Cloud Computing: Background, Risks and Audit Recommendations
|
|
|
- Milo Horton
- 10 years ago
- Views:
Transcription
1 Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014
2 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For Moving To The Cloud 21 Risks 32 Cloud Computing Audit Approach 49 Appendix 69 2
3 Cloud Computing: Overview
4 Cloud Computing - Definition Cloud Computing describes the use of a collection of services, applications, information, and infrastructure comprised of pools of compute, network, information, and storage resources These components can be rapidly orchestrated, provisioned, implemented and decommissioned, and scaled up or down; providing for an ondemand utility-like model of allocation and consumption Key Features On demand self service Standardized IT based capability Rapid Elasticity Web based accessibility & flexibility Location independent resource pooling Scalability & resilience as key design components Prices on a consumption based model Ubiquitous network access 4
5 Essential Characteristics Of Cloud Computing According to National Institute of Standards and Technology (NIST), the five essential characteristics of cloud computing are: On-Demand Self Service Authorized agencies must be able to provide and release capabilities, as needed, automatically, without requiring human interaction with each services provider. Broad Network Access Once provisioned, the software, platform, or infrastructure maintained by the cloud provider should be available over a network using thin or thick clients. Resource Pooling The resources provisioned from the cloud provider should be pooled to serve multiple agencies or programs using a multitenant model, with different physical and virtual resources dynamically assigned and reassigned according to the agency s self-service demand Rapid Elasticity Elasticity is defined as the ability to scale resources both up and down as needed. Cloud Computing capabilities should be rapidly and elastically provisioned and released. Measured Service Cloud resource usage should be monitored, controlled, and reported providing transparency for both the provider and consumer of the service. 5
6 The Latest Evolution Of Hosting Source: 6
7 Cloud Computing Drivers and Inhibitors Pay-as-you-go Immediately scalable Cloud characteristics Multi-tenant Highly abstracted Drivers Inhibitors 7
8 Top 5 Reasons For Moving To The Cloud % % 40.4% 40.3% % Get Access to the newest functuonality faster Increase revenue by enabling us to build new revenue generating products and services faster Improve Resource Utilization Reduce The total size of IT Budget Give Business units more direct control over sourcing their own IT Solutions Percentage Respondents n = 1,109 Source: IDC's CloudTrack Survey, October
9 Top 6 Inhibitors for Considering Public Cloud Services Moving to cloud based systems not only has many benefits but also is accompanied by some challenges that need to be addressed % % 32.9% 32.3% 31% 30.7% Security Concerns Regulatory or Compliance Issues Reliability concerns in terms of service availability Concerns cloud cannot support the operational Requirements IT Governance Immaturity of cloud issues including challenges related to defining standard services Percentage Respondents n = 1,109 Source: IDC's CloudTrack Survey, October
10 Multiple Models of Cloud Computing
11 Multiple Models of Cloud Computing Cloud computing is a model for enabling on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. OR more simply, IT runs over the Internet instead of installing hardware and software yourself. Characteristics Service Models Deployment Models On demand self-service Pay as you use Rapid elasticity (expand / contract) Multi tenancy (shared pool) Broad network access Business Process as a Service (emerging) Entire business process as a service in the cloud Software as a Service Finished applications that you rent and customize Platform as a Service Developer platform that abstracts the infrastructure, OS, and middleware for developer productivity Infrastructure as a Service Deployment platform that abstracts the infrastructure Public Cloud Community Cloud Hybrid Cloud Private Cloud 11
12 Cloud Computing Offerings Business / Enterprise Influenced System Infrastructure Application Infrastructure Application and Information Process Consumer / Web Influenced * A sample list only. There are many more players. 12
13 Public Cloud Buyer Preference by Providers AWS Google Microsoft AT&T Rackspace Verizon-Terremark IBM CenturyLink-Savvis HP CSC Joyent GoGrid % 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Already Using Aware of and likely to consider Aware of and not considering Not aware 13 Percentage Respondents n = 101 Source: Everest Group, Enterprise Cloud Adoption Survey 2013
