Page 1 Recording of this session via any media type is strictly prohibited. Page 1 The Cloud: A Necessary Risk for Business.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Cloud Computing - clearing the fog Rob Gear 8 th December 2009.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 EMP202: The Risk Manager’s Role in Mitigating Employment Practices Liability.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Page 1 Recording of this session via any media type is strictly prohibited. Edward M. Joyce Partner Jones Day Invasion of Privacy, Hacking & IP Claims:
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Security Controls – What Works
One Firm. One Team. Countless Opportunities. Baruch College Come out to network and learn more about a career with KPMG that is far beyond coding !
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Forging a Risk Management Career Path: How Industry Leaders Are Developed.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Dealing with the Rising Tide of Systemic Cyber Risk April 29, 2014.
“Mitigating Offshoring Risks in a Global Business Environment“
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 We Have a Plant There? u Managing International Property Insurance and.
THE CLOUD Risks and Benefits from the Business, Legal and Technology Perspective September 11, 2013 KEVIN M. LEVY, ESQ. GUNSTER YOAKLEY.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Megatrends Part 3: Natural Catastrophes and Climate Change - Stress.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Cloud computing is a technological advancement that can be advantageous to credit unions because of potential benefits such as: cost reduction, flexibility,
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Claims Leakage Risk How Technology Can Help Plug the Gaps.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Megatrends Part 4 – The Shift in Economic Power – M&A Implications for.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Getting Vendors in Line: Developing a Culture of Compliance and Effective.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 The Carrot or the Stick? The Carrot or the Stick? Vendor Management.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Law Firm Data Security: What In-house Counsel Need to Know
An Information Security Management System
Cloud Computing Constituent Group Meeting Room 401 – 2:40 – 3:30pm
Responding to Intrusions
Introduction to the Federal Defense Acquisition Regulation
Data Privacy: Essentials for Payroll
General Data Protection Regulation
We want to hear from you! chime16.org/evals
Risk Management At international schools
Vinny Sakore Vinny Sakore is the Chief Technology Officer for NetDiligence®, a Cyber Risk Management company. Former HIPAA Security Officer for Verizon.
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Vinny Sakore Vinny Sakore is the Chief Technology Officer for NetDiligence®, a Cyber Risk Management company. Former HIPAA Security Officer for Verizon.
DSC Contract Management Committee Meeting
Presentation transcript:

Page 1 Recording of this session via any media type is strictly prohibited. Page 1 The Cloud: A Necessary Risk for Business

Page 2 Recording of this session via any media type is strictly prohibited. Toby Merrill ACE Group, Division SVP ACE Global Cyber Risk Practice Anthony Caratzas Broadridge Financial Solutions Managing Director, Risk Management Vinny Sakore ICSA Labs, a division of Verizon Program Manager, Cloud Services David Navetta, Esq. CIPP Information Law Group, Partner

Page 3 Recording of this session via any media type is strictly prohibited. What to Expect What is Cloud Computing and Should Risk Managers Care? How Can Cloud Computing Benefit Business? What are the Risks of Migrating to the Cloud? Making the Cloud Work for Your Company

Page 4 Recording of this session via any media type is strictly prohibited. CFO RoundTable News, CFOs and CIOs Can Keep Up With Business’ Growth With Cloud Computing,

Page 5 Recording of this session via any media type is strictly prohibited. IRDC 3 DMW, Cloud Computing,

Page 6 Recording of this session via any media type is strictly prohibited. Mother Nature Network, Is cloud computing secure?, Photo: Shutterstock,

Page 7 Recording of this session via any media type is strictly prohibited. What is Cloud Computing? Visual Model of NIST Working Definition of the Cloud

Page 8 Recording of this session via any media type is strictly prohibited. What is Cloud Computing?

Page 9 Recording of this session via any media type is strictly prohibited. Should Risk Managers Care? Cisco UCS and EMC® VNX™ 5300 with Microsoft Private Cloud Fast Track 2.0,

Page 10 Recording of this session via any media type is strictly prohibited. How Can Cloud Computing Benefit Business? Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 Reduced Infrastructure Costs Capacity, Scalability and Speed Security and Backup Availability, Geography and Mobility Regulatory Compliance Other Benefits computing.jpg.html?&_suid=

Page 11 Recording of this session via any media type is strictly prohibited. What are some of the Risks of Migrating to the Cloud? Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 Contracts Loss of Control Aggregation Risk Costs Data Security

Page 12 Recording of this session via any media type is strictly prohibited. What are Risks of Migrating to the Cloud? – In More Detail Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 Cloud Relationships Geography Privacy System and Data Availability Data Retention Incident response Electronic Discovery / Electronic Evidence

Page 13 Recording of this session via any media type is strictly prohibited. Making Cloud Computing Work for Your Company Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 Privacy by Design and Culture Shared Security and Related Responsibilities Control and Liability Due Diligence and Vendor Management Programs

Page 14 Recording of this session via any media type is strictly prohibited. Making Cloud Computing Work for Your Company Mitigating Risks – Multidisciplinary Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 Technical Legal Risk Transfer (Insurance)

Page 15 Recording of this session via any media type is strictly prohibited. Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine,

Page 16 Recording of this session via any media type is strictly prohibited. Making Cloud Computing Work for Your Company Vendor Management Programs Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 RFP Phase Risk Identification Phase Formal Security and Privacy Assessment Data Security and Privacy Schedule Negotiation Strategies Audit and Reoccurring Risk Assessment This material is for informational purposes only and not for the purpose of providing legal advice. You should contact your attorney to obtain advice with respect to any particular issue or problem

Page 17 Recording of this session via any media type is strictly prohibited. Making Cloud Computing Work for Your Company Key Contract Terms Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 Definitions Preventative Contract Terms Controls in place to prevent data breach “Reasonable security” Specific controls Audit and Enforcement Terms Assessment / scanning rights Non-compliance reporting Credits / damages Incident Response Contract Terms Risk of Loss Contract Terms This material is for informational purposes only and not for the purpose of providing legal advice. You should contact your attorney to obtain advice with respect to any particular issue or problem

Page 18 Recording of this session via any media type is strictly prohibited. Making Cloud Computing Work for Your Company Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005 Privacy by Design and Culture Shared Security and Related Responsibilities Control and Liability Due Diligence and Vendor Management Programs This material is for informational purposes only and not for the purpose of providing legal advice. You should contact your attorney to obtain advice with respect to any particular issue or problem

Page 19 Recording of this session via any media type is strictly prohibited. Questions, Final Comments and Contact Information Toby Merrill Anthony Caratzas Vinny Sakore David Navetta, Esq. CIPP