MINISTRY OF DEFENCE OF THE CZECH REPUBLIC CLOUD COMPUTING THE SPECIFICS OF ITS DEPLOYMENT WITHIN THE DEFENCE ENVIRONMENT Head of CIS Divison General Staff,

Slides:



Advertisements
Similar presentations
Performance Framework Part 2 – Performance and Resource Management Multi Donor Trust Fund for Justice Sector Support in Serbia.
Advertisements

Cloud Computing - clearing the fog Rob Gear 8 th December 2009.
1 Miami-Dade County Public Schools. 2 From the Data Center to the Cloud: Manny Castañeda Miami-Dade County Public Schools.
Protection of Classified Information & Cyber Security
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Integration between ITSM III and the Project Office Simon Sharpe ITSM III.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
1 Chapter 7 IT Infrastructures Business-Driven Technology
Network Enabled Capability Through Innovative Systems Engineering Service Oriented Integration of Systems for Military Capability Duncan Russell, Nik Looker,
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Presenter: Vikash Nath MCP, CCNA, MCTS. On-Premise Private Cloud Public Cloud Hybrid Cloud.
Didzis Balodis, CISSP, Head of IT Security and Infrastructure at SQUALIO Using the Cloud - practical security implications.
Building the Ultimate IT Portfolio from Scratch Peter Grant Advisor, IBRS
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
School of Computing and Management Sciences © adapted from Peter Lake, Sheffield Hallam University Deploying Technology From Business Need to IT Infrastructure.
報告人 : 葉瑞群 日期 : 2011/11/10 出處 : IEEE Transactions on Knowledge and Data Engineering.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Evolving IT Framework Standards (Compliance and IT)
Security and Privacy Services Cloud computing point of view October 2012.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Transport Development and Solutions Alliance (TDSA) Technology Evolving Business Functions Scott Lawton – Chief Executive Officer 7 th of August 2015.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
16-17 October 2008,Prague1 Information sharing within Czech Armed Forces and Allies, Challenges for mission effectiveness within Czech Armed Forces and.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B4 Enterprise Architectures (on OLC)
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
Connect communicate collaborate GÉANT3 Services Connectivity and Monitoring Services by and for NRENs Ann Harding, SWITCH TNC 2010.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Enterprise Architectures.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Software. Using Automated Tools to Effectively Manage Tomorrow’s Data Center Stephen Elliot Vice President of Strategy Virtualization and Service Automation.
TRANSFORMATION OF THE SLOVENIAN ARMED FORCES
Consumer Protection Definition. 1 Current General Frameworks For CP. 2 Gaps/Risk areas in current Frameworks. 3 Consumer Protection Pillars. 4 NGN/Convergence.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
The Department of Internal Affairs Keeping records in the cloud Patrick Power Manager, Government Recordkeeping Programme.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.
University of California Cloud Computing Task Force Russ Hobby.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Serving IT up with ITIL By Thane Price. IT is the laboratory’s pit crew  Goal : Make technology transparent while accomplishing valuable internal customer.
Clouding with Microsoft Azure
Scales Technology FZCO
Draft - Enterprise Risk Management Risk Universe
COMP532 IT INFRASTRUCTURE
Considerations for operating MS SQL in the cloud, in production, DR, or hybrid scenarios. By Nick Rubtsov.
ICT Security Expert, DC Cloud Practice Leader HUAWEI
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cloud Testing Shilpi Chugh.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Corporate Overview.
GRC - A Strategic Approach
Capitalize on Your Business’s Technology
Cloud Computing for Wireless Networks
Presentation transcript:

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC CLOUD COMPUTING THE SPECIFICS OF ITS DEPLOYMENT WITHIN THE DEFENCE ENVIRONMENT Head of CIS Divison General Staff, Czech Armed Forces Brigadier General JAN KAŠE

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC Challenges of the Evolving Environment MAINFRAME 1970 MICROCOMPUTERS 1980 PERSONAL COMPUTERS 1990 INTERNET ENVIRONMENT 2000 CLOUD COMPUTING SOCIAL NETWORKS 2

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC Cloud: Hype or Trusted Productivity? 3

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC Specific of the Defense Environment 4 Acquisition and Operation may not be flexible enough There might be strong prejudice against other than internal or coalitional cloud We still evaluate the level of cloud services (what - as a service) Security will not be traded for any economical benefits

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC Cloud Operating Environment 5 Management Capabilities Dynamic resources allocation Service Level Management Operation and Costs Monitoring Adaptation of Business Models Legal and Contractual Conditions Infrastructure Governance ITIL Processes Identity Management Backup, Restore, Disaster Recovery Communication Infrastructure Capability (MPLS, QoS) Capacity (bandwidth, CM)

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC What – as a service? 6

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC Security Challenges 7  Responsibility Mandatory regulations Originator vs Caretaker Customer and Supplier Chain  Privileged User Issues  Investigation Tracking Seizures Silent subpoena  Encryption Provider-based Customer-based  Viability  Risk Assessment  Security Framework Reengineering

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC 8 PROsCONs Limited InvestmentsEfficiencyUtilization New way to fulfill security regulations Level of ICT Management and Governanace The Ballance is still unconvincing And Cloud Security is the enabler

MINISTRY OF DEFENCE OF THE CZECH REPUBLIC QUESTIONS AND ANSWERS BG JAN KAŠE Head of CIS Divison, General Staff, Czech Armed Forces