14 Cloud Usage How Can It Help Businesses Operationally? Allowing High Variable Demand - Elastic nature of the infrastructure to rapidly allocate and de-allocate massively scalable resources to business services on a demand basis Reaching Geographically Dispersed Users Consolidating Company IT Planning for Disaster Recovery Decoupling and separation of the business service from the infrastructure needed to run it (virtualization) Flexibility to choose multiple vendors that provide reliable and scalable business services, development environments, and infrastructure that can be leveraged out of the box and billed on a metered basis with no long term contracts Cost allocation flexibility for customers wanting to move CapEx into OpEx Reduced costs due to operational efficiencies, and more rapid deployment of new business services Operational Expertise Patch Management, Version Updates, Data Security Management 14
15 Cloud Usage How The Cloud Is Being Utilized? 35% 30% 30% 25% 25% 20% 15% 15% 10% 5% 5% 5% 5% 5% 5% 5% 0% Collaboration Social Media File Sharing Content Sharing Cloud Infrastructure Back-Up & Archiving CRM IT Services Media Source: Skyhigh Cloud Adoption Risk Report Q
16 A Shift Toward Decentralized, Vertical, Subscription-Based Buying The broader software implementation trends illustrate how enterprises are already changing their approach to purchasing applications and IT. Approach to Software Implementation Vertical Specific software n= Question Asked: What was the chosen approach for the implementation of those software applications? Base: Respondents are piloting or have deployed the software application enterprise wide and/or in some business units. Percentages may not add up to 100% because of rounding. Web Conferencing, Collaboration/Social Software Suites n=582 Enterprise Control Management n=473 Digital Content Creation n=442 Office suites n=688 Project and Portfolio Management n=541 Customer relationship management n=596 Supply chain management n=481 Enterprise resource planning n= Business Intelligence n= Source: Market Trends Application SaaS On-Premise License Hosted License On-Premise Subscription Open Source Don t Know 16
17 Most Used Applications In The Public Cloud SaaS is a turnkey service, with application, presentation, and data tiers and all associated services in a single service that can be accessed and provisioned over the Internet % 20.9% % 19.3% % CRM Applications(Marketing/sales) CRM Applications(Call Centers/Contact Centers) Supply Chain & Logistics Human Resource Application Financial/Accounting Applications Percentage Respondents n = 1,109 Source: IDC's CloudTrack Survey, October
18 Cloud Adoption by Company Size < 20 Employees 68% 6% Employees 61% 7% Employees 66% 9% Employees 50% 11% 500+ Employees 53% 9% Source: Infographic: SMB Cloud Adoption Trends in
19 Cloud Maturity SMB vs Enterprise SMB Enterprise 20% Developing a cloud strategy 16% 29% 35% Working on first cloud project 25% Multiple projects & developing 31% apps in the cloud 26% Heavily using cloud infrastructure 18% Source: Infographic: SMB Cloud Adoption Trends in
20 Market Forecast
21 Cloud Services Market Outlook Source: Investors' Business Daily 21
22 Cloud Services Market Outlook Cloud service revenue is expected to be USD 220bn by 2015, and USD 480bn by 2019 Business processes (cloud-based advertising, e-commerce, human resources, payment processing and other business processes) cloud services market is expected to be USD 370bn by 2019 Data from Intuit and Emergent Research reveals that by 2020, 78 percent of small businesses will be fully adapted to cloud computing. That s more than double the current 37 percent adoption rate as of Source: Research Pedia; Small Business Trends 22
23 Cloud Services Market Outlook Cisco predicts Cloud Data Center traffic to grow at 35% CAGR. By 2017, over twothirds of all data center traffic is expected to be based in the cloud. Source: 23
24 Risks
25 Clouds Are Cloudy Requirements Services As visibility is lost Where is the data? Who can see the data? Who has seen the data? Has data been tampered with? Where is processing performed? How is processing configured? Does backup happen? How? Where? security, compliance, and value are lost as well. 25
26 Top Risks Loss of Governance Lock-In Management Interface Compromise Incomplete or Insecure Data Deletion Data Protection Malicious Insider / Investigative Support Isolation Failure Compliance Risks 26
27 Categories of Control Objectives Compliance Data Governance Facility Security Human Resources Information Security Legal Operations Management Risk Management Release Management Resiliency 27
28 Control Objectives Independent Regulatory Audits Compliance Vendor Management Information System Regulatory Mapping Intellectual Property Classification Data Governance Handling / Labeling / Security Policy Retention Policy Risk Assessments Policy Facility User Access Asset Management Background Screening Human Resources Employment Agreements Employment Termination 28
