THE EMERGING CLOUD ECOSYSTEM:
|
|
- Jasper Doyle
- 5 years ago
- Views:
Transcription
1 Day 2, Thursday, 2012 Jan 19, hrs SESSION 4: Security in the Cloud THE EMERGING CLOUD ECOSYSTEM: cyber security plusli/rd Tony Rutkowski, Yaana Technologies 7 th ETSI Security Workshop, Jan 2011 ETSI All rights reserved
2 Outline Security as a Business opportunity: A winning driver to ensure technology success and increase confidence and trust amongst end users! Current tcloud developments Cyber security and LI/RD developments Business opportunities 2
3 The Basics: a new cloud based global communications infrastructure is emerging Global network architectures are profoundly, rapidly changing PSTNs/mobile networks are disappearing Internet is disappearing Powerful end user devices for virtual services are becoming ubiquitous End user behavior is nomadic Huge data centers optimized for virtual services combined with local access bandwidth are emerging worldwide as the new infrastructure These changes are real, compelling, and emerging rapidly Bringing about a holistic cloud ecosystem is occupying industry in almost every venue around the world 3
4 The Basics: a new cloud virtualized global communications architecture Virtualized devices Line or air interfaces Access, IdM & transport cloud virtualization services Intercloud services Other cloud virtualization services, especially for application support Access, IdM & transport General services Intercloud Access, IdM & transport General services Access, IdM & transport Intercloud General services Access, IdM & transport Intercloud General services Access, IdM & transport General services 4
5 Current Cloud developments Implementations Industry Collaboration and Reports 5
6 Implementers Top 50 in early 2011* 10gen Cloud Passage FluidInfo Nimbula Akamai Amazon Cloud.com Cloudera Fusion IO GoGrid Nutanix Power Assure Apigee CloudSwitch Google Rackspace Apple Couchbase Green Revolution Red Hat ARM CSC IBM RightScale Aryaka Dell Intel Salesforce.com Aspera DotCloud IO Turbine SeaMicro Boundary Embrane Joyent Sentilla Calxeda Enomaly Juniper SynapSense China Telecom Cisco Citrix Eucalyptus Systems Facebook Microsoft New Relic Nicira Verizon/Terremark VMware Zeus Technology * Source: Washington Technology/Gigacom (underline = top 8) 6
7 Most new applications/services especially for mobile smartphones are cloud based Amazon Apple, including Apple OS applications Baidu Facebook Google, including Android OS applications Microsoft, including Microsoft OS applications RIM, including BlackBerry App World Skype Yahoo 7
8 Major providers and vendors collaborating innewcloudtelecom new forums ATT BT China Telecommunications China Unicom Cisco Systems Datang France Télécom Orange Fujitsu Hitachi Huawei Technologies IBM KDDI KT Corporation Microsoft NEC Nokia Siemens Networks NTT Oracle RIM Samsung Electronics SAP Telecom Italia Telefon AB LM Ericsson Telekomunikacja Polska Verizon Vdf Vodafone & O2 ZTE * Sources: ITU-T Cloud Focus Group participant list, 2011; ETSI Cloud workshop 8
9 Industry Technical Collaboration Venues Almost everyone ATIS CSA CSCC DMTF ENISA ETSI GICTF IEEE IETF ISO ITU T NIST OASIS ODCA OGF OMG SNIA TMF Alliance for Telecommunications Industry Solutions Cable Labs Cloud Security Alliance Cloud Standards Customer Council Distributed Management Task Force European Network and Information Security Agency European Telecommunications Standards Institute Global Inter Cloud Technology Forum Institute of Electrical and Electronics Engineers Internet Engineering Task Force International Organization for Standardization International Telecommunication Union Telecommunications Standardization National Institute of Standards and Technology Organization for the Advancement of Structured Information Standards Open Data Center Alliance Open Grid Forum Object Management Group Storage Networking Industry Association The Open Group TeleManagement Forum Sources: ITU-T Focus Group on Cloud Computing, NIST Cloud Standards Wiki 9
10 ITU T Focus Group on Cloud Computing Global initiative during to produce first comprehensive conceptualization and integration of all technical information Ecosystem Requirements and reference architecture Infrastructure for network enabled clouds Security Standards activities Telecommunication benefits Resource Management Deliverables were just delivered 9 Jan 2012 Sets a stage for widespread industry activity and structured implementations worldwide 10
11 Identified Cloud Computing Services Short List of Cloud Services Extended List of Cloud Services Cloud Software as a Service (SaaS) Communications as a Service (CaaS) Cloud Platform as a Service (PaaS) Cloud Infrastructure as a Service (IaaS) Application services (SaaS) Resource services (IaaS) Platform services (PaaS) Network services (NaaS) Communication services (CaaS) Network as a Service (NaaS) Private cloud Community cloud Public cloud Hybrid cloud Personal cloud Inter cloud Business Process as a Service (BPaaS) Application Platform as a Service(APaaS) Application Infrastructure as a Service (AIaaS) Everything as a Service (XaaS) Storage as a service Database as a service Information as a service Process as a service Security as a service Integration as a service Management/governance as a service Testing as a service 11
