Security and Compliance in Clouds
|
|
|
- Byron Williamson
- 10 years ago
- Views:
Transcription
1 Security and Compliance in Clouds Pattern-Based Compliance and Security Requirements Engineering Martin Hirsch, Jan Jürjens, Jan-Christoph Küster Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund iqnite 2011, Düsseldorf 24. May 2011 Contact:
2 Architectures for Auditable Business Process Execution (APEX) Tool supported methods for security and compliance checks on business processes Modeling time: Syntax checks of models Runtime: Conformance checks with log data Analysis based on different types of models BPMN2.0, UMLsec or system log data Attract-Program at Fraunhofer ISST Focus on insurance domain 2
3 Agenda NIST Cloud Definition Framework Cloud Security and Compliance Goals Challenges and Conflicts Pattern-Based Compliance and Security Engineering Cloud System Analysis Pattern Example: Cloud Online Banking Scenario Supporting the Information Security Standard ISO 2700x Vision and Future Work 3
4 The NIST Cloud Definition Framework P. Mell and T. Grance, The NIST definition of cloud computing, Working Paper of the National Institute of Standards and Technology (NIST),
5 Cloud Security Goals 5
6 Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, BDSG ISO2700x HGB MARisk BSI-Grundschutzkatalog AktG KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 6
7 Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, BDSG 91, 93 AktG Responsibility of management to implement ISO2700x HGB early warning risk management Not mentioned explicitely, but also for IT MARisk BSI-Grundschutzhandbuch AktG KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 7
8 Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, BDSG ISO2700x HGB MARisk 25a KWG AktG BSI-Grundschutzhandbuch disaster recovery plan of the IT systems KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 8
9 Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, BDSG MARisk 147 AO Archiving of documents Rules AktG BSI-Grundschutzhandbuch are still relevant, even if filing of documents is done in an electronic way KWG ISO2700x AO HGB Even for a small outsourcing task, a huge number of laws might become relevant 9
10 Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, BDSG ISO2700x HGB MARisk Forbid sharing of data with companies AktG or BSI-Grundschutzhandbuch governments in countries with weaker laws US Patriot Act vs. Safe Harbour KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 10
11 Motivation Cloud Computing is a specific case of outsourcing: Short term outsourcing decisions are possible Multiple customers on one outsourcing platform The scope of IT outsourcing increases Security and Compliance: Identifying relevant security requirements, laws and regulations for an international cloud scenario is a challenge: Complex environment with many stakeholders Location independence Patterns: Pattern-based approaches ease and provide a structured way of elicitation of security or compliance requirements Offer re-usability and tool-support 11
12 Cloud System Analysis Pattern 12 Beckers, Faßbender, Küster, Schmidt, A Pattern-Based Method for Identifying and Analysing Laws in the Field of Cloud Computing Compliance, ARES 2011, to appear.
13 Example: Cloud Online Banking Scenario A German bank plans to offer online banking services, that includes: Offering service access to customers in Germany via web interface Integrate significant scalability in terms of customers using the online banking services Customer data, e.g., account information, amount and transaction histories are stored in the cloud Task a subsidiary with the required software development Outsource the affected IT processes to a cloud provider in the USA 13
14 Instantiated Cloud System Analysis Pattern 14
15 Direct Stakeholder Template Instance 15
16 ISO Information Security Risk Management 16 ISO/IEC, Information technology - security techniques - information security risk management, ISO/IEC 27005, 2008
17 Context Establishment and Asset Identification in ISO Context Establishment (ISO 27005, Clause 7) Input General Considerations Context Establishment Output Scope and Boundaries Basic Criteria Asset Identification (ISO 27005, Clause ) Input General Considerations Asset Identification Output Assets to be Risk Managed Business Process related to asset 17
18 Instantiated Cloud System Analysis Pattern Context Establishment 18
19 Pattern-based Support for Context Establishment and Asset Identification in ISO Asset Identification Asset owner Types of information: Vital Personal Strategic High-cost 19
20 Conclusion and Future Work Conclusion: Conflicts of Cloud Security Goals Identifying of Security and Compliance Requirements challenging Pattern-based analysis of cloud scenarios Support of ISO 2700x standard Future Work: Requirements engineering method for cloud security and compliance Tool-Support, e.g., recommender-system 20
Security und Compliance in Clouds
Security und Compliance in Clouds Prof. Dr. Jan Jürjens, Kristian Beckers Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de The NIST Cloud Definition Framework
Security and Compliance in Clouds: Challenges and Solutions
Security and Compliance in Clouds: Challenges and Solutions Prof. Dr. Jan Jürjens Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de This Talk What are the challenges?
