Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.

Slides:



Advertisements
Similar presentations
Information Security Update CTC 18 March 2015 Julianne Tolson.
Advertisements

Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Small Business Server is Dead! Long Live Zynstra Cloud Managed Appliances June 2014 Andrew Birch Channel Mgr Zynstra.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network security Product Group 2 McAfee Network Security Platform.
Survey Report IPEXPO 2015 Top priorities and Technology Trends.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Head in the Clouds, feet on the ground David Massey Chief Technology Officer.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Complete Cloud Security Anyone, anywhere, any app, any device.
SDN & NFV Driving Additional Value into Managed Services.
Digital Asset Management & Storage Program Program Summary
Michael Wright • Chief Security Officer • Tech Lock
PrinterOn Mobile Printing Platform
Office 365 is your modern Office Microsoft Office365 12/26/2017
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Deployment Planning Services
Avenues International Inc.
Deployment Planning Services
Cloud Computing Q&A Presented by:
Enterprise Mobility Suite Technical and Business Briefing
Office 365 is cloud-based productivity, hosted by Microsoft.
How to Define a Successful Mobility Strategy
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Journey to Microsoft Secure Cloud
Cloud-First, Modern Windows Management and Security
Microsoft Azure: The only consistent Hybrid Cloud
6/17/2018 5:54 AM OSP322 Getting the best of both worlds, making the most of SharePoint hybrid search solutions Shyam Narayan Microsoft © 2013 Microsoft.
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Manage mobile productivity with Enterprise Mobility + Security (EMS)
ModernBiz Windows Server 2012 R2 Grow your business by helping customers modernize theirs Millions of customers, high-margin opportunities With millions.
Microsoft SharePoint Server 2016
Microsoft Ignite /31/ :08 AM
CompareDocs cloud Makes it Immediately Clear What has Changed Between Document Versions, on any Windows 10-Compatible PC or Device WINDOWS APP BUILDER.
Threat Management Gateway
Information Technology (IT) Department
Motion Capture Company Relies on Windows App Builder, Azure Cloud, and Windows SDK to Securely Capture and Host Health Care Data WINDOWS APP BUILDER PROFILE:
Windows 10 Subscription Activation
Office 2007 End of Support.
Speaker’s Name, SAP Month 00, 2017
Best Practices for Securing Hybrid Clouds
How to prepare for the End of License of Windows Server 2012/R2
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Splashtop Classroom Assist Gives Teachers the Power to Annotate and Share Their Windows 10 Screens with Any Student, Anytime, Anywhere WINDOWS APP BUILDER.
Sales Readiness Series
Virtualization & Security real solutions
Introduction to Soonr by ….
Cloud Storage Services
Head in the Clouds: Real-world experiences and recommendations for moving technology infrastructure to the cloud.
Microsoft Virtual Academy
Access and Information Protection Product Overview October 2013
Sherpany’s Boardroom App for Windows: It’s a Perfect Tool for Managing Top-Level Meetings, Optimized for Use on Microsoft Surface Devices WINDOWS APP BUILDER.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
NSX Data Center for Security
<Service provider solution name>
Enabling the hybrid cloud with remote access appliances
2/25/2019.
System Center Marketing
Cloud Computing LegalRun Solutions Why It’s Right for You!
Technology Convergence
Anuj Dube Jimmy Lambert Michael McClendon
Microsoft Data Insights Summit
Office 365 Performance Management
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Plan and design the solution
Microsoft Virtual Academy
Goddard Chamber September 12th, 2019 Hosts: John Ash & Jon Grover
Presentation transcript:

Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director

First things first Thanks to Dave and Ian

A little about Bytes SP and myself Security Partnerships acquired by Bytes in 2011 I started working for Security Partnerships in January 2000 as their first Technical Resource As a Consultant I have designed and delivered multi-million pound solutions for household names As a Manager I developed the technical team and professional services within Security Partnerships As one of two Directors of Bytes Security Partnerships I have helped to grow the business by a further 50% in 2 years

I am very proud of our business and what and how it does things

So now you know what the cloud is how does it apply to Information Security?

“Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take” -Wikipedia : September 2013

One more reason why cloud is a good idea…

Why cloud? For every server room that looks like this…

Why cloud? There is one that looks like this…

Information Security in the cloud is just as important as “on-premise” Different challenges Same key requirements You can’t just say “it’s the provider’s problem”

Which vendors cloud technology?

So what does Cloud mean to us?

What are we trying to achieve? This?

What are we trying to achieve? This?

What are we trying to achieve? This?

What are we trying to achieve The reality is its all of them…

The Cloud in the modern workplace Dave has talked about how people are working Ian has talked about all the different things that The Cloud can be

IT Security Evolved

The first phase of change From this Traditional Firewall Office Based Users

All solutions focussed on protecting users from the Internet

The first phase of change To this Next Gen Firewall Users anywhere on any device

Solutions focussed on protecting users from the Internet and providing access to internal systems from different devices in different locations

Where are we headed? And on to this…

The key pillars of Cloud Security Deterrent Controls - These controls are set in place to prevent any purposeful attack on a cloud system. Much like a warning sign on a fence or a property, these controls do not reduce the actual vulnerability of a system. Preventative Controls - These controls upgrade the strength of the system by managing the vulnerabilities. The preventative control will safeguard vulnerabilities of the system. If an attack were to occur, the preventative controls are in place to cover the attack and reduce the damage and violation to the system's security. Corrective Controls - Corrective controls are used to reduce the effect of an attack. Unlike the preventative controls, the corrective controls take action as an attack is occurring. Detective Controls - Detective controls are used to detect any attacks that may be occurring to the system. In the event of an attack, the detective control will signal the preventative or corrective controls to address the issue.

Cloud Security – The same but different The challenges are the same – Secure storage of data that trusted people need to be able to access – Provision of applications that people can work with effectively – Proof that the systems are secure and managed in the right way

Security challenges Who is accessing your data? What are they accessing? When are the accessing it?

Other challenges Cloud is not 100% guaranteed to be available? Your infrastructure as backup for the cloud? How do you deploy a “hybrid” cloud environment? How do you make it appear as one?

Other challenges How do you control devices that are out of the office? Not just Phones and Tablets? How do you make your data available anywhere from any device seamlessly

How can our Vendors help you? Best of breed firewall technology Common rule base on:- – Premises based appliances – VMWare based virtual appliances – Cloud based virtual appliances – Protect from DOS attacks on-premise Consolidated policies, logging and reporting for all deployments

How can our Vendors help you? Best of breed application delivery and security for both Cloud and Premises based deployments

How can our Vendors help you? Best of breed mobile device management and mobile application deployment Purpose built to enable the mobile enterprise Not just about Tablets and Phones

How can our Vendors help you? Providing secure, available cloud storage for s and files Giving users a valid corporate alternative to Dropbox, Google Drive etc

Summary The IT Security Challenges don’t go away, they just move IT Security has become a business enabler rather than a business preventer It is moving into the cloud space hand in hand with the functionality that is available