12 A cloud computing functionalreference architecture Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec
13 A cloud computing network infrastructure model 13 Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec 2011
14 Resource management framework Standards intended to address: Awareness of logical and physical resources used How to dynamically reconfigure resources How to expose additional interfaces How to evaluate security controls 14 Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec 2011
15 Cyber Security and LI/RD developments 15
16 Cloud cyber security 16 Threats for Cloud Security Threats for Cloud Service Users Threats for Cloud Service Providers Security Requirements for CloudSecurity Requirements for Cloud Service Users Requirements for Cloud Service Providers Study Subjects on Cloud Security Security Architecture/Model and Framework Security Management and Audit technology Business Continuity Planning (BCP) and Disaster Recovery Storage Security Data and Privacy protection Account/Identity Management Network Monitoring and Incident Response Network Security Management Interoperability and Portability Security Virtualization Security Obligatory Predicates (including LI/RD) Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec 2011
17 Cloud computing service opportunities Short List of Cloud Services Extended List of Cloud Services Cloud Software as a Service (SaaS) Communications as a Service (CaaS) Cloud Platform as a Service (PaaS) Cloud Infrastructure as a Service (IaaS) Application services (SaaS) Resource services (IaaS) Platform services (PaaS) Network services (NaaS) Communication services (CaaS) Network as a Service (NaaS) 17 Deliberately omitted from ITU T list Private cloud Community cloud Public cloud Hybrid cloud Personal cloud Inter cloud Business Process as a Service (BPaaS) Application Platform as a Service(APaaS) Application Infrastructure as a Service (AIaaS) Everything as a Service (XaaS) Storage as a service Database as a service Information as a service Process as a service Security as a service Integration as a service Management/governance as a service Testing as a service Lawful Interception as a Service Retained Data as a service Law Enforcement Monitoring Facility as a service
18 Obligatory predicates: functionality identifiedfor for allcloudbasedservices services Potential security monitoring and acquisition interfaces Challenges will be LI implementations across multiple clouds RD security and scaling Inconsistencies among cloud infrastructure and service implementations Potential application of ETSI TCLI ewarrant, DR handover, and Dynamic Triggering specifications Necessitates widespread d use of DPI capabilities i 18
19 Business opportunities Retained Data as a Service 19
20 Retained Data as a Service (RDaaS) Retained Data obligatorypredicates are numerous Securities and financial transaction regulatory requirements ediscovery civil litigation evidence requirements USA rules being adopted by judiciaries worldwide Data Retention criminal investigation requirements EU Data Retention Directive Potential new cloud requirements under the Directive Data Preservation criminal investigation requirements Includes quick freeze capabilities Cybersecurity/infrastructure protection requirements Includes Continuous Security Monitoring event analysis capabilities Billing record requirements 20
21 RDaaS value propositions RDaaS capabilities are ideal Cloud service obligations Large scale non cloud services Almost unlimited scaling of storage and processing resources High security and protection of personally identifiable information Technique re use can occur across multiple implementations Lowered costs Faster and more complex discovery and analysis capabilities Specialized customer remote access apps Facilitated by new CybOX observables initiative 21
Cloud Computing. Theory and Practice. 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley
Cloud Computing Theory and Practice 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley Cloud Computing NIST Definition 22 March 2012 Phil Mustaphi NIST Cloud Computing Definition NIST Special
More informationStandardization Activities for Cloud Computing
Standardization Activities for Cloud Computing Hiroshi Sakai Abstract This article describes standardization activities for cloud computing. Since cloud computing involves a wide range of technical and
More informationInter-Cloud Computing and Networking for Secure Social Infrastructure
Inter-Cloud Computing and ing for Secure Social Infrastructure Atsuhiro GOTO Institute of Information Security (IISEC) Global Inter-Cloud Technology Forum (GICTF) 1 Who am I? Atsuhiro Goto is currently
More informationCopyright 2011 EMC Corporation. All rights reserved.
