Security and Privacy in Cloud Computing
|
|
|
- Kathryn Baldwin
- 10 years ago
- Views:
Transcription
1 Security and Privacy in Cloud Computing - Study Report Sai Lakshmi General Manager Enterprise Security Solutions
2 2 Agenda Background & Objective Current Scenario & Future of Cloud Computing Challenges in Cloud Computing Data Security, Data Privacy Compliance Legal and Contractual Challenges faced by Cloud Providers Recommendations
3 3 Background & Objective DSCI has undertaken a study on Data Protection Challenges in Cloud Computing in partnership with Wipro with the objective to understand the security and privacy challenges and trends in Cloud Computing with respect to Indian IT environment As part of this study, DSCI along with Wipro conducted a survey to understand the perception of the security professionals on risks & challenges associated with Cloud Computing focusing on Security & Privacy
4 4 Study Methodology Primary research A survey across 48 organizations Survey was conducted by DSCI and Wipro Total of 71 professionals representing 48 organizations Secondary research, covering the following aspects vis-à-vis Cloud Computing: Different Cloud deployment models (Private, Public, Hybrid etc) Cloud Services Models (SaaS, PaaS, IaaS, etc.) Current Scenario and Future of Cloud Computing Reasons behind considering Cloud Computing Challenges in the adoption of Cloud Computing Criteria for Cloud service provider selection Challenges faced by Cloud service providers Role of NASSCOM-DSCI in Cloud Computing ecosystem
5 Cloud Computing in India World Cloud Services Revenue forecasted to reach $ 68.3 billion in 2010 and $148.8 billion in 2014 Cloud Computing market in India currently stands at USD 110 million and is expected to reach USD 1,084 million by 2015* Software-as-a-Service (SaaS) has witnessed the highest growth and it is likely to reach a mark of USD 650 million by 2015* 21% of the surveyed firms are planning to host IT services on the Cloud and pilot projects are initiated Cloud adoption in India 24% 15% 38% Not considering migration to Cloud Computing as of now 5 21% Already using Cloud Computing services Planning to initiate a pilot project or implement less critical services Planning a complete migration Will consider based on the industry / peer adoption trend
6 6 Cloud Deployment models and Adoption Private cloud. - Dedicated cloud infrastructure for an org. Self Managed or Third Party, On premise / Off Premise Public cloud. - Shared Cloud Infrastructure on a cost services model selling cloud services. Hybrid cloud. Cloud infrastructure composed of private, public and or community cloud that enables data & application portability (e.g., cloud bursting). Community cloud. Shared cloud infrastructure managed by the organizations or a third party and may exist on premise or off premise ORGANISATION PREFERENCE FOR ADOPTION OF CLOUD DEPLOYMENT MODELS Deployment Decision Matrix Cost Effectiveness Management Control Reliability Accountability Standardization Adoption Security Public Cloud 6% Private Cloud 29% 66% Hybrid Cloud or Community Cloud Large enterprises points toward exploring Public Clouds for hosting of non-business, non-critical, support applications only such as Document Management Systems hosted s, CRM and Learning Solutions, etc Critical Applications, that demand data to reside within organizational systems, because of regulatory/legal requirements, remain on the Private Cloud Organizations often adopt Public Cloud for services where users are not required to deal With any sensitive data
7 7 Cloud Deployment Models In a SaaS Model, the software is hosted at the cloud service provider s site 91% In a PaaS Model, the application framework is hosted at the cloud service provider s site 56% 53% In a IaaS Model, the compute, storage is available as a service
8 Security as a Service In a Security as a Service Model, the security functions are delivered as a service 53% Security as a Service 70% 57% 61% 43% 48% 35% Identity Management Threat Management Security Device Management Infrastructure Security Operations 8 Web Security Monitoring Vulnerability Assessment and Penetration Testing
9 9 Challenges in Cloud Computing Data Security and Privacy - a Major inhibitor to Cloud adoption 95% Challenge in meeting Compliance requirements Accountability and ownership of data in the Cloud Legal & Contractual Issues addressing geographical specific regulatory requirements especially in trans-border data flow and storage 80% 76% major challenges / concerns Data Security & Privacy 70% 25% 3% Compliance Issues 30% 50% 16% 4% Legal & Contractual Issues 39% 37% 21% 4% Challenges in migration 11% 2 38% 18% 11% Lack of clarity in pay per use Model 13% 15% 47% 24% Integration of Cloud based applications with legacy systems 2 33% 33% 8% 4% Critical Very Important Important Less Important Not Important