A Pattern-Based Method for Identifying and Analyzing Laws
A Pattern-Based Method for Identifying and Analyzing Laws Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, and Holger Schmidt paluno - The Ruhr Institute for Software Technology University of
Security and Compliance in Clouds
Security and Compliance in Clouds Jan Jürjens, Kristian Beckers Fraunhofer Institute for Software and Systems Engineering ISST (Dortmund, Germany) http://jan.jurjens.de Security is the Major Show-Stopper
A Pattern-based Method for Establishing a Cloud-specific Information Security Management System
Noname manuscript No. (will be inserted by the editor) A Pattern-based Method for Establishing a -specific Information Security Management System Establishing Information Security Management Systems for
Compliance in Clouds A cloud computing security perspective
Compliance in Clouds A cloud computing security perspective Kristian Beckers, Martin Hirsch, Jan Jürjens GI Workshop: Governance, Risk & Compliance on the 19th of March 2010 What is Cloud Computing? Today:
SUPPORTING THE SECURITY CERTIFICATION OF CLOUD-COMPUTING-INFRASTRUCTURES
SUPPORTING THE SECURITY CERTIFICATION OF CLOUD-COMPUTING-INFRASTRUCTURES Amir Shayan Ahmadian 1, Fabian Coerschulte 1, Jan Jürjens 1,2 1 Chair of Software Engineering, Technical University Dortmund, Otto-Hahn
Course 20465C: Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements
This course is intended for database professionals who need who plan, implement, and manage database solutions. Primary responsibilities include:
Course Page - Page 1 of 5 Designing Solutions for Microsoft SQL Server 2014 M-20465 Length: 3 days Price: $1,795.00 Course Description The focus of this three-day instructor-led course is on planning and
Designing a Data Solution with Microsoft SQL Server 2014
20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus
DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.
Designing a Data Solution with Microsoft SQL Server 2014
Page 1 of 8 Overview The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies.
Designing a Data Solution with Microsoft SQL Server
The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies. It describes how
Guideline 1. Cloud Computing Decision Making. Public Record Office Victoria Cloud Computing Policy. Version Number: 1.0. Issue Date: 26/06/2013
Public Record Office Victoria Cloud Computing Policy Guideline 1 Cloud Computing Decision Making Version Number: 1.0 Issue Date: 26/06/2013 Expiry Date: 26/06/2018 State of Victoria 2013 Version 1.0 Table
Course 20465: Designing a Data Solution with Microsoft SQL Server
Course 20465: Designing a Data Solution with Microsoft SQL Server Overview About this course The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure
Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Page 1 of 6 Designing a Data Solution with Microsoft SQL Server Course 20465C: 4 days; Instructor-Led Introduction The focus of this four-day
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
20465: Designing a Data Solution with Microsoft SQL Server
20465: Designing a Data Solution with Microsoft SQL Server Microsoft - Base de Dados Nível: Avançado Duração: 30h Sobre o curso The focus of this five-day instructor-led course is on planning and implementing
Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Standardization and Cloud Computing Cloud computing is a convergence of many technologies Some
20465C: Designing a Data Solution with Microsoft SQL Server
20465C: Designing a Data Solution with Microsoft SQL Server Course Details Course Code: Duration: Notes: 20465C 5 days This course syllabus should be used to determine whether the course is appropriate
Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
Cloud Security checklist Are you really ready for Cloud
checklist Are you really ready for Cloud Introduction Once you have assessed the benefits of migrating a business system or its function to the Cloud (See our White Book of Cloud Adoption), the next step
"Charting the Course... MOC 20465 C Designing a Data Solution with Microsoft SQL Server Course Summary
Course Summary Description The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL and other Microsoft technologies. It
