© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.

Slides:



Advertisements
Similar presentations
Life Science Services and Solutions
Advertisements

Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Security Consulting Risk.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Welcome to the DrivenBI/AT&T Webinar: Revolution in Cloud-Based Analytics The webinar will begin shortly.
Enterprise and Global Management of e-Business Technology
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Cloud Usability Framework
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
SIMPLIFYING M2M 5 Ways Decrease the Cost and Complexity of Deploying M2M Solutions October 3, 2012 David Kalb AT&T Director of M2M Business Development.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
© 2013 VCE Company, LLC. All rights reserved. CDCA SBIOI April 18, 2013 VCE: A FOUNDATION FOR IT TRANSFORMATION.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
Global Infrastructure Management Business Update Vivek Gupta and Tom Tucker 20 th February, 2013 © 2013, Zensar Technologies. All Rights Reserved..
12 Enterprise and Global Management of e-Business Technology.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Service Transition & Planning Service Validation & Testing
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Enterprise and Global Management of e-Business Technology
Eliza de Guzman HTM 520 Health Information Exchange.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
E-TechServices's IT Strategy Open. Virtualize. Rationalize. A Strategy for Optimal IT Deployment.
© 2009 AT&T Intellectual Property. All rights reserved. AT&T, AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property.
Irwin/McGraw-Hill Copyright © 2000, The McGraw-Hill Companies, Inc. All rights reserved. I n t r o d u c t i o n t o I n f o r m a t i o n S y s t e m.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 1: Security Governance Through Principles and Policies
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
Software as a Service (SaaS) Fredrick Dande, MBA, PMP.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
- Company Confidential - Corporate Overview March 2015.
Advanced cloud infrastructures and services SAULIUS ŽIŪKAS.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Scales Technology FZCO
Deployment Planning Services
Enabling Business to Move to the Cloud with Confidence
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Cloud Computing Kelley Raines.
Bridging the Gap From On-Premises to the Cloud
SAM Financial Services Cybersecurity Assessment
AT&T Network Based Firewall with NetBond® for Cloud
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
AT&T Security Solutions Customer use cases
Microsoft Data Insights Summit
Presentation transcript:

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Cloud Security Consulting Services AT&T Security Consulting March 2012

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Technology Trends Reshaping Business 2 Companies are reengineering the way they do business. Powerful Mobile Computing Devices Fast, Widespread Wireless/Wireline IP Networks Cloud Computing

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. “…a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.” - National Institutes of Standards and Technology What is “Cloud Computing”? 3

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Improve My Productivity Real time collaboration across employees, partners, customers Requirements for applications to work across devices Reduce My Cost Low storage and server utilization in non-peak periods Desire to pivot from Capex to Opex Remove the Complexity Simplification due to limited IT staff down market End-to-end ownership vs. multi-vendor service integrations Demand to mobilize and virtualize assets, applications and activities Off-premise On-demand Easy to Use Web-enabled Device Agnostic Tiered Support Business Drivers for Cloud 4

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Cloud Deployment Models Transfer Responsibility 5 Customer Management Responsibility Service Provider Management Responsibility

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Considerations for Cloud Security 6

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Cloud Security Challenges Applicable Compliance Requirements – Current Good Manufacturing Practices (cGMPs) for human pharmaceuticals – FDA Audit Processes, field trials, exception approvals – ARA, HIPPA, HITRUST, PCI, NIST, FTC, State Regulations Risk Management Monitoring Governance Visibility Advanced technology adoption Complicates security, compliance & validation efforts 7

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Success Through “Data Centricity” 8 Define Appropriate Controls Determine Applicable Compliance Requirements Assess the Associated Risks Define the Workload (isolate a function) Classify the Relevant Data Establish Contractual Obligations Sensitive Data

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Layered Approach to Cloud Security Access Management Infrastructure Security Services Security 8 Security Dimensions Data Confidentiality Communication Security Integrity Availability Privacy Authentication repudiation Security Layers Applications Security Access Control End User Security VULNERABILITIES Data Confidentiality Communication Security Data Integrity Availability Privacy Authentication Non-repudiation THREATS ATTACKS Destruction Disclosure Corruption Removal Interruption Adapted based on X.805 Model 9

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Compliance & Security Lessons Learned The responsibility for security and compliance cannot be outsourced Proper Asset Classification is critical - understand what you are putting into the cloud Understand that assets can exist in various physical locations Determine who can affect the security of the data Do Your Homework to find the right Security Solutions Provider! Evaluate providers based on your security requirements Document accountability demarcation points 10

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. 11 Cloud Security and Compliance Assessment

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. 12 Cloud Security and Compliance Assessment Service Overview What We DeliverWhat We Provide Cloud Security and Compliance Assessment Executive Summary Provides key findings of the assessment. AT&T’s Cloud Security and Compliance Assessment helps you understand your security posture, polices and compliance exposure. The Cloud Security and Compliance Assessment provides an onsite consulting engagement to examine and maintain your security posture by identifying potential data security risk(s) involved in moving targeted workloads to the Cloud. Cloud Security and Compliance Assessment Report Comprehensive findings report with technical detail and recommendations resulting from the assessment service. AT&T is committed to providing pre and post assessment requirements, access to information and transparency.

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. 13 Why AT&T for Cloud Security and Advisory Services? Where experience counts Managed WAN for single communication fabric worldwide Security Managed Applications, Managed UC Services, Collaboration Services and Cloud Solutions A rich history of building highly-secure domestic and global networks including expertise in large scale, complex and custom network infrastructures and solutions. Comprehensive Consulting portfolio across eight strategic services in addition to cloud advisory services. Combined network implementation experience and consulting capabilities that is aligned with your business needs and vision. AT&T Consulting provides “trusted advisor” expertise with “C” level executives based upon many years of experience of addressing strategic business initiatives with best of breed solutions. AT&T Expertise

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. 14