Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES
|
|
|
- Tobias Brooks
- 10 years ago
- Views:
Transcription
1 Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES
2 Agenda Importance of Common Cloud Standards Outline current work undertaken Define Cloud security requirements & prac<ces Review various ISO Standards both published and in development
3 The Importance of Common Standards for the Cloud Cloud services offer many proprietary techniques which prevent interoperability and portability between environments. Benefits of Common Standards: Prevents vendor lockout Creates common terminology for cloud consumers AND providers Creates a common set of control objec<ves for security controls for cer<fica<ons and audits Creates standardized methodologies and formats for monitoring and logging Creates a standardized set of assurance models used by both cloud consumers and cloud providers Provides a standardized set of APIs for ease of automa<on and instrumenta<on
4 Ongoing technical work in ISO JTC1 SC27 General ISO 27000, 27001, 27002, Informa<on security best prac<ces and security cer<fica<on ISO , , Supply chain risk management Numerous other ISO standards covering technical topics in network management, iden<ty management, cryptography, and privacy Cloud Specific ISO Security guidance on implementa<on requirements for cloud ISO Data protec<on controls for public cloud ISO Security guidance on supply chain risk management issues specific to cloud deployments Collabora<on with SC38 on Cloud- related projects (ISO 17788, 17789) Study period for Cloud Risk Assessment
5 ISO/IEC highlights Cloud Terminology Key Characteris<cs Broad Network Access network accessible from anywhere Measured Service usage monitored, controlled, reported, and billed Mul<- tenancy physical and virtual resources allocated in a manner which isolates one tenant s computa<on and data from other tenants On- demand self- service cloud service customer provisions as needed automa<cally or with minimal interac<on with cloud service provider Rapid elas<city and scalability physical or virtual resources are rapidly and elas<cally provisioned as needed per service agreement Resource pooling cloud service provider resources are aggregated without customer control or knowledge of how resources are provided or where they are located unless contractual agreement specifies loca<on
6 ISO/IEC highlights Cloud compu<ng roles and ac<vi<es Cloud service customer business rela<onship with cloud service provider or cloud service customer for the purpose of using cloud services Cloud service partner a party suppor<ng the ac<vi<es of either the cloud service provider or the cloud service customer e.g. cloud auditor, cloud service broker Cloud service provider a party which makes cloud services available
7 ISO/IEC highlights Cloud Service Capabili<es Applica<on capabili<es type cloud service customer uses the cloud service provider s applica<on Infrastructure capabili<es type cloud service customer provisions and uses processing, storage, or networking resources Pla^orm capabili<es type cloud service customer deploys, manages, and runs a customer- created or customer- acquired applica<on using programming languages or execu<on environments supported by the cloud service provider
8 ISO/IEC highlights Cloud Service Categories Communica<ons as a Service (CaaS) Real<me interac<on and collabora<on Compute as a Service (CompaaS) Provisioning and use of processing resources needed to deploy and run so`ware Infrastructure as a Service (IaaS) Infrastructure capabili<es are provided to the cloud service customer Network as a Service (NaaS) Capability provided is transport connec<vity and related network capabili<es Pla^orm as a Service (PaaS) Capability provided is pla^orm capabili<es type So`ware as a Service (SaaS) Capability provided is the applica<on capabili<es type
9 ISO/IEC highlights Cloud Deployment models Public Cloud resources are controlled by the cloud service provider and available to any cloud service customer Private Cloud cloud deployment used exclusively by a single cloud service customer with a narrowly controlled boundary based on limi<ng customers to one organiza<on. May be operated by customer or third party, on premise or off premise. Community Cloud supports and is shared by a specific collec<on of cloud service customers with shared requirements and a rela<onship with one another. Broad boundary limi<ng par<cipa<on to customers with shared set of concerns Hybrid Cloud deployment model using at least two different deployment models bound together by appropriate technology to enable interoperability, data portability, and applica<on portability. Boundary reflects its two base deployments.
10 ISO/IEC ISO/IEC DIS Informa<on technology - - Security techniques - - Code of prac<ce for informa<on security controls based on ISO/IEC for cloud services Status: Under development Target publica<on date:
11 ISO/IEC Overview SCOPE Gives guidelines for relevant controls specified in ISO/IEC Provides addi<onal controls with implementa<on guidance specifically rela<ng to cloud services for both cloud service providers and cloud service customers NORMATIVE REFERENCES ISO/IEC 27000, Informa(on technology - Security techniques - Informa(on security management systems - Overview and vocabulary ISO/IEC 17788, Informa(on technology Cloud compu(ng Overview and vocabulary ISO/IEC 17789, Informa(on technology Cloud compu(ng Reference architecture ISO/IEC 27002:2013, Informa(on technology - Security techniques - Code of prac(ce for informa(on security controls
12 ISO/IEC Overview Cloud sector- specific security concepts in this standard Supplier rela<onships in cloud services Acquirer- supplier rela<onship Supply chain rela<onships between cloud infrastructure providers and cloud applica<on providers Rela<onships between cloud service customers and cloud service providers Cloud service customer s business process dependency upon CIA of cloud service Cloud service customer requires security informa<on from cloud service provider to determine if addi<onal controls must be implemented for risk mi<ga<on Managing informa<on security risks in cloud services derived from its features Networking Resource sharing Cross- jurisdic<onal service provisioning Limited visibility into implementa<on of controls Etc.