29 Control Objectives Management Program Policy, Reviews, Enforcement User Access Restriction / Authorization / Reviews Awareness Training Roles / Responsibilities Information Security Management Oversight User Access Policy Workspace Cleanliness Anti-Virus / Malicious Software Incident Management Identification, Reporting and Monitoring Incident Response Legal Preparation 29
30 Control Objectives Non-Disclosure Agreements Legal Third Party Agreements Service Level Agreements Operations Management Capacity / Resource Planning Program Assessments Risk Management Mitigation / Acceptance Business / Policy Change Impacts Third Party Access Release Management Resiliency Production Changes Outsourced Development Management Program Impact Analysis Business Continuity Planning Business Continuity Testing 30
31 Cloud Computing Audit Approach
32 Involvement of Internal Audit in Cloud Computing Vendor Selection & Contract Negotiation Validation of business case Right to Audit Clause and/or SSAE16 Compliance Scope Impact of Regulations on Data Security Stability of Partners and Services Providers Contractual Data Protection Responsibilities and Related Clauses Impact of Regulations on Provider Infrastructure Prepare Evidence of How Each Requirement Is Being Met Project management - roles and responsibilities Data migration strategy Inherent and residual risk assessment Pre-Implementation Review Post-Implementation Review Accuracy of data Policies and procedures pertaining to data security, privacy of data Regulatory changes - HIPAA, PCI, etc. 32
33 Audit/Projects Around Cloud Computing Cloud computing platform evaluation / due diligence Data migration review to the new platform Management of the cloud computing function Security reviews Security of data Network accessibility User administration Regular review of SOC Type 1/provider sponsored audit reports Cost/Savings impact Realignment of controls for regulatory reporting SLA/KPI review to ensure the provider is living up to their end of the bargain Impacts to Disaster Recovery/Business Continuity 33
34 Scoping Define the audit objectives and scope. Understand the core business process and its alignment with IT, in its non-cloud form and current or future cloud implementation. Obtain a description of all cloud computing environments in use and under consideration. Obtain a description of all cloud computing applications in use and under consideration. Identify the types of cloud services (IaaS, PaaS, SaaS) in use and under consideration, and determine the services and business solutions to be included in the review. Obtain and review any previous audit reports with remediation plans. Identify open issues, and assess updates to the documents with respect to these issues. Since the areas under review rely heavily on the effectiveness of core IT general controls, it is recommended that audit/assurance reviews of the following areas be performed prior to the execution of the cloud computing review, so that appropriate reliance can be placed on these assessments: Identity management (if the organization s identity management system is integrated with the cloud computing system) Security incident management (to interface with and manage cloud computing incidents) Network perimeter security (as an access point to the Internet) Systems development (in which the cloud is part of the application infrastructure) Project management IT risk management Data management (for data transmitted and stored on cloud systems) Vulnerability management 34 ISACA, Cloud Computing Management Audit/Assurance Program, USA, 2010, CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party. Computing-Management-Audit-Assurance-Program.aspx
35 Audit Approach The ISACA approach breaks down an audit into two categories Governing the Cloud Operating in the Cloud Each area has Control Objectives that are subsequently reviewed. 35 ISACA, Cloud Computing Management Audit/Assurance Program, USA, 2010, CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party. Computing-Management-Audit-Assurance-Program.aspx
36 Audit Approach Governing the Cloud includes the following processes. The controls associated with these processes are then evaluated. Governance Audit/Assurance Objective: Governance functions are established to ensure effective and sustainable management processes that result in transparency of business decisions, clear lines of responsibility, information security in alignment with regulatory and customer organization standards, and accountability. Enterprise Risk Management Audit/Assurance Objective: Risk management practices are implemented to evaluate inherent risks within the cloud computing model, identify appropriate control mechanisms, and ensure that residual risk is within acceptable levels. Information Risk Management Audit/Assurance Objective: A process to manage information risk exists and is integrated into the organization s overall ERM framework. Information risk management information and metrics are available for the information security function to manage risks within the risk tolerance of the data owner. 36