10 10 Data Security & Privacy Challenges Major Data Security Challenges in the Cloud 9 Data Segregation & Protection 80% Data Leak Prevention Other Important Considerations on Cloud Threat and Vulnerability Management 75% 7 Identity and Access Management
11 Compliance & Legal Contractual Challenges Compliance Considerations on Cloud 7 71% Ability of provider to demonstrate compliance Feasibility of Audit and Assessment of Applications Distribution of ownership between user organization and cloud provider Addressing Specific Compliance Requirements like HIPAA, GLBA, PCI Feasibility of Audit and assessment of applications and systems COMPLIANCE CHALLENGES 27% 26% 21% 41% 36% 50% 31% 34% 27% On demand availability of Log & Audit Trails 24% 44% 24% 8% Ability of provider to demonstrate compliance requirements of user 39% 33% 27% Critical Very Important Important Less Important Not Important Legal and Contractual Challenges in the Cloud 79% 74% Liability Sharing in case of data breaches and subsequent resource mechanism Ownership of Intellectual property of end users information End of Service Support Issues like retention & disposal of information, transfer of IPR Ownership of Intellectual Property of cloud based services, products and end user Information LEGAL & CONTRACTUAL CHALLENGES 34% 41% 30% 33% 3 2 4% 4% Liability sharing in case of data breaches and subsequent recourse mechanism 44% 35% 21% Critical Very Important Important Less Important Not Imporantt 11
12 12 Measures Adopted - Addressing Data Security Top 3 Measures adopted by Organizations 69% 58% 5 Including security & privacy clauses in the contractual agreement Periodically auditing the services of Cloud service provider Making Cloud service provider legally liable for data breach The emergence of security services on the cloud is yet to mature from the basic MSS models, which are currently prevalent. Strengthening the contracts and periodic audits are some of the basic measures that organizations are currently adopting. Measures adopted by organization Including data security and privacy clauses in the contract 69% Making the service provider legally liable for any data security & privacy breach 5 Auditing the service provider at a defined and mutually agreed frequency Service Provider providing third party audit reports to your organization on a regular basis Mandating service providers to implement technical and organizational safeguards Demanding transparency in information management practices through regular reporting Aligning existing security & privacy strategies to address new challenges Updating the norms of privacy specific user transactions to incorporate new challenges None 4% 33% 33% 31% 44% 4 58%
13 Selecting the Right Cloud Provider Security, Privacy and Compliance considerations for selecting a Cloud service provider 77% 73% 7 7 Demonstration of Data Security and Privacy Capabilities of Cloud service provider Ability to support BCP/ DR requirements Standardized security preparedness of Cloud service provider like ISO Certification Transparency in information practices followed by the Cloud service provider Reduced Investment in BCP/DR, a major cost-centre for business, is one of the major drivers for adoption of Cloud Computing Major Security & Privacy, Compliance considertion for selecting a cloud provider Standardized security preparedness of cloud provider like ISO certification 54% 18% 1 4% 1 Third Party Attestation or Seal for Privacy 21% 4 21% 15% Demonstration of data security and privacy capabilities by cloud provider 43% 34% 17% 4% Transparency in Information practices followed by the cloud provider 43% 29% 20% 6% No. of Data Security breaches in the past 41% 2 28% 4% 4% Service and Operation level agreements including Security Operations 4 19% 21% 17% Disaster Recovery capabilities 48% 25% 13% 6% 8% Compliance Demonstration Capabilities 38% 33% 16% 4% 9% Critical Very Important Important Less Important Not Important 13
14 14 Challenges faced by Cloud Providers Top 3 Challenges faced by Cloud providers 78% 59% 57% Technological limitation especially in Indian context where network bandwidth, latency and interoperability has been seen as a major challenge Meeting multiple regulatory compliance requirements, that vary considerably based on the type of data, geography and domain / industry. E.g. HIPAA for health records, GLBA for financial transactions, PCI DSS for credit card data, etc. Meeting multiple contractual requirements, especially when data protection requirements as well as data breach liabilities of different countries vary considerably Major challenges faced by cloud service providers Meeting multiple regulatory 59% Technological Limitations Meeting multiple contractual 57% Huge initial capital expenditure / 33% Inadequate Research and Development Alleviate negative perceptions about Unavailability of skilled resources Migration of services provided to client Technological Limitations (Indian 15% 19% 19% 24% 26% Enforcement of IT (Amendment) Act, 2008 will be a challenge as cloud computing Business benefits arising out of the use of cloud computing will influence the focus Under the Indian Telecom Licensing Policy, prohibition of data transfer outside the 78% Indian legal framework 38% 61% 63%
