PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.

Slides:



Advertisements
Similar presentations
Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Advertisements

TechFire Conference Cloud Made Simple - Dispelling the Hype. Brian Larkin Operations Director Digital Planet Brian Larkin Operations Director Digital Planet.
2 3 Global Foundation Services Security Global Delivery Sustainability Infrastructure.
The CCM framework consists of 11 Control Areas that are important to be measured, especially when comparing between different cloud provider offering.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Professional Behaviour
Presented by: Rajdeep Biswas Roll No.: 0104IT071082; Branch: IT (VII Sem.) R.K.D.F. Institute of Science & Technology Cloud Computing When Outsourcing.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
July 8-9, 2014 | Ronald Reagan Building | Washington, DC Federal Cloud Computing Summit Dr. Barry C. West Cloud Tools and Integration.
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Session 3 – Information Security Policies
Engineering the Cloud Andrew McCombs March 10th, 2011.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Plan Introduction What is Cloud Computing?
Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make.
CLOUD COMPUTING. IAAS / PAAS / SAAS LAYERS. Olena Matokhina Development and Consulting Team Lead 2 ABOUT PRESENTER.
September * Provide analysis, advice, and recommendations on the impacts that new and emerging technologies are likely to have on the management.
Introduction to Cloud Computing
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Xiaoyue Jiu, Fola Oyediran, Eboni Strawder | Group 10
Computer Science and Engineering 1 Cloud ComputingSecurity.
12,000 anonymized surveyed results Worldwide user base Cloud Security Readiness Tool Security trends report:
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
VІI scientific and practical seminar with international participation “Economic security of the state and scientific and technological aspects of its provision".
Chapter 8 – Cloud Computing
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
By: Joshua Wiegand. Overview ● What is the cloud computing? ● History of Mobile Computing ● Service Models ● Deployment Models ● Architecture ● Security.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
The Department of Internal Affairs Keeping records in the cloud Patrick Power Manager, Government Recordkeeping Programme.
Cloud Computing: Legislative and Regulatory Frameworks Presentation to AREGNET Ria M. Thomas 29 April 2014 Occid-OrientStrategies.
Law Firm Data Security: What In-house Counsel Need to Know
Understanding The Cloud
VIRTUALIZATION & CLOUD COMPUTING
Guidance for the Cloud: An EU Example - CloudWatch
Andrew McCombs March 10th, 2011
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
Cloud Testing Shilpi Chugh.
Capitalize on modern technology
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Cybersecurity compliance for attorneys
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Computers Are Your Future Twelfth Edition
Fundamental Concepts and Models
Computer Science and Engineering
Presentation transcript:

PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects from unwanted communication User choice and control Products, online services adhere to fair information principles Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready

1,000 US consumers surveyed by Wakefield research

Broad Network Access Rapid Elasticity Measured Service Self- Service Resource Pooling Service Model IaaS PaaS SaaS

BENEFIT S privacy security reliability scalability increased agility flexibility Reduced costs CONCER NS

CLOUD PROVIDER SaaSPaaSIaaS RESPONSIBILITY: Data classification Application level controls Client and end point protection Network controls Physical security Identity and access management Host security CLOUD CUSTOMER

57% Time Savings 3X Money Savings 54% Improved Security

44% Security Concerns 61% Industry Standards 59% Transparency

What are your current IT capabilities? Can you improve your people, processes, and technologies? Can cloud reduce your risks while reducing cost?

CCM controlDescription DG-01 Data Governance - Ownership / Stewardship All data shall be designated with stewardship with assigned responsibilities defined, documented and communicated. DG-02 Data Governance - Classification Data, and objects containing data, shall be assigned a classification based on data type, jurisdiction of origin, jurisdiction domiciled, context, legal constraints, contractual constraints, value, sensitivity, criticality to the organization and third party obligation for retention and prevention of unauthorized disclosure or misuse.

Where are you now? Where will you be? Can cloud help?

Cloud Security Readiness Tool (CSRT) data between October 2012 and March Approximately 5700 anonymized answers to CSRT questions Margin of error +/- 1% USA/EUROPE +/- 10% ASIA

STRONGER INFORMATION SECURITY antivirus/antimalwar e software clock synchronization SECURITY ARCHITECTURE FACILITY SECURITY controlled user access to data

WEAKER OPERATIONS MANAGEMENT effective equipment maintenance LEGAL PROTECTION nondisclosure agreements INFORMATION SECURITY consistent incident reporting OPERATIONS MANAGEMENT effective capacity planning HUMAN RESOURCES SECURITY prudent hiring practices

 If the answer was Almost There or Streamlined, a +1 value was assigned for maturity.  If the answer was Getting Started or Making Progress, a -1 value was assigned for maturity.

Resource planning Equipment maintenance

The better you understand your people, processes, and technologies, the more you will be able to make informed comparisons and evaluate the benefits of the cloud. Visit the Trustworthy Computing – Cloud TechCenter and its many resources: The Cloud Security Readiness Tool A free assessment to help you evaluate the benefits of the cloud create a plan for adoption better understand your organization’s capabilities Additional resources on cloud security, privacy, and reliability microsoft.com/trustedcloud