Course 20465C: Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Five days, instructor-led About this Course The focus of this five-day instructor-led course is on planning and implementing enterprise
Designing a Data Solution with Microsoft SQL Server
Course Code: M20465C Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Data Solution with Microsoft SQL Server Overview The focus of this five-day instructor-led course is on planning
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
Designing a Data Solution with Microsoft SQL Server 2014
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 20465C: Designing a Data Solution with Microsoft SQL Server 2014 Length: 5 Days Audience: IT Professionals
Outline. MCSE: Data Platform. Course Content. Course 10776C: MCSA: 70-464 Developing Microsoft SQL Server 2012 Databases 5 Days
MCSE: Data Platform Description As you move from your role as database administrator to database professional in a cloud environment, you ll demonstrate your indispensable expertise in building enterprise-scale
WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach
WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach Marc Jansen Computer Science Institute University of Applied Sciences Ruhr West Tannenstr. 43, 46240 Bottrop Germany [email protected]
A Holistic Framework for Enterprise Data Management DAMA NCR
A Holistic Framework for Enterprise Data Management DAMA NCR Deborah L. Brooks March 13, 2007 Agenda What is Enterprise Data Management? Why an EDM Framework? EDM High-Level Framework EDM Framework Components
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
RE tools survey (part 1, collaboration and global software development in RE tools)
1 de 9 24/12/2010 11:18 RE tools survey (part 1, collaboration and global software development in RE tools) Thank you very much for participating in this survey, which will allow your tool to become part
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR Michael de Crespigny, CEO Information Security Forum Session ID: GRC R02B Session Classification: General Interest KEY ISSUE Our
Automatic Topology Completion of TOSCA-based Cloud Applications
Automatic Topology Completion of TOSCA-based Cloud Applications Pascal Hirmer 1, Uwe Breitenbücher 2, Tobias Binz 2, Frank Leymann 2 [email protected] 1 Institute for Parallel and Distributed
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
Profile. Jens Staab. Diplom Informatiker (FH) Age-group: 1967 City: Frankfurt am Main. Technical focus
Profile Diplom Informatiker (FH) Age-group: 1967 City: Frankfurt am Main Hohe Brück 12 60437 Frankfurt am Main Cell +49 17 33 29 47 67 E-Mail [email protected] Technical focus Project and Programm Management
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
20465D: Designing Solutions for Microsoft SQL Server 2014
20465D: Designing Solutions for Microsoft SQL Server 2014 Course Details Course Code: Duration: Notes: 20465D 3 days This course syllabus should be used to determine whether the course is appropriate for
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
NIST Big Data Phase I Public Working Group
NIST Big Data Phase I Public Working Group Reference Architecture Subgroup May 13 th, 2014 Presented by: Orit Levin Co-chair of the RA Subgroup Agenda Introduction: Why and How NIST Big Data Reference
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions
Database Auditing & Security Brian Flasck - IBM Louise Joosse - BPSolutions Agenda Introduction Drivers for Better DB Security InfoSphere Guardium Solution Summary Netherlands Case Study The need for additional
Cloud computing in the Enterprise: An Overview
Systems & Technology Group Cloud computing in the Enterprise: An Overview v Andrea Greggo Cloud Computing Initiative Leader, System z Market Strategy What is cloud computing? A user experience and a business
Compliance and the Cloud: What You Can and What You Can t Outsource
Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing axcient.com 2015. Axcient, Inc. All Rights Reserved. 1 Best Practices in Disaster Recovery Planning and Testing Disaster Recovery plans are widely
Certified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
Information governance: What is it? How is it implemented?