13 ISO/IEC Overview Appendix B provides references for risk sources and risks in the provision and use of cloud services Recommenda<on ITU- T X.1601, Security framework for cloud compu(ng - Jan Australian Government Informa<on Management Office, Summary of Checkpoints of Privacy and Cloud Compu(ng for Australian Government Agencies: BeMer Prac(ce Guide - Feb Australian Signals Directorate, Sec<on 17 Overview of Cloud Compu(ng Security Considera(ons of Cloud Compu(ng Security Considera(ons - Sep Hong Kong OGCIO, Security & Privacy Checklist for Cloud Service Providers in Handling Personal Iden(fiable Informa(on in Cloud PlaSorms - April 2013 Hong Kong OGCIO, Security Checklists for Cloud Service Consumers - Jan NIST, SP Guidelines on Security and Privacy in Public Cloud Compu(ng - Dec NIST, SP Cloud Compu(ng Synopsis and Recommenda(ons - May 2012
14 ISO/IEC Demo of Content
15 ITU- T X.1601 digression ISO/IEC provides a list of references for cloud- based threat/risk assessments. ITU- T X.1601 provides useful informa<on on this topic and, unlike ISO/IEC standards, this ITU- T standard is FREE. Topics covered: Security threats for cloud compu<ng Security threats for cloud service customers (CSCs) Security threats for cloud service providers (CSPs) Security challenges for cloud compu<ng Security challenges for cloud service customers (CSCs) Security challenges for cloud service providers (CSPs) Security challenges for cloud service partners (CSNs)
16 ITU- T X.1601 Con'nued Cloud compu<ng security capabili<es Trust model Iden<ty and access management (IAM), authen<ca<on, authoriza<on and transac<on audit Physical security Interface security Compu<ng virtualiza<on security Network security Data isola<on, protec<on and privacy protec<on Security coordina<on Opera<onal security Incident management Disaster recovery Service security assessment and audit Interoperability, portability and reversibility Supply chain security
17 ITU- T X.1601 Con'nued Useful threat tables Y indicates where a security capability addresses a threat or challenge
18 ISO/IEC Status: Published ISO/IEC 27018:2014 Informa<on technology Security techniques Code of prac<ce for PII protec<on in public clouds ac<ng as PII processors Abstract ISO/IEC 27018:2014 establishes commonly accepted control objec<ves, controls and guidelines for implemen<ng measures to protect Personally Iden<fiable Informa<on (PII) in accordance with the privacy principles in ISO/IEC for the public cloud compu<ng environment. In par<cular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into considera<on the regulatory requirements for the protec<on of PII which might be applicable within the context of the informa<on security risk environment(s) of a provider of public cloud services. ISO/IEC 27018:2014 is applicable to all types and sizes of organiza<ons, including public and private companies, government en<<es, and not- for- profit organiza<ons, which provide informa<on processing services as PII processors via cloud compu<ng under contract to other organiza<ons. The guidelines in ISO/IEC 27018:2014 might also be relevant to organiza<ons ac<ng as PII controllers; however, PII controllers can be subject to addi<onal PII protec<on legisla<on, regula<ons and obliga<ons, not applying to PII processors. ISO/IEC 27018:2014 is not intended to cover such addi<onal obliga<ons.
19 ISO/IEC 27018:2014 preview
20 ISO/IEC 27018:2014 preview
21 ISO/IEC 27018:2014 Demo of standard
22 SC27 Cloud Study Groups Cloud Compu<ng Security and Privacy SC27 liaison officers and project editors meet to maintain consistency and alignment among cloud standards Use cases used to develop joint text between SC27(ISO/IEC 27017) and ITU- T SG17(X.ccsec) Study Period on Cloud Security Technologies was extended to inves<gate: Virtualiza<on Security Security as a Service Integra<on of Cloud Compu<ng into exis<ng projects: Storage Incident Management Forensics Supplier Rela<onships Disaster Recovery
23 New work in study period Cloud risk management Based upon NIST work on Cloud adapted Risk Management Framework Dra` created by CS1 for input into study period work in progress Responsibili<es shi` from Provider to Consumer depending on the cloud deployment model Cloud specific considera<ons for risk management emerge based on the shi` in responsibility
24 Other Cloud Standardiza'on Ac'vi'es ITU- T SG17 X.ccsec ENISA Cloud Compu<ng Security Risk Assessment Procure Secure Cri<cal Cloud Compu<ng ETSI - Cloud Standards Coordina<on Workshops Coordinate with stakeholders in the cloud standards ecosystems Devise standards roadmaps in support of EU policy in cri<cal areas such as security, interoperability, data portability, and reversibility
25 Other Cloud Standardiza'on Ac'vi'es Cloud Security Alliance (CSA) Established Interna<onal Standardiza<on Council in 2012 Liaisons with ISO/IEC SC27, ISO/IEC SC38 and ITU- T, contributor to cloud standards Standards and best prac<ces on many aspects of cloud security, for example: Security Guidance Cloud Controls Matrix Training and Cer<ficate of Cloud Security Knowledge (CCSK) CSA Security Trust and Assurance Registry (STAR)
26 Ge[ng involved locally Cloud Security Alliance: Searle Chapter Free membership Monthly mee<ngs in Bellevue 8 <mes/year Generally held towards end of month Thursday evening 6-8 Two speakers and food hrps://chapters.cloudsecurityalliance.org/searle/
