Www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Conference Announcements.

Slides:



Advertisements
Similar presentations
Cloud Security Alliance Research & Roadmap June 2012
Advertisements

Strategy to Increase ASME’s Global Impact Michael Michaud, MD Global Alliances Orlando, FL November 16, 2009.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Copyright © 2013 Cloud Security Alliance CSA Speed Talk: “STAR &CCSK – An Update on Provider and User Certification”
Training solution for Mobile Workforce. People expect to consume content when and where they want to. Training for Mobile Workforce.
Cloud Security Challenges Today and Tomorrow NameTitle February 2011.
Copyright © 2011 Cloud Security Alliance Keynote.
IEEE Computer Society Name Title, IEEE Computer Society The community for technology leaders.
SECURECLOUD2012 MAY QUantifiable End-to-end SecuriTy for Cloud Trustworthiness TU Darmstadt, Germany DEEDS Group Dr. Jesus Luna G.
Achieving Assurance and Compliance in the Cloud Digital Government Cyber Security Conference Cheryl Wilner, CEO Bethesda Advanced Solutions Ronald Regan.
Copyright © 2012 Cloud Security Alliance – UK & Ireland Liberty Hall, Dublin March 30th 2012.
Core Values  Progression – progress breeds success - Promoting learning and career progression for individuals - Facilitating progression of the workforce.
ENISA and Cloud Security
John Howie Big Data: Answering Questions and Solving Society’s Problems, but at What Cost?
Emerging Global Trends in Project Management Mal Smith PMP Project Management Institute, Canberra Chapter.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Cloud Security Challenges Today and Tomorrow Aloysius Cheang Asia Pacific Strategy Advisor April 2011.
Science at the FDA: Update for the Science Board Jesse L. Goodman, MD, MPH Chief Scientist and Deputy Commissioner for Science and Public Health November.
Cloud Security Alliance Research & Roadmap Jim Reavis Executive Director August 2011.
©SHRM D College Relations Webinar Tara Fournier, PHR and Scott D. Ferrin, SPHR February 6, 2014 Bhavna Dave, PHR Director of Talent SHRM member.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Cloud Security Alliance Research & Roadmap
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
Cloud Security Alliance Overview and Organizational Plans Jim Reavis, Co-founder & Executive Director August 5, 2009.
THE LATEST TOP 10 STRATEGIC TECHNOLOGY TRENDS Chris Shayan, Software Solution Architect, Pyramid Consulting According to Gartner Report.
Copyright © 2011 Cloud Security Alliance Building Trust into the Next Generation of Information Technology.
AGORA The Portal for Parliamentary Development International Parliamentary Conference on Gender and Politics Houses.
1 Cloud Computing and the Australian Government Glenn Archer First Assistant Secretary Australian Government Information Management Office May 2011.
Copyright © 2011 Cloud Security Alliance Cloud Security Alliance Research & Roadmap Jim Reavis, Executive Director, CSA.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
UNFCCC secretariat - Mitigation, Data and Analysis Programme XXXXX, YYYY Engaging with and supporting the registry users Asia pacific and Eastern Europe.
After receiving countless accolades for its free HAR.com iPhone app, HAR has just launched an app for users of Android-powered mobile devices. As with.
WHAT OUR CUSTOMERS ARE SAYING “After thorough market research and a review process, Qorus Breeze Proposals stood out from the competitors because of its.
Technology for Social Justice Enhancing community sector service delivery Stefanie Kechayas – Senior Consultant 17 November 2015 SharePoint Connect and.
I N N O V A T E. M O T I V A T E. D O M I N A T E Roles & Responsibilities 1.Responsible for the achievement of product sales targets in Asia Pacific,
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
Cloud security
1  Ex Libris Ltd., Internal and Confidential Ex Libris Alma IGeLU 2012 | Zurich | Sep 2012  Ex Libris Ltd., Internal and Confidential Bar.
South Region Conference & AGM 13 th June 2003 “BIFM Research & Knowledge” Peter Cordy, Chairman of the BIFM Research, Information & Knowledge Committee.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Catalyst Dynamic Pricing Solutions for Data Center Digital Services.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
Copyright © 2011 Cloud Security Alliance UK Chapter Paul Davies.
Cyber Security and Open Source Community Call Seong K. Mun, PhD President and CEO, OSEHRA Arlington, Virginia Webex:
Meet and Greet with Mr. Nara Lokesh May 8, AP NRI Entrepreneurship Foundation Moderator: Mr. Jaya Prasad (JP) Vejendla Kick Off - Mr. Jayaram Komati.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
Vodafone Business Cloud
Global Network Analytics Market WEBSITE Single User License: US$ 2500 No of Pages: 60 Corporate User License: US$ 4000.
The SSMIC’s Role as the Algoma Data Analysis Coordinator (DAC) Superior Children’s Centre – PD Day September 25 th, 2015.
Capacity Building in: GEO Strategic Plan 2016 – 2025 and Work Programme 2016 Andiswa Mlisa GEO Secretariat Workshop on Capacity Building and Developing.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
CREATING THE TRUSTED SUPPLY CHAIN
Partner Toolbox Cloud Infrastructure & Management
Secure Hyperconnectivity with TeamViewer and Windows technologies
Dimitra Liveri | NIS Expert CSA CEE Summit 2017|Ljubljana - 9 March
Digital Workplace.
Innovative Solutions from Internet2
Published on – 01 November, 2016 | Number of pages : N/A
Partner Toolbox Cloud Application Development
Tell us about your Wins! Microsoft 365 Collaboration Case Study Opportunities Promote partner success for public and internal use.
Introduction to TransCelerate
11/28/2018 3:34 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
1/2/2019 4:34 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
European Innovation Partnership on Water
COMPANY PROFILE: REELWAY
ISACA IN 2019 Robin Lyons WHAT’S NEXT, NOW Technical Research Manager
Disk Based Data Fabric Market Research Report By Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED BY Market.
Presentation transcript:

Copyright © 2012 Cloud Security Alliance Conference Announcements

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance About the CSA Global, not-for-profit, 501(c)6 organization Over 31,000 individual members, 120 corporate members, 60 chapters Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research Research Education Certification CCSK (individual) CSA STAR (provider) “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance CSA Mobile CSA Innovation Initiative Asia Pacific Expansion Top Threats Cloud Controls Matrix Service Level Agreements SecureCloud 2012 CSA Congress 2012

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance Mobile – the Portal to the Cloud BYOD, New OSes, application stores, mobile clouds… Our Initiative Security Guidance for Critical Areas of Focus in Mobile Computing Secure application stores Solutions for personal and business use of a common mobile device Cloud-based security mgt of mobile devices Security frameworks and architecture Scalable authentication and secure mobile app development Organizing meeting Wed at Parc 55 Hotel at 10:30am

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance Accelerate Delivery of Trusted Cloud Ecosystem Collaboration with entrepreneurs, R&D teams, customers and investors “Crowdsource” innovative solutions in the same way we create rapid best practices research Identify key structural issues and technology gaps Create market incentives to drive secure innovation Creating task force to manage project Organizing meeting Wedneday at Parc 55 Hotel at 10am

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance Trusted Cloud Computing around the Globe Q selection of APAC Headquarters location Engaging key regional stakeholders Customizing/developing relevant best practices and standards for the APAC market Center of excellence for research and training Establishment of global standards secretariat within APAC Serving as a regional hub and operations magnet for established and emerging growth corporate members Trend Micro founding sponsor

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance Identify Threats unique to, or magnified by Cloud First Top Threats report released RSA 2010 V.2 of the Top Threats Report will be released at the end of Q If you are interested in getting involved with the Top Threats Working Group and downloading V.1 of the Top Threats Report visit: Click on the "Get Involved" tab and submit your information for the latest V.2 updates and notification of current volunteer opportunities For additional information join our Top Threats Linked In Group

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance Call for Working Group Co-chairs Key research project Controls framework heart of CSA GRC Stack Thank you to previous co-chairs Becky Swain, Phil Agcaoili & Marlin Pohlman Becky Swain continuing on, to help transition Interested? Contact Becky at:

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance CSA SLA Survey CSA SLA Research Group SME Council meeting Monday afternoon 2pm to 4pm

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance SLA Survey – Obtain input from Cloud Providers and Cloud Users on Uptime definitions and methods Access:

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance Effective SLAs and their Management is a key factor in the successful adoption of the Cloud A new SLA Research Group is being formed and a charter is currently being drafted by the SME Council SME council is calling for volunteers to assist in the SLA Research Group Contact Said Tabet at

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance SecureCloud 2012 May 9-10, 2012, Frankfurt Am Main, Germany Partnership with ENISA, CASED, ISACA, Fraunhoefer Institute 100 euro “early bird” discount through March 15 Cloud Security Alliance Congress 2012 November 7-8, 2012, Orlando Florida Call for papers and sponsors coming soon

Copyright © 2012 Cloud Security Alliance Copyright © 2012 Cloud Security Alliance