Information Technology Decision Support Systems Laboratory Information governance: What is it? How is it implemented? Sindy Madrid-Torres Part of the doctoral research: The conceptualisation and implementation
MS 20465C: Designing a Data Solution with Microsoft SQL Server
MS 20465C: Designing a Data Solution with Microsoft SQL Server Description: Note: Days: 5 Prerequisites: The focus of this five-day instructor-led course is on planning and implementing enterprise database
Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security [email protected]
Cyber Security and Cloud Computing Dr Daniel Prince Course Director MSc in Cyber Security [email protected] Scope of Today SME Attractors for Cloud Switching to the Cloud Public Private Hybrid Big
Cloud Computing Security Audit
Cloud Computing Security Audit Teddy Sukardi [email protected] Indonesia IT Consultant Association IKTII Chairman Agenda The data center and the cloud Concerns with cloud implementation The role of cloud
Checklist of ISO 22301 Mandatory Documentation
Checklist of ISO 22301 Mandatory Documentation 1) Which documents and records are required? The list below shows the minimum set of documents and records required by ISO 22301:2012 (the standard refers
Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )
23.11.2015 Jan Philipp Manager, Cyber Risk Services Enterprise Architect Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) Purpose today Introduction» Who I am
A Variability Viewpoint for Enterprise Software Systems
2012 Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture A Variability Viewpoint for Enterprise Software Systems Matthias Galster University of Groningen,
Moving from BS 25999-2 to ISO 22301. The new international standard for business continuity management systems. Transition Guide
Transition Guide Moving from BS 25999-2 to ISO 22301 The new international standard for business continuity management systems Extract from The Route Map to Business Continuity Management: Meeting the
Effective Contract Management
Effective Contract Management How can we do the right things at the right time if we do not know the contents of our contracts? ProcessWorld 2011 Berlin, June 1st 2011 Michael Neumann Agenda Background
Master Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
Achieving Security through Compliance
Achieving Security through Compliance Policies, plans, and procedures Table of Contents This white paper was written by: McAfee Foundstone Professional Services Overview...3 The Rock Foundation...3 Governance...3
Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure
White Paper Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure Providing Agile and Efficient Service Delivery for Sustainable Business Advantage What You Will Learn Enterprises
INTRODUCTION TO ISO 9001 REVISION - COMMITTEE DRAFT
INTRODUCTION TO ISO 9001 REVISION - COMMITTEE DRAFT AGENDA Introduction Annex SL Changes to ISO 9001 Future Development How SGS can support you 2 INTRODUCTION ISO 9001 Revision Committee Draft Issued 2013
Industrial case study: Zero defect secure software for the National Security Agency
p Industrial case study: Zero defect secure software for the National Security Agency Martin Croxford CEng MBCS Praxis High Integrity Systems Bath, UK Copyright Praxis High Integrity Systems Limited 2006
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
Information Security Management System for Cloud Computing
ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University
INFORMATION TECHNOLOGY FLASH REPORT
INFORMATION TECHNOLOGY FLASH REPORT ISACA Releases COBIT 5: Updated Framework for the Governance and Management of IT May 18, 2012 In April, ISACA released COBIT 5 as a replacement for its current globally
Cloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Accounting for Non-Functional Requirements in Productivity Measurement, Benchmarking & Estimating
Accounting for Non-Functional Requirements in Productivity Measurement, Benchmarking & Estimating Charles Symons President The Common Software Measurement International Consortium UKSMA/COSMIC International
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
CLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives
AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
QAD CLOUD ERP QAD CLOUD ERP IS BUILT FOR MANUFACTURERS, BUILT FOR YOU
IS BUILT FOR MANUFACTURERS, BUILT FOR YOU ERP helps manufacturers to operate more efficiently, to manage supply chains more effectively and to attract and retain customers better. Most manufacturers also
Modelling, Analysing and Improving an ERP Architecture with ArchiMate
Modelling, Analysing and Improving an ERP Architecture with ArchiMate June 25th, 2014 Heinz-Juergen Scherer, TransWare Tim Vehof, BiZZdesign Agenda Introduction Enterprise Architecture ERP systems and
