Today’s cloud and preparing for tomorrow’s

Slides:



Advertisements
Similar presentations
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
Advertisements

Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Cybersecurity nexus (CSX)
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
NDIA Software Committee Paul R. Croll, CSC Michael H. McLendon, OSD/DDR&E/SE NDIA Systems Engineering Division Meeting August 18, 2010.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
University of Southern California Center for Systems and Software Engineering Individual Research Presentation CS 577b Software Engineering II.
CSCE 727 Industry Certifications in IA. Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by (ISC) 2® Prepared by Robert Ayoub, CISSP,
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Darren Thayre, AWS Professional Services Succeeding with AWS by delivering high.
Information Systems in Organizations 1.1 Introduction to MIS
Upturn Consulting 27, March 2017.
Planning the Digital Transformation Readiness Check for SAP S/4HANA
Discover your career at Accenture
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
Michael Wright • Chief Security Officer • Tech Lock
Information Systems in Organizations 1.1 Introduction to MIS
What is Software Test Automation?
A Program of Training for CMMI®-based Process Improvement
How To Apply Quality Management
Management Information Systems
Dimitra Liveri | NIS Expert CSA CEE Summit 2017|Ljubljana - 9 March
Digital Transformation Services
Cybersecurity classification and protection of information
Information Systems in Organizations 1.1 Introduction to MIS
Introduction What's my experience? Why am I talking to you?
Preventing Medical Device Recalls
SE and SSE Trade-Off Analyses
ISC2 Cleveland Chapter Meeting
Information Systems in Organizations 1.1 Introduction to MIS
Webinar Optimize Your Business Applications Strategy
Dr Paul Lewis Chief Technology Officer
Abstract Selected experiences
Information Systems in Organizations 1.1 Introduction to MIS
Information Systems in Organizations 1.1 Introduction to MIS
Information Systems in Organizations 1.1 Introduction to MIS
Information Systems in Organizations 1.1 Introduction to MIS
A Must to Know - Testing IoT
NAE Global Challenge Scholars Program Annual Meeting on October 30.
Information Systems in Organizations 1.1 Introduction to MIS
Information Systems in Organizations 1.1 Introduction to MIS
Alignment of COBIT to Botswana IT Audit Methodology
The Internet of Things (IoT) and Analytics
Model Contract for Health
Colorado University October 3, 2007
Information Systems in Organizations 1.1 Introduction to MIS
Introduction What's my experience? Why am I talking to you?
2017 Administration and Finance Conference
Artificial Intelligence in Manufacturing
Information Systems in Organizations 1.1 Introduction to MIS
Make it easy to be secure E.g. derived credentials test lab
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Change Management and COBIT®. ISACA London Chapter Presentation
The Most In-Demand Skills for Cloud Computing.
Mjunction 2ND EDITION OF GLOBAL PROCUREMENT CONFERENCE 2019
Audit Evidence Bob Dohrer, Technology Working Group Chair and Audit Evidence Working Group Chair IAASB CAG Meeting, New York Agenda Item D March 5, 2019.
Enterprise Architecture at Penn State
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
TECHNOLOGY, ENGINEERING AND DATA CONTINUING AND PROFESSIONAL EDUCATION
For Community and TSC Discussion Bin Hu
Information Systems in Organizations 1.1 Introduction to MIS
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Digital-readiness: IS YOUR ORGANIZATION READY TO TRANSFORM?
IT Management Services Infrastructure Services
KEY INITIATIVE Internal Control and Technical Accounting
Microsoft Training & Certifications
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Digital Transformation & Compile to Combat in 24 Hours (C2C24)
50% Introducing the Cybersecurity Assessment
Presentation transcript:

Today’s cloud and preparing for tomorrow’s G6 Wednesday March 21st 2018, 10:30 AM - 11:45 AM Today’s cloud and preparing for tomorrow’s March 21st 2018 10:30 AM - 11:45 AM Randall Brooks Engineering Fellow, Raytheon @randallsbrooks Jon-Michael Brook John Yeoh

Overview The focus of this discussion is on three main topic areas surrounding the cloud road map: Development, Compliance, and Future Preparation

Development Creating a secure application with software assurance for the Cloud: What does the group think are the applicable risks to applications moving to the Cloud? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Development Creating a secure application with software assurance for the Cloud What does the group think are the applicable risks to applications moving to the Cloud? What are the key resources for developing Cloud applications? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Development Creating a secure application with software assurance for the Cloud What does the group think are the applicable risks to applications moving to the Cloud? What are the key resources for developing Cloud applications? What are the key tools used for secure development? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Development Creating a secure application with software assurance for the Cloud What does the group think are the applicable risks to applications moving to the Cloud? What are the key resources for developing Cloud applications? What are the key tools used for secure development? How does the growing role of DevSecOps affect your enterprise? Any examples to share? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Compliance Compliance in the Cloud - Measurements, reporting and automation How does your organization determine the applicable and appropriate measurements? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Compliance Compliance in the Cloud - Measurements, reporting and automation How does your organization determine the applicable and appropriate measurements? How is compliance reported to executives? What is their reaction? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Compliance Compliance in the Cloud - Measurements, reporting and automation How does your organization determine the applicable and appropriate measurements? How is compliance reported to executives? What is their reaction? Does your organization support automation for continuous checking and real-time notification? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Future Preparation Preparing an organization for Tomorrow's Cloud Move forward, how does are organization manage the growing supply chain of third party providers and solutions? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Future Preparation Preparing an organization for Tomorrow's Cloud Move forward, how does are organization manage the growing supply chain of third party providers and solutions? In 2018, how do you see your organization incorporating new technologies such as IoT, DevOps, AI, Immutable, etc? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Future Preparation Preparing an organization for Tomorrow's Cloud Move forward, how does are organization manage the growing supply chain of third party providers and solutions? In 2018, how do you see your organization incorporating new technologies such as IoT, DevOps, AI, Immutable, etc? How does your organization intend to fill the Cybersecurity skills gaps needed to implement these (e.g. training, automation, etc.)? The expected key discussion points should last 10 minutes each in an open dialog to enable others to learn from successes and failures.

Engineering Fellow, Raytheon Randall Brooks Engineering Fellow, Raytheon @randallsbrooks Jon-Michael Brook John Yeoh

Bio Mr. Randall Brooks is an Engineering Fellow for Raytheon Company (NYSE: RTN), representing the company within the U.S. International Committee for Information Technology Standards Cyber Security 1 (CS1). Brooks has more than 20 years of experience in Cybersecurity with a recognized expertise in Software Assurance (SwA) and secure development life cycles (SDLC). In addition to holding eight patents, Mr. Brooks is a CCSK, CISSP, CSSLP, ISSEP, ISSAP, and ISSMP. Brooks graduated from Purdue University with a Bachelors of Science from the School of Computer Science.