© 2010 RightNow Technologies, Inc. ASU – CABIT – Privacy Day Privacy in the Cloud Ben Nelson CISO, RightNow Technologies.

Slides:



Advertisements
Similar presentations
Implementing a Behavior Based Safety Process at Rockwell Automation
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Life Science Services and Solutions
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Risk & Safety Presentation January 8, 2013 Bryan Sabari, CUSP Manager Corporate Safety
Maritime Security: Our Approach. Who is CUBIC?  Cubic Corporation (Amex) is an innovative supplier of products, systems and services to government and.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Strategic Planning and the Marketing Management Process
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
© 2003 IBM Corporation Privacy 12 th CACR Workshop Yim Y. Chan Chief Privacy Officer & CIO IBM Canada Ltd. w3.ibm.com/Privacy.
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
1 K P M G L L P A D V I S O R Y Information Security: Policy, Awareness and Training, and Compliance Graham J. Hill IT Advisory Services November 21, 2007.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
2 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Business Careers & Practices Week 1 Careers and Jobs in Accounting and Management Work Functions of Accounting and Management Technicians Business Functions.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Stephen S. Yau CSE , Fall Security Strategies.
User Group 2015 Security Best Practices. Presenters Steve Kelley, COO 31 years experience building and managing operations and service delivery organizations.
A NASSCOM ® Initiative Security and Quality Kamlesh Bajaj CEO, DSCI May 23, 2009 NASSCOM Quality Summit Hyderabad 1.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SEC835 Database and Web application security Information Security Architecture.
CHAPTER 5 Infrastructure Components PART I. 2 ESGD5125 SEM II 2009/2010 Dr. Samy Abu Naser 2 Learning Objectives: To discuss: The need for SQA procedures.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
ISO 9000 and Public Awareness and Information Session 22 February 2006 Owen Glave, MBA-TQM.
1-1 Strategic Planning and the Marketing Management Process Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights.
Lec#3 Project Quality Management Ghazala Amin. 2 Quality Specialist-Job responsibility Responsibilities Reports monitoring and measurement of processes.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
ISO 9000 & TOTAL QUALITY ISO 9000 refers to a group of quality assurance standards established by the International Organization for Standardization.This.
3rd Party Audits and Regulatory Inspections Food Industry Perspective
How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
Copyrights I Global Manager Group | Revision 0.1 Feb 2009 | 1 GMG DEMO OF ISO: ENERGY MANAGEMENT SYSTEM AUDITOR TRAINING PRESENTATION KIT.
Challenges in Infosecurity Practices at IT Organizations
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Sunday, October 25, Procurement of African Timber - Supporting Sustainable Forest Management and Development -
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Sandler & Travis Trade Advisory Services, Inc. Reducing Risk Through Internal Training: Measurement tools to assess training success WESCCON October 16,
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
– March 2007 The reproduction, modification, or distribution by whatever means of the whole or any part of this presentation.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
Key Points for a Privacy Programme for Multinationals Steve Coope.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Company Introduction & Overview
Top 10 Critical Reasons - Why To Get ISO 9001 Certification
Law Firm Data Security: What In-house Counsel Need to Know
Team 1 – Incident Response
Data Minimization Framework
Assessing the Security of the Cloud
Cloud Services - A Framework for Adoption in the Regulated Life Sciences Industry Status November 2018.
Compliance in the Cloud
Professional Services END TO END NETWORK SECURITY SOLUTION
Protect data in core business applications
Cloud Computing for Wireless Networks
Presentation transcript:

© 2010 RightNow Technologies, Inc. ASU – CABIT – Privacy Day Privacy in the Cloud Ben Nelson CISO, RightNow Technologies

© 2010 RightNow Technologies, Inc. SaaS: Definition and Key Principles Software as a Service (SaaS) is a software application delivery model where a software vendor develops a web-native software application and hosts and operates (either independently or through a third-party) the application for use by its customers over the Internet - Wikepedia. Business Model Change Transferring IT Responsibilities Leveraging Economies of Scale Providing (Receiving) Key Services SaaS = On Demand

© 2010 RightNow Technologies, Inc. How many of you are consumers of SaaS or Cloud Services today? How many of you, who aren’t consumers, are considering SaaS or Cloud Services? How many of you are responsible for implementing SaaS or Cloud Services? What are your biggest concerns?

