How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010.

Slides:



Advertisements
Similar presentations
Cloud Computing - clearing the fog Rob Gear 8 th December 2009.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Phone: (919) Fax: (919) CFR Part 11 FDA Public Meeting Comments Presented by: M. Rita.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Page 1 Business Architecture – From Business Strategy to the Alignment of IT Rich Waller An Insurance Industry Case Study April 15, 2009.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Malware Response Infrastructure Planning and Design Published: February 2011 Updated: November 2011.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Enterprise Risk Management and Business Continuity Planning Mark Carey, CPA, CISA President x8431
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2010 RightNow Technologies, Inc. ASU – CABIT – Privacy Day Privacy in the Cloud Ben Nelson CISO, RightNow Technologies.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Information Security Issues at Casinos and eGaming
Business Analysis: A Business Unit Perspective International Institute of Business Analysis January 18, 2012.
Transparency, Efficiency & Accountability Why change something that works?  Drivers ◦ Government organization changes ◦ Legislative changes ◦ Compliance.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
Blue Cross - AT&T Wireless and CitiStreet: Development Challenges of Self- Service Web Systems 1- Why do more than a third of all Web self-service customers.
Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Challenges in Infosecurity Practices at IT Organizations
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Compliance Considerations March 24, 2015 | Jason Smith, CISSP.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Proprietary vs. Free/Open Source Software
Responsible Care® Basic Awareness 1. DISCUSSION POINTS 2 WHAT IS RESPONSIBLE CARE®? HOW DOES RESPONSIBLE CARE® ADD VALUE? WHAT CAN YOU DO TO SUPPORT RESPONSIBLE.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Responsible Care® Awareness for Managers 1. DISCUSSION POINTS 2 WHAT IS RESPONSIBLE CARE®? FEATURES OF RESPONSIBLE CARE® HOW DOES RESPONSIBLE CARE® ADD.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Kathy Corbiere Service Delivery and Performance Commission
INFORMATION SECURITY DISCUSSION © 2015 Trojan Horse Security Inc., all rights reserved1.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
SharePoint Governance And the role of the Site Owner.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
1 Data Warehouse Assessments What, Why, and How Noah Subrin Technical Lead SRA International April 24, 2010.
George Yauneridge. Overview  Basic Security  Selecting a Provider  Cloud Computing Security Threats  Cloud Computing Security Practices  Conclusion.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Digital Asset Management & Storage Program Program Summary
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Understanding The Cloud
Deployment Planning Services
Cybersecurity - What’s Next? June 2017
Case Study - Target.
Deployment Planning Services
E-learning Business Case
Streamlining Vendor Risk Management with the HECVAT
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.
Alignment of COBIT to Botswana IT Audit Methodology
Moving from “Bolt-on” to “Build-in” Security Controls
What is Interesting in the CCSP certification?
Chapter 1: Information Security Fundamentals
Cloud adoption NECOOST Advisory | June 2017.
IS4680 Security Auditing for Compliance
Managing Compliance Early: System Development
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Cloud Computing for Wireless Networks
Presentation transcript:

How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010

At a Glance  NIST Definition  Cloud Challenge  Cloud Concern  Added Security Concerns  Security Transition  Is Cloud ready for you  Available Resources  Where to start

NIST Definition Cloud

4 Cloud Challenge

“In our February 2010 survey of 518 business technology pros, security concerns again led the list of reasons not to use cloud services, while on the roster of drivers, 77% cited cost savings.” -- Information Week

Cloud Security Incident  Make Shift Data Center  Perimeter Security  Incident Response  Product Security  Features  Interpretation  Sold as a premium feature “In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.” Attackers are ignoring the front door Current Anti-Virus Solutions are not working Patching sometimes is not enough You might be playing in the big leagues

Added Security Concerns  Business Unit bypass IT and Security  Individuals using cloud  How can IT / Security get in front of decisions to use cloud  Must do a better job managing risk

Cloud Security Shift  Customer Options  Security is a business enabler  Raise cloud user comfort  Provide transparency  Collaboration  Focus on business and not security  Business disabler  Cloud Provider knows how to implement security  Not transparent

Security Transition  Lessons Learned  Customer Concerns  Security Questionnaires  Response to questions varied  Increased of questionnaires  Request of evidence

Critical Challenges for Cloud Security Security Program Questionna ires Follow up Reviews Regulatory Compliance Customer Reviews External and Internal Reviews 10 Security Budgets Staffing/ Resources Reduce Confusion

Enterprise CIO Strategies — IT Security Needs to be Aligned 11 (February 2010) Link Business and IT strategies and plans Deliver projects and enable business growth Cloud Computing Web 2.0 Virtulization

Is Cloud Ready for You  Determine business need  Will the Cloud Provider be around  What data will be stored  Where will it be stored  What is your classification and control requirements for that data

Is Cloud Ready for You  What controls does the provider implement  Who is responsible for security  Are there third party validations  Right to Audit  Process for removing data  Incident Response  How often do you need to review?

Resources Available to Cloud Users  Cloud Security Alliance  CSA Guide (guide your approach internal legal / business UNIT) also recommendations for users and providers  Top Threats to Cloud Security (underwritten by HP)  ENISA  Security Benefits of Cloud and Risks  Make recommendations on risks and maximize the benefits

Resources Available to Cloud Users  Shared Assessments  Target Data Tracker  Self Information Gathering (SIG) – Level I, Level II  AUP  Business Continuity Questions, Privacy Questions, Other tools  Jericho Forum  Cloud Cube Model  Self-Assessment

What Will Be Stored  Know your provider  Ask them what data is required to be stored  Verify with your internal business team

Where Will it be Stored  Request for their locations  Validate that all locations are accounted for  Request they describe the types of controls in place

How to Verify  Target your questionnaire  Questions should clearly identify internal versus production questions  No and N/A should have comments section completed

Assessment

Other Options  Security Questionnaires  OnSite Review  ISO  SAS-70 Type II  ISAE 3402  SysTrust  PCI  Third Party Penetration Test  Emerging Cloud Certifications / Assessments

Moving Forward  Provider security maturing  Continuous Assessment  Transparency  Vendor Cooperation  Collaboration  Community

Available to Cloud Users  Qualys    Cloud Security Alliance   JERICHO Forum   Shared Assessments   ISAE 3402 

Thank you