27 Ques<ons?
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
Cloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
Building an Effec.ve Cloud Security Program
Building an Effec.ve Cloud Security Program Laura Posey Senior Security Strategist, Microso3 Corpora6on Co- Chair, CSA CAIQ Programming Chair, NY Metro CSA Chapter Is Cloud worth it? Yes! Pla?orm for Innova.on
Legacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
Project Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
Lifting the Fog Around Cloud Computing. Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems
Lifting the Fog Around Cloud Computing Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems 1 Straw Poll Cloud Awareness A. To truly understand clouds one should
How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook
How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
Latest in Cloud Computing Standards. Eric A. Hibbard, CISSP, ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems
Latest in Cloud Computing Standards Eric A. Hibbard, CISSP, ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems 1 Short Introduction CTO Security & Privacy, Hitachi Data Systems Involved
The Real Score of Cloud
The Real Score of Cloud Mayur Sahni Sr. Research Manger IDC Asia/Pacific [email protected] @mayursahni Digital Transformation Changing Role of IT Innova&on Informa&on Business agility Changing role of the
HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers
Introduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Data Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
Chapter 3. Database Architectures and the Web Transparencies
Week 2: Chapter 3 Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objec
Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
Cloud Compu)ng: Overview & challenges. Aminata A. Garba
Cloud Compu)ng: Overview & challenges Aminata A. Garba Outline I. Introduc*on II. Virtualiza*on III. Resources Op*miza*on VI. Challenges 2 A Historical Note 1960, the idea of organizing computa)on as a
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security. Mihai Voicu CIO/CSO ILS Technology LLC
M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security Mihai Voicu CIO/CSO ILS Technology LLC Topics 1 What is the role of standardization in security for M2M solutions? 2 How are TIA and other
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft)
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value
Main Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
So#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
Cloud Computing Standards: Overview and first achievements in ITU-T SG13.
Cloud Computing Standards: Overview and first achievements in ITU-T SG13. Dr ITU-T, Chairman of Cloud Computing Working Party, SG 13 Future Networks Orange Labs Networks, Cloud & Future Networks Standard
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Pu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9
Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may
Stakeholders Mee.ng on Healthcare Financing in Kenya Health Care Financing Reforms in Kenya. Elkana Ong u* Chief Economist (MOMS) 30 th August,2012
Stakeholders Mee.ng on Healthcare Financing in Kenya Health Care Financing Reforms in Kenya Elkana Ong u* Chief Economist (MOMS) 30 th August,2012 Presenta.on Outline Kenya health sector vision Objec.ves
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity January 2016 [email protected] Improving Critical Infrastructure Cybersecurity It is the policy of the United States to enhance the security
The Development of Cloud Interoperability
NSC- JST Workshop The Development of Cloud Interoperability Weicheng Huang Na7onal Center for High- performance Compu7ng Na7onal Applied Research Laboratories 1 Outline Where are we? Our experiences before
Session 4: Programmes: the Core of the 10YFP
Session 4: Programmes: the Core of the 10YFP * Criteria * Initial and non-exhaustive list * 5 steps model to develop programmes * Request for additional programmas * Criteria and process for new programmes
PROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, [email protected] Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
Management and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and Applications Musa Unmehopa Technical Plenary Chairman, OMA Director of Standards, Alcatel-Lucent M2M devices outnumber mobile devices by an order of magnitude
CS 5150 So(ware Engineering System Architecture: Introduc<on
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY
Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY Subhash Sankuratripati NetApp SNIA Legal Notice The material contained in
Cluster on Data Protec/on, Security and Privacy in Cloud. Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA)
Cluster on Data Protec/on, Security and Privacy in Cloud Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA) Context Increase impact of EU- funded projects on Cloud working in
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
DTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS
Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project
Case Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
An Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
CLOUD COMPUTING DEMYSTIFIED
CLOUD COMPUTING DEMYSTIFIED Definitions you ve been pretending to understand JACK DANIEL, CCSK, CISSP, MVP ENTERPRISE SECURITY Definitions Words have meaning, professionals need to understand them. We