37 Audit Approach Governing the Cloud includes the following processes. Third-party Management Audit/Assurance Objective: The customer recognizes the outsourced relationship with the service provider. The customer understands its responsibilities for controls, and the service provider has provided assurances of sustainability of those controls. Contractual Obligations Audit/Assurance Objective: The service provider and customer establish bilateral agreements and procedures to ensure contractual obligations are satisfied, and these obligations address the compliance requirements of both the customer and service provider.. Legal Compliance Audit/Assurance Objective: Legal issues relating to functional, jurisdictional and contractual requirements are addressed to protect both parties, and these issues are documented, approved and monitored. Right to Audit Audit/Assurance Objective: The right to audit is clearly defined and satisfies the assurance requirements of the customer s board of directors, audit charter, external auditors and any regulators having jurisdiction over the customer. 37
38 Audit Approach Governing the Cloud includes the following processes. Auditability Audit/Assurance Objective: The service provider s operating environment should be subject to audit to satisfy the customer s audit charter, compliance requirements and good practice controls without restriction. Compliance Scope Audit/Assurance Objective: The use of cloud computing does not invalidate or violate any customer compliance agreement. ISO Certification Audit/Assurance Objective: Service provider security assurance is provided through ISO27001 Certification. Service Transition Planning Audit/Assurance Objective: Planning for the migration of data, such as formats and access, is essential to reducing operational and financial risks at the end of the contract. The transition of services should be considered at the beginning of contract negotiations. 38
39 Audit Approach Operating in the Cloud includes the following processes. The controls associated with these processes are then evaluated. Incident Response, Notification and Remediation Audit/Assurance Objective: Incident notifications, responses, and remediation are documented, timely, address the risk of the incident, escalated as necessary and are formally closed. Application Security Architecture Audit/Assurance Objective: Applications are developed with an understanding of the interdependencies inherent in cloud applications, requiring a risk analysis and design of configuration management and provisioning process that will withstand changing application architectures. Compliance Audit/Assurance Objective: Compliance requirements are an integral component of the design and implementation of the application security architecture. 39
40 Audit Approach Operating in the Cloud includes the following processes. Tools and Services Audit/Assurance Objective: Use of development tools, application management libraries and other software are evaluated to ensure their use will not negatively impact the security of applications. Application Functionality Audit/Assurance Objective: For SaaS implementations, the application outsourced to the cloud contains the appropriate functionality and processing controls required by the customer s control policies within the processing scope (financial, operational, etc.). Encryption Audit/Assurance Objective: Data are securely transmitted and maintained to prevent unauthorized access and modification. 40
41 Audit Approach Operating in the Cloud includes the following processes. Key Management Audit/Assurance Objective: Encryption keys are securely protected against unauthorized access, separation of duties exists between the key managers and the hosting organization, and the keys are recoverable. Identity and Access Management Audit/Assurance Objective: Identity processes assure only authorized users have access to the data and resources, user activities can be audited and analyzed, and the customer has control over access management. Virtualization Audit/Assurance Objective: Virtualization operating systems are hardened to prevent crosscontamination with other customer environments. 41
42 At A Minimum: Execute A Cloud Service Provider Questionnaire Ask the basic questions Where do you store our data? Who can access and retrieve the data? Do you have auditing enabled? Is it available to us? How do you determine if our data has been tampered with? What are your configuration standards? Does backup happen? How? Where? Have you attained any external/independent security certifications? Follow-up with a detailed information security questionnaire 42