15 15 Role of NASSCOM DSCI in Cloud Computing Role of NASSCOM-DSCI in the Cloud computing ecosystem in India Promote data security and privacy in the evolving cloud based ecosystem Work closely with the government to create necessary policy environment for cloud computing 70% 68% Advise user organizations on the data security and privacy related aspects of cloud computing 48% Engage with the cloud providers to establish safe and secure cloud computing environment 55% Benchmark different cloud providers against their data security and privacy practices 45% This study is an important step for DSCI to chart out and drive the government policy initiatives for Cloud computing
16 16 Recommendations Security standards and certifications specific to Cloud environments need to be developed for successful implementation of Cloud services User organizations should involve Business, IT and legal team in framing of the contract provisions Cloud service providers - Transparency required with their processes, certifications, information security practices, and techniques Both User organizations and Cloud service providers should develop robust information security governance, regardless of the service or deployment model.
17 2010 Wipro Ltd - Confidential Thank you.
18 Wipro as an Originator and System Integrator of cloud Cloud Layer Solutions as an Originator System Integration Services BPaaS SaaS 1. Mortgage origination 2. HRO 1. Public Cloud solutions: Hospital software, Auto Dealer platform, E-commerce platform, Mortgage origination, Document Management 2. Vendor products offered on Wipro Cloud: Fidelity Banking software, MS Dynamics 1. Platform development 1. System Integration Services SFDC, Dynamic CRM, Oracle on Demand, Workday, SAP ByD, Netsuite, BPOS, Google Applications 2. SaaS enabling Independent software vendor applications PaaS IaaS No Originating solutions 1. Wipro Cloud data centers (USA/Europe/India) 2. Hosting for SaaS & BPaaS vendors 1. Lead developer on Azure, Force.com platforms 2. Hosted test platforms 3. Build Private PaaS platform (wsaas) 1. Build, Operate & manage Private cloud, Migration to public cloud 2. SI, test and manage public cloud Wipro Ltd - Confidential
19 Wipro services to cloud Originators and Enterprises Cloud Layer Services to Originators Services to Enterprises BPaaS 1. Platform development 1. Wipro BPaaS solutions- Mortgage origination SaaS PaaS IaaS 1. Dev & test support for SaaS ISV s 2. Enabling cloud services on devices (mobile) 1. Enabling devices (mobile) 1. Hosting for SaaS / BPaaS vendors 2. SI and test deployments for public cloud 1. System integration service for SFDC, Dynamic CRM, Oracle On Demand, Netsuite, BPOS, Google Apps, Workday, SAP ByD 2. Wipro solutions offered in Public Cloud: Hospital software, Auto Dealer platform, E commerce platform, Mortgage origination, Document Management 3. ISV products offered on Wipro Cloud: Fidelity Banking software, MS Dynamic CRM 1. Lead developer on Azure, Force.com 2. Test platforms on cloud 3. wsaas Private PaaS 1. Setting up Private cloud 2. Migration to public cloud 3. Wipro Cloud data centers (USA, Europe & India) Wipro Ltd - Confidential
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
LEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
Cloud Computing in Banking
Financial Services the way we see it Cloud Computing in Banking What banks need to know when considering a move to the cloud Contents 1 Overview 3 2 Why Cloud Computing for Banks? 4 2.1 Cost Savings and
Brochure More information from http://www.researchandmarkets.com/reports/3050461/
Brochure More information from http://www.researchandmarkets.com/reports/3050461/ Global Cloud Computing Market Service (Software, Infrastructure, Platform)- Strategy, Overview, Size, Share, Global Trends,
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
Cloud Security Certification
Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible
Global Cloud Based BPO Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3420456/ Global Cloud Based BPO Market 2015-2019 Description: About cloud-based BPO Over the years, enterprises worldwide have become
Hans Bos Microsoft Nederland. [email protected]
Hans Bos Microsoft Nederland Email: Twitter: [email protected] @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Security in the Cloud: Visibility & Control of your Cloud Service Providers
Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing
Contents Introduction Why GRC Assessment Benefits of Cloud computing and Problem Statement Key Speculations & Problems faced by Cloud service user s in Today s time Threats, Vulnerabilities and related
HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting
Quick guide: Using the Cloud to support your business
Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
