The downturn and the cloud..challenge and solution?



Similar documents
Cloud Computing - Starting Points for Privacy and Transparency

Cloud s Illusions: Jericho Forum future direction

Information Security in a Downturn

Quick guide: Using the Cloud to support your business

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

White Paper on CLOUD COMPUTING

Security Risk Management Strategy in a Mobile and Consumerised World

Cloud Computing for Small to Mid Size Businesses. Tech66, LLC William Burleson

ADRIAN DAVIS INFORMATION SECURITY FORUM

Learning from the Cloud providers to use the CMDB to drive cost savings through automation

Cloud Computing: A Practical Approach

Cloud Computing Technology

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

ISI INTERNATIONAL STRATEGY & INVESTMENT

The Magazine for IT Security. May issue 3. sör alex / photocase.com

Towards the Cloud! Ian Osborne Director, Digital Systems KTN, Intellect

A Primer on Cloud Computing. By Anand Ganesan Byteonic.com

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0

CLOUD COMPUTING An Overview

Custom to Commodity Business & IT in the 21 st century

Cloud Computing. Relevance to Enterprise. Abstract

Cloud Computing and Disaster Recovery

BT Assure. Security that matters. British Telecommunications plc Template Version 1.2

Using Cloud Computing to Drive Innovation: Technological Opportunities and

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

Platform Leadership in Software as a Service: How Platforms Facilitate Innovation

Lifting the Fog: The High Potential of Cloud Computing Paul Daugherty, Chief Technology Architect February 19, 2010

Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public

APPLICATION OF CLOUD COMPUTING IN EDUCATION. Achmad Benny Mutiara

ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs

Abstract 1. INTRODUCTION

Putchong Uthayopas, Kasetsart University

Clouds and Competing Shores: the Changing Landscapes of Outsourcing & Offshoring. Dr Richard Sykes

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Management Consulting for Media and Telecoms. Cloud Service Trends. Solon TMT Industry Briefing. Munich, London, Budapest September 2012

U.S. Mobile Benchmark Report

Cloud Computing An Elephant In The Dark

Certified Cloud Computing Professional VS-1067

Securing external suppliers and supply chains: the ISF approach

Cloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher

Security Considerations for Public Mobile Cloud Computing

The Cloud Opportunity: Italian Market 01/10/2010

Introduction to Cloud Computing

Trust. The essential ingredient for innovation. Thomas Langkabel National Technology Officer Microsoft Germany

CLOUD COMPUTING SECURITY CONCERNS

World Cloud Computing Market

CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

CLOUD COMPUTING SECURITY ISSUES

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Cloud Computing An Auditor s Perspective

Cloud Computing. Relevance to Enterprise G Lakshmanan. Abstract

Security Issues In Cloud Computing And Their Solutions

Cloud Platforms Today: The Big Picture

Eliminate Risk & Gain Rewards Using Technology: How Savvy Successful Small Businesses Operate By Laura Leist, CPO, MOS, CRTS January 12, 2015

Rachel Chalmers, 451 group, October 20th, 2008

Cloud Computing AoC Position Paper. September 2012

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Architecture and Virtualisation. Lecture 2 Cloud Computing Overview

Cloud Courses Description

Cloud Computing. Technologies and Types

Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013

PwC Cybersecurity Briefing

Cloud Security for SME

Webstore - Reselling Cloud

Cloud Services Overview

Attachment G.18. SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change. 03 July, 2015

Cloud Courses Description

Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

CRM, Student Communication and Student Relationship Management in the Cloud. Case Study

Welcome to the Force.com Developer Day

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

JOURNAL OF OBJECT TECHNOLOGY

DATA Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels. re3rerererewr

Cloud Computing The Evolution of IT

Public Cloud Offerings and Private Cloud Options. Week 2 Lecture 4. M. Ali Babar

PaaS and the Newton: One of These Things is Just Like the Other

Informations- und Kommunikationsinstitut der Landeshauptstadt Saarbrücken. European local Government Conference, Berlin, June 7th 9th

Security in the Cloud an end to end Problem

Architectural Implications of Cloud Computing

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

Zoho Projects. Social collaborative project management platform

HRG Assessment The Cloud Computing Challenge

CLOUD COMPUTING. When It's smarter to rent than to buy

How to Use YourPrintCloud Wireless Printing for Xerox Copiers & Printers. revised 30 Jan

Program. Maria Fiore Business Development Manager Hartco. Hugo Boutet igovirtual. Introduction to MicroAge. SME and «cloud computing» 2006 MicroAge

Investor Newsletter. SMEStorage Open Cloud File Server Unify, Govern, and Manage your files. Cloud File Server Overview

Quick View. Folder Details

Securing Dispersed Networks

white paper Cloud computing: resilience is the key to success

INFORMATION SECURITY BRIEFING 01/2010 CLOUD COMPUTING

1 The intersection of IAM and the cloud

Pharma CloudAdoption. and Qualification Trends

How To Understand Cloud Computing

NAVIGATING THE MAZE LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona CIO Roundtable Retreat

DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite

A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services

Transcription:

The downturn and the cloud..challenge and solution? Dr Adrian Davis, MBCS, CITP Head, Leadership and Management Group Information Security Forum Research and Services Team

What the ISF provides for its Members and much more besides! 2

The downturn Challenge

Major drivers of change Social environment (demographics, attitudes, cultures) Business environment (activities, operations, markets) Economic environment (credit crunch, realignment of world economy, rise of China) Global environment (global warming, interconnectivity, competition for resources) Technological environment (cloud computing, nanotechnology, pervasiveness) 4

Possible future threats Political Legal More legislation Protectionism Government Interdependence Economic Less R&D Privacy vs. security 2011 Technical Cloud Corporate / Computing Home systems More outsourcing Crime Harsher penalties Socio-Technical Internet or Reality? Encryption Haves vs. Have nots Home working 5

It s a new world 6

The cloud Solution?

What is cloud computing? The development and provision of computer services and resources across networks such as the Internet Characterised by customers not having control or detailed knowledge of the technology or resources that provide the services or resource they purchase service outputs rather than inputs. 8

Characteristics of clouds 9

Characteristics of cloud computing 10

Cloud computing exists at many levels Clients Web browsers, thin clients, mobile phones (eg iphone, Google Android) Services Open ID, Google maps, Paypal Applications Facebook, salesforce.com CRM Platforms Force.com, Microsoft Azure, Web app frameworks (eg Ruby on Rails, Ajaz) Storage Amazon Simple Storage, Microsoft Skydrive, Google big table datastore Infrastructure Virtualisation and Grid computing (Sun Grids, GoGrid) 11

Issues Managing access to your information Lack of transparency Operational incidents Suspicious activity Supplier viability (short and long term) The Gaps 12

Final thoughts The downturn will impact information security - Organisations are looking to save costs - Whether through reduced headcount, investment or even innovation IT and related fields will have to take their share New (or re-packaged) technologies will be examined and adopted - Especially those that offer reduced investment, reduced through-life costs and value-add services - Cloud computing may be one such technology Understand the risks - Whether it s downturn or cloud computing - Prepare to manage your risks and those of the future 13

How the ISF can help material Managing Security in a Downturn Economy Profit Driven Attacks Insider Threats Threat Horizon 2010 Effective approaches to managing a security function Information security strategy Examining the needs of CISO RISE: role of information security in the enterprise The Insider view 14

Questions? Adrian Davis Senior Research Consultant Tel: +44 (0)207 213 3372 E-mail: adrian.davis@securityforum.org Web: Social: www.linkedin.com/in/adriandaviscitp 15