A Top 100 Law Firmwww.dmhstallard.com Managing data risks in the cloud Frank Jennings.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
Attract | Reward | Prosper What Factors Effect Group. Ins. Costs? There are 2 main factors that effect your costs? 1.Transaction & Administration Fees.
IT Industry & Cloud Computing. Trends ‘2011- The year of high salaries and immense job opportunities for IT job seekers’ (Source – Blog.Timesjobs.com)
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
ERP IN THE CLOUD Prepared by KTL Solutions, Inc. Five Minutes Until Presentation Four Minutes Until Presentation Three Minutes Until Presentation Two Minutes.
A Top 100 Law Firmwww.dmhstallard.com BULLYING AND HARASSMENT IN THE WORK PLACE 6 DECEMBER 2010 JENNY THORP.
Data Breach Risks Overview Heather Pixton www2.idexpertscorp.com
Communications Briefing: Navigating the clouds Sam Parr and Ian Walden Wednesday 21 October 2009, – 2.00 pm.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Social Media Tom Lehman Lehman Associates, LLC Alexandria, VA.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Cloud Computing ity-notre-dame-logo.jpg Matthew Cunningham Selina Sambar Maria Skorcz.
Plan Introduction What is Cloud Computing?
PLUG IT IN 4 Cloud Computing. 1.Introduction 2.What Is Cloud Computing? 3.Different Types of Clouds 4.Cloud Computing Services 5.The Benefits of Cloud.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
Technology Guide Three Cloud Computing. Plug IT In OUTLINE TG 3.1 Introduction TG 3.2 What Is Cloud Computing? TG 3.3 Different Types of Clouds TG 3.4.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
STRONG POLICIES AND INTERNAL CONTROLS – SAFEGUARDING YOUR RESOURCES, AND YOUR REPUTATION Maria Falvo Chief Operating Officer American Savings Foundation.
Cloud Computing Implementation & Security Yoram Baltinester Business Owner, I.T. Implementer.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
From Here to Uncertainty: Legal Issues in Procuring a Cloud Computing Solution 17 April 2013 Ian Dunn – Assistant General Counsel at KPMG LLP Andrew Joint.
44 Montgomery Street Suite 960 San Francisco, CA USA Tel Cell
Career Opportunities in Public Accounting The Who, What, Where, When, Why and How……
ISACA Conference Key Legal Considerations 15 September 2014
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Component 6 - Health Management Information Systems Unit 2-2 -Hardware and Software Supporting Health Information Systems.
Mahesh S. Sonavane SunGard VP – Information Security & BCM
The Cloud and the Law Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
LEARNINGS FROM LONDON LONG TERM INCENTIVE PLANS PRESENTED BY MARLIES BRECHER STANDARD BANK.
Cloud Computing and the Public Sector Risks and Rewards John O’Connor, Partner - Head of Technology & Commercial Contracts.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Godfrey Ntoele Managing Executive: Government Business Service Cloud Computing Telco perspective ICT Summit 2012 Gauteng Province.
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Cloud of Clouds for UK public sector. Cloud Services Integrator.
CLOUD COMPUTING cloud computing and its importance to large scale firms such as Apple and Microsoft.
CLOUD COMPUTING Kevin Levy, Gunster David Zimmerman, IBM Marcos Galigarcía, Santander Private Banking.
Leading Global Growth Intelligence. Who we are? Founded in 1994, 20 years anniversary! EMIS(formerly known as ISI Emerging Markets), became part of Euromoney.
Risk Management for Small & Medium Sized Enterprises
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
A Top 100 Law Firmwww.dmhstallard.com CLEARING THE LEGAL HURDLES.
Funding Growth Audrey Metayer – Commercial Manager, HSBC Charlotte England – International Relationship Director, HSBC.
Network Centric Operations Industry Consortium The Intersection of Cloud Computing and Cyber Security Melvin Greer, NCOIC Vice Chair, Cloud Computing Working.
International Cloud Symposium October 11, 2011 CLOUD COMPUTING PRIVACY: THE USER PERSPECTIVE Alissa Cooper Chief Computer Scientist, CDT.
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.
Top Business IT Challenges of 2016
Minimizing Risk and Cost Exposure through Information Governance January 28, 2015 Moderator: Christopher Johnson, Director of Technology and Integrated.
Total Enterprise Mobility Comprehensive Management and Security
Cloud Computing: Legislative and Regulatory Frameworks Presentation to AREGNET Ria M. Thomas 29 April 2014 Occid-OrientStrategies.
Sandip Channa Managed Services Director CSI Group.
Calgary Cloud Service Consultant -
The Dutch Cloud Landscape
Community Cloud
Contracting for Cloud Services Risk & Compliance
Decrypting Data Compliance in China
Cloud Computing Kelley Raines.
Emerging technologies-
Managing Compliance Early: System Development
Final exam question format
2019 Thales Global Cloud Security Study
Final exam question format
Presentation transcript:

A Top 100 Law Firmwww.dmhstallard.com Managing data risks in the cloud Frank Jennings

DMH Stallard LLP Key questions Where is the data going?What should be put in place?Who can access it? How can you restrict access?

DMH Stallard LLP Concerns over cloud computing Data privacy – 69% Source: Cloud Industry Forum “UK Cloud adoption and trends for 2013” Data security – 82% Data sovereignty/ jurisdiction – 33%

DMH Stallard LLP Benefits of controlling data Reputation Security Fines Sony PlayStation Network JSF-35 data UK ICO & FSA Apple IDs Sony PSN Blizzard data F35 JSF NHS £325k HSBC £3m

DMH Stallard LLP Where is the data going?

DMH Stallard LLP Who has the data? Private cloud Hybrid cloud Public cloud Cloud provider Customer

DMH Stallard LLP Who can access it? Customer Cloud provider Governments Third party IT consultants Mobile networks Cloud channel reseller

DMH Stallard LLP How can you restrict access? Levels of access for different data Manage data proactively Payment / security measures Keep key data in hybrid cloud?

DMH Stallard LLP What should you put in place? Data strategy Identify cloud Segregate data Need to know Audit the data

DMH Stallard LLP For more info, see our report

DMH Stallard LLP Questions? Frank Jennings, Partner, DMH Stallard LLP