43 Ensure Basic Mitigation Techniques Are In Place Intellectual Property Loss Monitoring controls Encryption design and requirements Data backup management Compliance Reporting Specify a breach notification process Ask for independent reviews and certifications Use your own Golden Rule Treat my data like I treat my own Security Administration Analyze the cloud service provider (CSP) security model Ensure strong authentication and access controls Require the CSP to be completely transparent 43
44 Q & A
45 Thank You Cal Slemp Managing Director New York, NY
46 Confidentiality Statement and Restriction for Use 46 This document contains confidential material proprietary to Protiviti Inc. ("Protiviti"), a wholly-owned subsidiary of Robert Half ("RHI"). RHI is a publicly-traded company and as such, the materials, information, ideas, and concepts contained herein are non-public, should be used solely and exclusively to evaluate the capabilities of Protiviti to provide assistance to your Company, and should not be used in any inappropriate manner or in violation of applicable securities laws. The contents are intended for the use of your Company and may not be distributed to third parties.
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
I D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T L e ve r a g i n g N e x t - Generation Servi c e D e l i ve r y: T h e M o ve t o C l o ud Servi c e s November 2011 Adapted from CSC Innoventure 2011: Good Things
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Asia/Pacific. Yanna Dharmasthira
Trends and Directions of SaaSS in Asia/Pacific Yanna Dharmasthira October 2013 Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected]
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected] 2 If cloud computing is so simple, then what s the big deal? What is the
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec
Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform
Cloud Computing: Risks and Auditing
IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Enhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
50x 2020 40 Zettabytes*
IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
How To Run A Cloud Computer System
Cloud Technologies and GIS Nathalie Smith [email protected] Agenda What is Cloud Computing? How does it work? Cloud and GIS applications Esri Offerings Lots of hype Cloud computing remains the latest, most
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012
Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner 23 February 2012 Foreword Cloud Security Alliance New Zealand Chapter is grateful to Privacy Commissioner for giving an opportunity
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Current Reality: A Look at Cloud Opportunities Beyond the Hype
Outsmart Your Competitors Current Reality: A Look at Cloud Opportunities Beyond the Hype May 17 and 18, 2011 Presented by: Jeremiah Caron, Vice President - Analysis Amy DeCarlo, Principal Analyst Security
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
The Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
2014 HIMSS Analytics Cloud Survey
2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen
What Is The Cloud And How Can Your Agency Use It Tom Konop Mark Piontek Cathleen Christensen Video Computer Basics: What is the Cloud What is Cloud Computing Cloud Computing Basics The use of the word
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
The Push and Pull of the Cloud. TPI Cloud Computing Overview. April 5 th 2011
0 The Push and Pull of the Cloud. TPI Cloud Computing Overview April 5 th 2011. No part of this document may be reproduced in any form or by any electronic or mechanical Copyright means, 2011 Technology
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
How To Understand Cloud Computing
Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch
SSAE 16 for Transportation & Logistics Companies Chris Kradjan Kim Koch 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind,
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC
Secure Cloud Computing Concepts Supporting Big Data in Healthcare Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Learning Objectives After this session, the learner should
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
Compliance and the Cloud: What You Can and What You Can t Outsource
Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Sensitive Data Management: Current Trends in HIPAA and HITRUST
Sensitive Data Management: Current Trends in HIPAA and HITRUST Presented by, Cal Slemp Managing Director, New York, NY June 12, 2012 Speaker Presenter Topic Objective Cal Slemp Managing Director, New York
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
A.Prof. Dr. Markus Hagenbuchner [email protected]. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner [email protected] CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
CLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there
A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
