Cloud Computing--Efficiency and Security



Similar documents
Mark Bluhm CTO Shared Services, TR Professional Mick Atton Chief Architect, TR Legal 4 March 2011

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Security Issues in Cloud Computing

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Deploying a Geospatial Cloud

NCTA Cloud Architecture

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

journey to a hybrid cloud

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Computing Technology

Big Data & Its Bigger Possibilities In The Cloud

Kent State University s Cloud Strategy

Cloud Computing; What is it, How long has it been here, and Where is it going?

OVERVIEW Cloud Deployment Services

CLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15

CHAPTER 8 CLOUD COMPUTING

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

<Insert Picture Here> Enterprise Cloud Computing: What, Why and How

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Clinical Trials in the Cloud: A New Paradigm?

Cloud models and compliance requirements which is right for you?

How To Understand Cloud Computing

Cloud Based Solutions for Media and Entertainment

Leveraging the Cloud. September 22, Digital Government Institute Cloud-Enabled Government Conference Washington, DC

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Courses Description


OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Courses Description

Strategic approach to cloud computing deployment

Managing Cloud Computing Risk

EXIN Cloud Computing Foundation

WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod

Security Inspection Inc. Solutions to secure your network

John Essner, CISO Office of Information Technology State of New Jersey

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

INTRODUCING CLOUD POWER

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud Services Overview

Cloud Computing: Background, Risks and Audit Recommendations

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Fundamental Concepts and Models

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

A.Prof. Dr. Markus Hagenbuchner CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1

Making Leaders Successful Every Day

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Introduction to Cloud Services

Cloud Computing for SCADA

IS PRIVATE CLOUD A UNICORN?

A Gentle Introduction to Cloud Computing

Orchestrating the New Paradigm Cloud Assurance

CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.

A Hotel in the Cloud. Bruno Albietz

Cloud Computing An Elephant In The Dark

Trends in Business Intelligence

Building Private & Hybrid Cloud Solutions

Cloud Computing/ Semantic Web Initiatives & Tutorial

10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Cloud Security Who do you trust?

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

HARNESSING THE POWER OF THE CLOUD

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud Computing Security Issues

Software Systems Architecture in a World of Cloud Computing. Christine Miyachi SDM Entering Class 2000

DIGITAL PRESERVATION AND CONTENT MANAGEMENT IN THE CLOUD AGE: ISSUES AND CHALLENGES

<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012

Oracle Applications and Cloud Computing - Future Direction

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

Transcription:

Cloud Computing--Efficiency and Security Mick Atton, VP & Chief Architect Thomson Reuters--Legal July 22, 2013

Thomson Reuters Thomson Reuters is the leading source of intelligent information for the world's businesses and professionals Headquarters Thomson Reuters 3 Times Square New York, NY 2012 Revenues $US 12.4Billion Americas: 58% EMEA: 30% Asia: 12% Footprint Approximately 60,000 employees in more than 100 countries 2

What is Cloud Computing? "A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (i.e., hardware and software) that can be rapidly provisioned and released with minimal management effort or service provider interaction" from NIST Special Publication 800-145 The NIST Definition of Cloud Computing (Sept. 2011) 3

How is Cloud Computing used? Deployment options PUBLIC (Available to everyone) Cost efficient & scalable, but information is more vulnerable to security breaches PRIVATE (Available to a single org.) More secure and configurable, but higher start-up & on-going costs HYBRID (Public and Private) Using Public cloud for interaction with citizens, and Private Cloud for storing confidential data COMMUNITY (Shared) Computing resources are shared between orgs. with common needs Service options SaaS (software as a service) Shared use of standard software such as Concourse, Case Logistix, Case Notebook, Box, Office365 PaaS (platform as a service) Shared use of technology platforms like Amazon Web Services, Windows Azure IaaS (infrastructure as a service) Shared use of hardware such as Rack Space, EMC Atmos Storage, Skydrive 4

Where could Cloud Computing be applied? Top services or applications moving to the Cloud (Feb. 14, 2013) 40% FEDERAL STATE AND LOCAL 0% 39% 37% 33% Conferencing Messaging Office and and Productivity Collaboration Suites 19% 17% 15% Storage Conferencing and Collaboration Messaging / Business Process Apps / Compute Power Internal Assessment Conduct internal review of IT asset portfolio--age/sophistication/interdependence, organizational readiness and management processes before forming a strategy Make realistic assessment of usability of initial cloud hosted services concentrating on low complexity to implement especially with respect to legacy integration Identify & engage a trusted technology partner in legal & professional workflow rather than a purely commercial cloud supplier 5

What issues are being faced in Cloud Computing? Ensuring security of systems and data 68% Compatibility with legacy systems, processes 51% Lack of expertise/experience in this area Standards are still evolving 31% 29% Lack of government framework 24% Cloud products/services still unproven Cultural resistance within agency or IT department Establishing a compelling business case Lack of acquisition vehicle for cloud services Other 17% 15% 10% 4% 4% 0% 70% Note: Three responses allowed Base: 83 respondents in September 2012 and 108 in February 2011 using or assessing cloud services Data: Information Week Federal Government Cloud Computing Survey of federal government technology professionals 6

Cloud Computing--balancing risk & benefit Benefits Lower operational costs due to resource pooling and metered consumption On-demand self-service & rapid expansion/contraction of capacity Sophisticated, secure infrastructure approach offered by commercial providers (look for NIST 800.53, ISO 27001, SOC2 attestation) Reliable disaster backup & recovery Consistent workflow integration Risks Advanced persistent security threat Ability to manage complex environments across the cloud Loss-of-control of IT infrastructure Incompatibility or inability to integrate with legacy products Nascent government & professional standards Cultural and technical resistance from IT department 7

Cloud Computing industry example-thomson Reuters Concourse A SECURE, CLOUD-HOSTED SUITE OF PRODUCTS TO HELP GOVERNMENT LAW DEPARTMENTS BE MORE EFFICIENT Manage matters with features such as integrated legal research and Outlook synchronization Organize, share & repurpose documents Collaborate with individuals inside and outside the department Apply new workflow tools across entire matter collection CONCOURSE DATA IS HOUSED AT THOMSON REUTERS' WORLD-CLASS DATACENTERS OPERATED IN EAGAN, MINNESOTA Concourse's AES 256-bit encryption is at the highest industry & defense standard ensuring that confidential documents are protected against unauthorized access The infrastructure and operating policies protecting your sensitive data follow the same strict standards and audited compliance that has served government, legal and corporate organizations for many years 8

Thomson Reuters a trusted partner in legal technology mick.atton@thomsonreuters.com