Www.cloud-security.org.uk Copyright © 2012 Cloud Security Alliance – UK & Ireland Liberty Hall, Dublin March 30th 2012.

Slides:



Advertisements
Similar presentations
From Anywhere and Anytime to Here and Now … Imagining the future of technology in culturally relevant contexts Ashwini Asokan : : Design Researcher : :
Advertisements

Cloud Security Alliance Research & Roadmap June 2012
Canada-EU Future Internet Workshop Waterloo, Canada March 24th, 2011 Ignacio M. Llorente DSA-Research.org Distributed Systems Architecture Research Group.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Cloud Security Challenges Today and Tomorrow NameTitle February 2011.
Copyright © 2011 Cloud Security Alliance Keynote.
Copyright © 2012 Cloud Security Alliance Conference Announcements.
Digital public services and innovation
Inclusive Publishing – Reading for Everyone Neil Jarvis 24 November 2014.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Achieving Assurance and Compliance in the Cloud Digital Government Cyber Security Conference Cheryl Wilner, CEO Bethesda Advanced Solutions Ronald Regan.
Corporate Social Responsibility
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Building trust in the Cloud: the CSA perspective Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance © Cloud Security.
Achieving Security Assurance and Compliance in the Cloud Jim Reavis Executive Director.
Copyright © 2011 Cloud Security Alliance.
Internal auditing for credit unions Nuala Comerford, Chair IIA Irish Region Committee Pamela McDonald Council Member IIA Credit Union Summer School Thursday,
Economic Forces in American History Fractional Reserve Banking Simulation.
Coming together to secure an equal future for people with disabilities Martin Naughton | Director of Áiseanna Tacaíochta.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ACSM MEETING A Centre for Resource Mobilization by Louise Baker, Stop TB Secretariat.
National Secondary School Computer Fund (NSSCF)
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Cloud Security Alliance Research & Roadmap Jim Reavis Executive Director August 2011.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Technology to Improve Instruction Partnerships to Fulfill a Vision for Technology in North Carolina’s Schools.
Cloud Security Alliance Research & Roadmap
Cloud Security Alliance Overview and Organizational Plans Jim Reavis, Co-founder & Executive Director August 5, 2009.
Reaching the Cloud Era in the European Union EU28 Cloud Security Conference Riga, 16 June 2015 Pearse
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
THE ROAD TO OPEN ACCESS A guide to the implementation of the Berlin Declaration Frederick J. Friend OSI Open Access Advocate JISC Consultant Honorary Director.
Copyright © 2011 Cloud Security Alliance Building Trust into the Next Generation of Information Technology.
Current challenges for health systems Increasing elderly population –Relative decrease in resources (fewer taxpayers), chronic patients Financial sustainability.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
So You Want to Know All About the Changes to ISO 9001 …
© 2014 IBM Corporation Mapping APEC CBPRs onto EU BCRs Anick Fortin-Cousens Privacy Officer, Canada, Latin America, Middle East & Africa Program Director,
Copyright © 2011 Cloud Security Alliance Cloud Security Alliance Research & Roadmap Jim Reavis, Executive Director, CSA.
07/02/2013. Points to consider The Strategic importance of Managing HR Gaining and sustaining a competitive advantage A Framework for managing HR The.
© Cloud Security Alliance, 2015 Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems.
Corporate Social Responsibility LECTURE 25: Corporate Social Responsibility MGT
Building & Maintaining Bridges “We think the most important qualities for social service workers are anti-discriminatory values, respectful attitudes and.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
Chapter 4 Developing and Sustaining a Knowledge Culture
Transformational technology and privacy How emerging technology contributes to the Data Diaspora and challenges privacy management August 2008.
Datalayer Notebook Allows Data Scientists to Play with Big Data, Build Innovative Models, and Share Results Easily on Microsoft Azure MICROSOFT AZURE ISV.
Presentation to: RIIA and the IIR’s 3rd. Annual Managing Retirement Income Conference Steve Mitchell, Director - Merrill Lynch Retirement Group February.
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
Cloud security
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Understanding the Potential of IT
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Developed by Cool Pictures and MultiMedia Presentations Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Developed.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Protecting our Future Ideas and guidance for ensuring a sustainable future for credit unions.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Update from the Faster Payments Task Force
ASSET - Automotive Software cyber SEcuriTy
Dr. Konstantinos Komaitis
Making Information Security Manageable with GRC
Transformational technology and privacy
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Automating Security in the Cloud
Community of Users.
Presentation transcript:

Copyright © 2012 Cloud Security Alliance – UK & Ireland Liberty Hall, Dublin March 30th 2012

Copyright © 2012 Cloud Security Alliance – UK & Ireland Brian Honan CSA - UK & Ireland Chapter

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Global, not-for-profit organization Over 23,000 individual members, 100 corporate members, 50 chapters Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Enable innovation Advocacy of prudent public policy “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Over 2,000 individual members Focused on Information Risk Management “To provide the guidance and tools required to allow business and home users of cloud services to manage risks to their information in order to embrace the opportunities afforded by the interconnected information society of the 21st century.”

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland …from the Knights Templar to Jeremy Clarkson, onto James May and beyond!

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland “the state of being free from danger or threat”

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland The original ‘trust authority’ Conveyed money around the middle east during the crusades Founders of modern banking systems… …which are based on trust

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Money isn’t real You trust the bank to pay you – based on a promise!

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland The bank teller model worked for centuries Until the 1990’s When trust moved…

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Web 2.0 creates new challenges… …for which we create new controls Which surely enhance security? Enter our second guest…

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Published bank details after HMRC breach in 2008 Direct debit setup to make charitable contribution “The bank cannot find out who did this because of the Data Protection Act and they cannot stop it from happening again” Jeremy Clarkson

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland That the boundaries have moved Security no longer exists as we understand it That technology can’t be controlled using traditional thinking That we need to evolve our thinking Time for our third guest…

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Understanding your assets allows tangible benefit Defined frameworks are required Requires constant re- evaluation to achieve goals

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland You’re here, now! The line between consumerisation and business is dissolving rapidly Technology and adoption evolves faster than ever before Risks are not to be feared, but managed Compliance will not help you!

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Ask questions about your business Determine the information assets being used Don’t assume control context Determine the information risks you need managing Determine responsibility for operating controls Ensure metrics measure desired control performance

Copyright © 2012 Cloud Security Alliance – UK & Ireland Copyright © 2012 Cloud Security Alliance – UK & Ireland Have your say and be heard in the Cloud discussion Joining us is free Join at me on security.org.uk Follow us on