Platform as a Service (PaaS) (Public, Private and Hybrid Cloud) Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2014-2020
Brochure More information from http://www.researchandmarkets.com/reports/3060123/ Platform as a Service (PaaS) (Public, Private and Hybrid Cloud) Market - Global Industry Analysis, Size, Share, Growth,
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Legal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
CLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Why You Should Consider the Cloud
INTERSYSTEMS WHITE PAPER Why You Should Consider the Cloud In 2014, we ll see every major player make big investments to scale up Cloud, mobile, and big data capabilities, and fiercely battle for the hearts
Cloud Computing: Background, Risks and Audit Recommendations
Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
ICANWK616A Manage security, privacy and compliance of cloud service deployment
ICANWK616A Manage security, privacy and compliance of cloud service deployment Release 1 ICANWK616A Manage security, privacy and compliance of cloud service deployment Modification History Release Release
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
BUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan [email protected] 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
Cloud Computing: Making the right choices
Cloud Computing: Making the right choices Kalpak Shah Clogeny Technologies Pvt Ltd 1 About Me Kalpak Shah Founder & CEO, Clogeny Technologies Passionate about economics and technology evolving through
Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors
1 Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors Scott Woodison Executive Director, Compliance and Enterprise Risk Office of Internal Audit and Compliance
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services
DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security
Molnet öppnar nya möjligheter för kostnadseffektiv IT
Molnet öppnar nya möjligheter för kostnadseffektiv IT March 3 Magnus Arildsson, Cloud Leader, IBM Nordic 2015 IBM Corporation Market Shifts are creating a new era of IT Data is becoming the world s new
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director
www.pwc.com Moving your enterprise systems to the cloud? What do you need to know to manage the risks? November 2015 Jamie Levitt, Director Disclaimer Certain matters reviewed today may represent services
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Realizing the Value Proposition of Cloud Computing
Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Protecting Data and Privacy in the Cloud
Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Open Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
Leveraging the Private Cloud for Competitive Advantage
Leveraging the Private Cloud for Competitive Advantage Introduction While it is universally accepted that organisations will leverage cloud solutions to service their IT needs, there is a lack of clarity
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Cloud Computing and HIPAA Privacy and Security
Cloud Computing and HIPAA Privacy and Security This is just one example of the many online resources Practical Law Company offers. Christine A. Williams, Perkins Coie LLP, with PLC Employee Benefits &
Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework
Cloud 101 General Overview of Cloud Services January 21, 2015 Agenda Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework 2. 2014
The growing demand for a centralized system for the management of academic processes is expected to drive the cloud computing in education market
Brochure More information from http://www.researchandmarkets.com/reports/3505246/ Cloud Computing in Education Market by Service Model (SaaS, PaaS, and IaaS), Deployment Model (Private Cloud, Public Cloud,
CRISIL Young Thought Leader 2014 CLOUD COMPUTING. MALADI SRINIVAS PAVAN 2 nd year student of PGDM INDIAN INSTITUTE OF MANAGEMENT CALCUTTA
CRISIL Young Thought Leader 2014 CLOUD COMPUTING How will cloud computing transfo rm technology? Wha t is the futu re outlo ok for cloud computing? Submitted by MALADI SRINIVAS PAVAN 2 nd year student
How To Secure Cloud Computing
A hole in the cloud: Is cloud secure? N. Vijaykumar Infosys Technologies Limited, Bangalore presented at Security in cloud is a key challenge! 70% 60% 50% 40% 30% 20% 10% 0% Data integrity tampering Hacker
Cloud Computing Discussion
Cloud Computing Discussion Dave Duden Director Deloitte Consulting, LLP October 25, 2011 Perspectives on Cloud Computing - 2 - Cloud computing Why Cloud? What s in it for me? I m not in IT, why do I care?
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Inside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison [email protected]
Inside the Cloud The Supporting Architecture of Cloud Computing Jack Hanison [email protected] What is Cloud Computing? 2 http://www.flickr.com/photos/galego/3131005845/ Is Cloud Computing these
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