© 2010 RightNow Technologies, Inc. Background

© 2010 RightNow Technologies, Inc. Who is RightNow? Leader in SaaS/Cloud Customer Experience Started in 1998 Consistent growth throughout lifetime –Currently serving companies –Publicly traded (NASDAQ: RNOW) 100+ million transactions per year

© 2010 RightNow Technologies, Inc. 1,900 Clients are Delivering Superior Customer Experiences

© 2010 RightNow Technologies, Inc. Who is Ben Nelson? Started with RightNow in Feb 2000 Helped architect the SaaS infrastructure elements that are still in place today Started doing full-time information security at RightNow in 2005 Built compliance practice in 2007 Achieved PCI-DSS SPL1 in 2009 Received ATO for FISMA Moderate C&A in 2009 Completed SAS 70 Type II audit of global operations in 2009

© 2010 RightNow Technologies, Inc. Unique Challenges

© 2010 RightNow Technologies, Inc. Multi-Tenancy Any (and every) customer hosted on same infrastructure Whole infrastructure is a target for any tenant Infrastructure’s security/privacy requirements are the super-set of the requirements of *all* tenants

© 2010 RightNow Technologies, Inc. Market Diversity RightNow sells to clients in almost every major market vertical you can name –Each one with unique, specific requirements/regulation RightNow sells to clients in almost every major geography –Again, each with their own unique, specific requirements/regulations

© 2010 RightNow Technologies, Inc. Ultra-Flexible Product/Service We don’t limit the type of data –Simple knowledge articles (how to fix my widget) –Personalized portal data Consumer RMAs Health data Compensation/Benefits Simple contact data We don’t limit the quantity of data

© 2010 RightNow Technologies, Inc. Defense In Depth

© 2010 RightNow Technologies, Inc. Basic Principles Protect the data at every layer possible: –Physical Rigorous physical security requirements from top-tier vendors –Personnel Background checks and employment verifications –Infrastructure Firewalls, Intrusion Detection, etc. –Application OWASP application development principles 3 rd party vulnerability assessment as part of QA

© 2010 RightNow Technologies, Inc. Incident Handling What to do when ‘it’ happens Must be prepared in advance Must know how to escalate Must be aware of breach notification laws –Generally too many to manage –Outside counsel is your best ally in this situation Must have your legal and corporate communications teams aware of the procedure Must maintain a relationship w/ local law enforcement –Know how to contact federal law enforcement

© 2010 RightNow Technologies, Inc. Security Awareness People will always be the ‘weakest link’ –Technology is the easy part Needs to come from the ‘top down’ –Executive-level support Needs to be regular –Periodic training –Simple reminders Can be a motivator too –Sense of pride in knowing that you’re part of protecting critical data/infrastructure

© 2010 RightNow Technologies, Inc. Compliance: The Proof in the Pudding

© 2010 RightNow Technologies, Inc. Know Your Customers They probably have very specific requirements They probably have some oversight –Don’t try to avoid or circumvent Understand their motivation Understand how they’re using your service

© 2010 RightNow Technologies, Inc. Control Mapping Multi-tenancy with diverse clientele makes it almost impossible to meet each one’s needs individually Overlapping controls are your friend Mapping ‘like’ controls together isn’t as hard as it seems –Many tools available to help you do this

© 2010 RightNow Technologies, Inc. Certification Your word only goes so far Engage a 3 rd party to certify you against –A custom control set (SAS 70) –A well known industry standard PCI-DSS (varying levels of certification) ISO 2700x series NIST guidelines (federal government C&A)

© 2010 RightNow Technologies, Inc. What SaaS Consumers Should Expect

© 2010 RightNow Technologies, Inc. Transparency Especially in data security/privacy practices Also in operational metrics SaaS vendors should be able to clearly articulate: –Their data security/privacy practices –Their legal obligations to individuals –Their contractual obligations to *you*

© 2010 RightNow Technologies, Inc. Recognized Certifications Preferably validated by an outside party Applicable to your industry’s needs If you’re not sure what control frameworks are applicable to you –Start with BITS/Santa Fe Group Standardized Information Gathering (SIG) Questionnaire

© 2010 RightNow Technologies, Inc. THANK YOU Questions?