage Risk by Designation of Applications Systems on Cloud Regulated Applications Tools Storage/Archiving Chromatography Incident Management File Storage LIMS Archiving EDC Financial Environmental Monitoring Websites
18 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
19 Why Go Cloud Cost Provides flexible pricing options Reduces IT headcount required support and monitor server(s) Provides flexible growth options Single Point of Touch (reduces workstations and servers at sites) Single Point of Software (upgrades, configuration, etc.) Only Web Access Required No re-installation required to change hardware
20 Why Go Cloud Storage Capacity Physical and Logical Security Power consumption and ventilation (HVAC) Availability Competence Location independent Shortened Installation Cycle Pay As You Go easy to forecast Hardware Upgrades easy Disaster Recovery/Business Continuity Options
21 Cloud Concerns Cost Flexibility Privacy/security (transparency, proprietary) Important to understand data ownership Record retention Bandwidth Maintaining Validated Status Patching Automating not proper change control Application configuration Employees and other Contractors Upgrade forcing Web Availability
22 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
23 Success depends on Vendor Audits - Use Risk Based Approach Quality Program Hiring Process Security Policy Training How is access managed Disaster Recovery capabilities & testing Privileged Logical Access Security on VMs Security from Internet Threats Continuous Improvement Certifications (Sas-70-SSAE-16, SOC Reports, ISO Standards, or other security standards)
24 Success depends on Have they worked with other clients in the regulated industry what type? Approach for Account Managers, Team Managing Vendors Training Program SOPs for Outsourced Vendor Approach to Risk Management Reporting Understanding Access Security Audit (3 rd Party) Regular Status Meetings Understand your current level of business risk & theirs
25 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
26 Validation of VMs Risk Based Approach High Risk Maintaining Change Control (VMs can proliferate) VM Images Asset Inventory Logical Access Performance (depending on app) Low Risk Hardware they reside on New Hardware they might reside on Hyperviser Performance
27 Qualification Risk Based Approach Installation Qualification Easy Any hardware that is put into the data center is qualified according to your existing process - as if it was put it one of your sites Configuration, Asset Management, Diagrams, Etc. Any software or configuration done should be in the IQ documentation (hyperviser installation) Baseline information included in regulated application diagram,documentation
28 Qualification Risk Based Approach Operational Qualification Can be a little more tricky again refer to your risk assessment for your VMs May Require vendor to complete some testing As long as HypverViser software remains the same does not need to be tested on multiple VMs Does it work as intended according to the specs
29 IQ/OQ Example
30 Qualified VM Environment now what? Perform Application IQ/OQ/UAT according to normal procedures relating to the application criticality, regulatory requirements, or other designation Baseline information included in regulated application diagram, documentation
31 Validation Risk Based Approach SOPs Procedures or Policy for Managing your Cloud Providers (may need specific ones depending on how many and what type of providers you have) Procedure or Robust Audit Program (Regulatory Training and Awareness, Security, Compliance to Procedures) Responsibility designed for data reliability, integrity, security Execute regular security assessments Designate Server Owners or Application Owners for clear responsibility
32 Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience
33 Personal Experience the Good Great Support Models (24 x 7 x 365) Experience of Staff exceeds internal staff Robust Monitoring & Reporting (firewalls, internet infiltration, server performance, troubleshooting, alerting, preventative maintenance)
34 Personal Experience the Bad Team Changes Privacy Policies between Companies IQ/OQ Sometimes takes reminders It does take time to manage your vendor Maintaining up to date diagrams
35 Personal Experience the ugly Nothing as long as the right partners are selected
36 Contact Info & Questions Merry Danley 621 Rose Street Lincoln, NE
Services Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
SYLOGENT DEDICATED HOSTING
HOSTING & PROCESS SYLOGENT DEDICATED HOSTING VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM HYPERVISOR HYPERVISOR HYPERVISOR DB1 active DB2 passive Clustered hypervisors that host dedicated VMs integrated
Vendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
5 Essential Benefits of Hybrid Cloud Backup
5 Essential Benefits of Hybrid Cloud Backup QBR is a backup, disaster recovery (BDR), and business continuity solution targeted to the small to medium business (SMB) market. QBR solutions are designed
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September What is the The Cloud Some Definitions The NIST Definition of Cloud computing Cloud computing is
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Hosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
M6422A Implementing and Managing Windows Server 2008 Hyper-V
M6422A Implementing and Managing Windows Server 2008 Hyper-V Looking at Training Differently... Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: Published: Language(s): Audience(s):
Cloud Computing Thunder and Lightning on Your Horizon?
Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
CHOOSING A RACKSPACE HOSTING PLATFORM
CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project
Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT
Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT The VirtuousIT DR/BC solution is designed around RecoveryShield from Thinking SAFE. The service includes a local backup appliance
What is the Cloud, and why should it matter?
391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire
ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire Overview This pre-implementation questionnaire is designed to provide the Boston College Internal Audit Department with a general understanding
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies
Computerized System Audits In A GCP Pharmaceutical Laboratory Environment
IVTGXP_july06.qxd 6/28/06 1:09 PM Page 36 Computerized System Audits In A GCP Pharmaceutical Laboratory Environment By Maintaining data integrity for both clinical laboratory processes and patient data
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Information Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT
What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT What Will Be Presented Today? My interest in cloud computing What is cloud computing? Who did I
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
NET ACCESS HIPAA COMPLIANT FLEXCloud
Page 0 2015 SOLUTION BRIEF NET ACCESS HIPAA COMPLIANT FLEXCloud A Managed Infrastructure Solution that Meets the Regulatory Demands of the Health Care Industry NET ACCESS LLC 9 Wing Drive Cedar Knolls,
Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A
Best Practices for Validation of a Software as a Service (SaaS) Customer Relationship Management (CRM) Solution Presented By: Gregg Mauriello Validation Manager Elise Miner Associate Validation Manager
Regulated Applications in the Cloud
Keith Williams CEO Regulated Applications in the Cloud Aspects of Security and Validation Statement on the Cloud and Pharma s added Complexity Clouds already make sense for many small and mediumsize businesses,
White Paper: Vendor Selection for Your Life Science Company Cloud
White Paper: Vendor Selection for Your Life Science Company Cloud GlobalSubmit 123 South Broad Street, Suite 1850 Philadelphia, PA 19109 www.globalsubmit.com Methodsense, Inc. P.O. Box 110352 Durham, NC
2014 HIMSS Analytics Cloud Survey
2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.
IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal
Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD
OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD 1. The following draft Advisory Document will replace the 1995 OECD GLP Consensus Document number 10
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
IBM Virtual Server Services. A smarter way to support and grow your business
IBM Virtual Server Services A smarter way to support and grow your business 2 IBM Virtual Server Services Take control of IT complexity, cost and security Are you managing a complex server infrastructure?
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Qualification Guideline
Qualification Guideline June 2013 Disclaimer: This document is meant as a reference to Life Science companies in regards to the Microsoft O365 platform. Montrium does not warrant that the use of the recommendations
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
See all, manage all is the new mantra at the corporate workplace today.
See all, manage all is the new mantra at the corporate workplace today. 1) Do you want to schedule backups, software updates using just one consistent automation platform? 2) Do you want a product that
CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.
CLOUD BASED SCADA Removing Implementation and Deployment Barriers Liam Kearns Open Systems International, Inc. SCADA Traditional definition and application. SCADA DEFINITION Definition Supervisory Control
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected]
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected] 2 If cloud computing is so simple, then what s the big deal? What is the
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, [email protected] Reference
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials Outline Introduction
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)
www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server
Third Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan and execute a strategy to protect 100 percent of your
CLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Virtual Data Centre Public Cloud Simplicity Private Cloud Security
Virtual Data Centre Public Cloud Simplicity Private Cloud Security www.interoute.com Interoute Virtual Data Centre Virtual Data Centre (VDC) is Interoute s Enterprise class Infrastructure as a Service
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