1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145
More informationCloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA
Cloud Standards: Raising PRESENTATION the bar TITLE of completeness GOES HERE Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA Opening Thoughts Cloud s no
More informationMoving to the Cloud. Developing Apps in. the New World of Cloud Computing. Dinkar Sitaram. Geetha Manjunath. David R. Deily ELSEVIER.
Moving to the Cloud Developing Apps in the New World of Cloud Computing Dinkar Sitaram Geetha Manjunath Technical Editor David R. Deily AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO
More informationOverview of International Standards for Cloud Computing
ITU Regional Forum on New Technologies for Development, Cairo-Egypt, 23-24 November 2016 Overview of International Standards for Cloud Computing Dr. Jamil Chawki, Orange SG 13 Vice Chairman & SG 13 WP2
More informationCloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm
Presentation Title Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Background A career of helping companies integrate new technologies into their existing infrastructure
More informationCLOUD COMPUTING. The Old Ways Are New Again. Jeff Rowland, Vice President, USAA IT/Security Audit Services. Public Information
CLOUD COMPUTING The Old Ways Are New Again Jeff Rowland, Vice President, USAA IT/Security Audit Services Public Information Who We Are Our Mission The mission of the association is to facilitate the financial
More informationCloud Computing Lecture 4
Cloud Computing Lecture 4 1/17/2012 What is Hypervisor in Cloud Computing and its types? The hypervisor is a virtual machine monitor (VMM) that manages resources for virtual machines. The name hypervisor
More informationCloud Computing: An Overview
Cloud Computing: An Overview Ling Qian, Zhiguo Luo, Yujian Du, and Leitao Guo 53A, Xibianmennei Ave, Xuanwu District, Beijing 100053, China {qianling,luozhiguo,duyujian,guoleitao}@chinamobile.com Abstract.
More informationCloud Standards Coordina.on
Cloud Standards Coordina.on A collabora.ve snapshot on Cloud Standards E. Darmois CSC Workshop, 11 December 2013 ETSI 2013. All rights reserved The Context EC Cloud Strategy (09/2012) Faster adopdon of
More informationPart III: Evaluating the Business Value of the Hybrid Cloud
Contents at a Glance Introduction... 1 Part I: Understanding Concepts and Construction... 7 Chapter 1: Discovering the Fundamentals of Your Computing Environment...9 Chapter 2: The Hybrid Cloud Continuum...25
More informationEU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017
EU Cloud Computing Policy Luis C. Busquets Pérez 26 September 2017 The digital revolution is built on data Most economic activity will depend on data within a decade Potential of the data-driven economy
More informationTopics of Discussion
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture on NIST Cloud Computing Definition, Standards & Roadmap, Security & Privacy Guidelines Spring 2013 A Specialty Course for Purdue
More informationINTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE
INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing
More informationرایانش ابري در بانکداري
رایانش ابري در بانکداري فرامرز خالقی شرکت داده پردازي ایران 1 NIST :The provision of computational resources on demand via a computer network IT Resources and Services that are abstracted from the underlying
More informationCloud Computing introduction
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationUniversal Trusted Service Provider Identity to Reduce Vulnerabilities
1.1 Session 3: Cyber-attacks: Are we ready for the battlefield of the 21st Century? 22 May 2008 Palais des Nations, Geneva Universal Trusted Service Provider Identity to Reduce Vulnerabilities Tony Rutkowski
More informationCloud Computing Overview. The Business and Technology Impact. October 2013
Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility
More informationMONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.
MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take
More informationCisco Services: Towards Your Next Generation IT
Cisco Services: Towards Your Next Generation IT Uwe Lambrette - EMEAR DC & Cloud Services Director Kadir Kaya EMEAR DC & Cloud Services Sales Manager Enterprise Cloud Today: Hybrid Cloud Adoption IT Departments
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationDigital Transformation: Powered by Cloud. William Fellows Co-founder, VP Research
Digital Transformation: Powered by Cloud William Fellows Co-founder, VP Research 2 Agenda How are enterprises being disrupted? Technology is an accelerant What s in it for me? Securing your future 3 Agenda
More informationSMARTPHONE MARKETS AND TECHNOLOGIES
SMARTPHONE MARKETS AND TECHNOLOGIES INDEX Index Table of Contents Table of Contents... i List of Figures... vi Executive summary...1 1 Mobile handsets and smartphones...3 1.1 Overview of handset segments...3
More informationSecuring the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA
Securing the cloud ISACA Korea Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA What is cloud computing? Source: Wikipedia 2 What is cloud computing A model for enabling:- convenient on-demand network
More informationComputing as a Service
Cloud Computing? Dipl. Ing. Abdelnasser Abdelhadi Islamic University Gaza Department of Computer Engineering April 2010 Computing as a Service Business Processes Collaboration Industry Applications Software
More informationTelecom Cloud Market Research Report- Global Forecast 2022
Report Information More information from: https://www.marketresearchfuture.com/reports/2027 Telecom Cloud Market Research Report- Global Forecast 2022 Report / Search Code: MRFR/ICT/1495-HCRR Publish Date:
More informationIn this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,
In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided
More information2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud
Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google
More informationCloud Builders. Billy Cox. Director Cloud Strategy Software and Services Group
Cloud Builders Billy Cox Director Cloud Strategy Software and Services Group From Vision to Action IT & Service Providers Products & Technologies Intel Cloud Builders Define and Prioritize IT Requirements
More informationInter-cloud computing: Use cases and requirements lessons learned 3.11
Inter-cloud computing: Use cases and requirements lessons learned 3.11 Oct 12, 2011 Global Inter-Cloud Technology Forum (GICTF) Institute of Information Security (IISEC) Atsuhiro Goto goto@iisec.ac.jp
More informationMOBILE LOCATION-BASED SERVICES
MOBILE LOCATION-BASED SERVICES INDEX Index Table of Contents Table of Contents... i List of Figures... vi Executive summary...1 1 Introduction to location-based services...3 1.1 Definition of mobile location-based
More informationOpen Networking Summit 2013
Open Networking Summit 2013 1 Welcome to Tutorial on SDN Market Opportunities 2 Senior Director of Market Development, Ciena Responsible for SDN Marketing at Ciena Involved in SDN for a few years Chair
More informationIntroduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing. Junfeng ZHAO
Introduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing Junfeng ZHAO 2011.3.23 Agenda Introduction of ISO/IEC JTC1 /SC 38 Introduction of ISO/IEC JTC1 /SC 38 SG1 Introduction of On-going
More informationLeveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group
Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline
More informationInternet of Things Security standards
Internet of Things Security standards Vangelis Gazis (vangelis.gazis@huawei.com) Chief Architect Security Internet of Things (IoT) Security Solution Planning & Architecture Design (SPD) Security standards
More informationCloud in Europe Markets, Players, Trends
Cloud in Europe Markets, Players, Trends Cloud Independence Day Paris, 7 July 2016 Karsten Leclerque PAC a CXP Group Company Cloud: from IT transformation to digital disruption Internet of Things Connected
More informationEvolution of Inter-Cloud Computing to Handle Big Data. Tomonori Aoyama. Chair of GICTF Keio University
5 th China Cloud Computing Conference 2013 Evolution of Inter-Cloud Computing to Handle Big Data June 7, 2013 Tomonori Aoyama Chair of GICTF Keio University What is Inter-cloud? Inter-cloud computing allows
More informationBuilding Trust in the Era of Cloud Computing
Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.
More informationGerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved
ETSITC TC LI STANDARDS OVERVIEW Gerald McQuaid, Chairman ETSI TC LI ETSI 2014. All rights reserved 9 th ETSI Security Workshop, 15 16 January 2014 Lawful Interception (LI) & Data Retention (DR) Delivery
More informationKroll Ontrack VMware Forum. Survey and Report
Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationCloud & Virtualization Technologies
Cloud & Virtualization Technologies December 2018 John Blackwood, CIS Faculty Where to begin? Technology at the heart of every company Most companies will need some type of cloudbased solution The Cloud
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationCTO MEETING GENEVA COMMUNIQUÉ
CTO MEETING GENEVA COMMUNIQUÉ 25 October 2011 Geneva, Switzerland Twenty ICT industry leaders and the senior management of the ITU Telecommunication Standardization Sector (ITU-T) met for the third annual
More informationBT Innovate. Service Oriented Networks. John Wittgreffe, ICT Chief Researcher
BT Innovate Oriented Networks John Wittgreffe, ICT Chief Researcher 1 Agenda Oriented Networks Overview, John Wittgreffe BT SON Application Development Environments, Sean Moore, Avaya SON Security Gateways,
More informationThe SDN Revolution: Transforming Next Generation Carrier Networks
The SDN Revolution: Transforming Next Generation Carrier Networks Rick Bauer, Managing Director Open Networking Foundation Rick.bauer@opennetworking.org Overview An Introduction to Software Defined Networking
More informationGranted: The Cloud comes with security and continuity...
Granted: The Cloud comes with security and continuity... or, does it? Bogac Ozgen, MSc GyroFalco Ltd. http://www.gyrofalco.com Questions & Answers Do we still need security and continuity? YES Should I
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationSIP Based IP PBX: Market Shares, Strategies, and Forecasts, 2017 to 2023
SIP Based IP PBX: Market Shares, Strategies, and Forecasts, 2017 to 2023 SIP Based IP PBX: Executive Summary Table of Contents The study is designed to give a comprehensive overview of the SIP Based IP
More informationOctober 25-27, 2017 Hilton Prague, Prague, Czech Republic Sponsorship Prospectus
October 25-27, 2017 Hilton Prague, Prague, Czech Republic 2017 Sponsorship Prospectus KVM Forum is an annual event that presents a rare opportunity for developers and users to meet, discuss the state of
More informationPrivacy hacking & Data Theft
Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud
More informationCOMPLIANCE IN THE CLOUD
COMPLIANCE IN THE CLOUD 3:45-4:30PM Scott Edwards, President, Summit 7 Dave Harris Society for International Affairs COMPLIANCE IN THE CLOUD Scott Edwards scott.edwards@summit7systems.com 256-541-9638
More informationTHE GLOBAL ENTERPRISE MOBILITY MARKET
THE GLOBAL ENTERPRISE MOBILITY MARKET IFT119A September 2015 Natraj Pandal Project Analyst ISBN: 1-62296-161-7 BCC Research 49 Walnut Park, Building 2 Wellesley, MA 02481 USA 866-285-7215 (toll-free within
More informationTopics II SaaS 2.0 OaSe*: OpenCms as a Service Cloud Sites SaaS 3.0 Google Apps (Gmail, Google Docs) Cloud Assessment Services Cloudify: Cloud Applica
Topics I CaMuS Cloud aware Content Management Framework OpenCAMP Open Cloud Application Management Platform AppScale Cloud Foundry OpenShift Open Cloud Operating Systems Apache CloudStack Eucalyptus OpenNebula
More informationCLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department
1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud
More information7 th ETSI Security Workshop
7 th ETSI Security Workshop EVENT AGENDA 18 19 January 2012 Sophia Antipolis http://www.etsi.org/securityworkshop DAY 1 AGENDA 18 th January 2012 SESSION 1: INTRODUCTION and KEYNOTE Session Chair: Charles
More informationContents. Contents (ix) Chapter 1 EVOLUTION OF CLOUD COMPUTING. Chapter 2 INTRODUCTION TO CLOUD COMPUTING. (ix)
(ix) Preface... (v) Acknowledgment... (vii) Abbreviations... (xvii) Chapter 1 EVOLUTION OF CLOUD COMPUTING 1.1 Chapter Overview... 1 1.2 Distributed System... 1 1.2.1 Examples of Distributed Systems...
More informationVMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment
VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES
More informationEffects of. regulatory asymmetries. in the Internet Value chain. Portada Proyectable. Titulo arial regular 22 pt.
Effects of Portada Proyectable. Titulo arial regular 22 pt. regulatory asymmetries Arial 16 pt para generar los subtítulos de máximo 3 líneas. in the Internet Value chain Telefónica S.A 27.03.2012 01 Introduction
More informationDMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel
DMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel Corporation July 26, 2017 Executive Summary WHO WHAT WHY
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationTowards 5G NR Commercialization
Towards 5G NR Commercialization Accelerating 5G NR for Enhanced Mobile Broadband May 25 2017 5G NR will deliver new levels of capability and efficiency For enhanced mobile broadband and beyond Multi-Gigabit
More informationBUSINESS CONTINUITY MANAGEMENT
BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory
More informationSTANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL?
ETSI SUMMIT Releasing the Flow Data Protection and Privacy in a Data-Driven Economy 19 April 2018 STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL? Presented by
More informationState of US Mobile Payments (NFC)
State of US Mobile Payments (NFC) (NFC State of the Industry Panel) Chandra Srivastava Business Leader, Visa SCA Mobile & NFC Council 2013 Payments Summit February 6, 2013 Draft - For Discussion Only 1
More informationProgramowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając
Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared
More informationSecuring Data in the Cloud: Point of View
Securing Data in the Cloud: Point of View Presentation by Infosys Limited www.infosys.com Agenda Data Security challenges & changing compliance requirements Approach to address Cloud Data Security requirements
More informationModernising the public sector through the cloud
Modernising the public sector through the cloud Alison Gillwald (PhD) & Mpho Moyo Executive Director: Research ICT Africa RIA Associate Adjunct Professor: University of Cape Town RIA Workshop RANICTP2
More informationA Holistic View of Telco Clouds
A Holistic View of Telco Clouds Cloud Computing in the Telecom environment, bridging the gap Miyazaki, 4 March 2012 (A workshop in conjunction with World Telecom Congress 2012) Authors: Lóránt Németh,
More informationHow technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011
How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized
More informationGreen IT Strategies and Practices for a Sustainable Europe
CeBIT Green IT 2010 Green IT Strategies and Practices for a Sustainable Europe Dr. Colette Maloney Head of Unit ICT for Sustainable Growth European Commission Information Society and Media Directorate-General
More informationCloud Computing Briefing Presentation. DANU
Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities
More informationCloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing.
Cloud Computing By: Muhammad Naseem Assistant Professor Department of Computer Engineering, Sir Syed University of Engineering & Technology, Web: http://sites.google.com/site/muhammadnaseem105 Email: mnaseem105@yahoo.com
More informationETSI LI Standards Overview
http://eustandards.in/ ETSI LI Standards Overview Alex Leadbeater - Chairman 3GPP SA3LI What is LI/DR/DD Lawful Interception (LI) is the real-time capture of a Target s use of communications (including
More informationIntroduction to Global Inter-Cloud Technology Forum (GICTF) and its Roadmaps
Introduction to Global Inter-Cloud Technology Forum () and its Roadmaps Dec. 10, 2009 Hiroshi Sakai, secretariat (NTT Information Sharing Platform Laboratories) 1 : A technology forum for the Inter-cloud
More informationUnified Communication Comparison Guide
Unified Communication Comparison Guide Introduction Unified Communications (UC) is a useful solution for busy people to collaborate more effectively both within and outside their organizations. This guide
More informationCLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa
CLOUD FORENSICS : AN OVERVIEW Kumiko Ogawa What is Cloud Forensics Forensic Science - Application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system.
More informationDirective on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationSeON GAP analysis. Dr. Parag Pruthi - Chair. Dr. Ashutosh Dutta Vice Chair. Date: December 14, 2010 Copyright 2010 GISFI. All Rights Reserved.
SeON GAP analysis Dr. Parag Pruthi - Chair NIKSUN Dr. Ashutosh Dutta Vice Chair NIKSUN Date: December 14, 2010 Copyright 2010 GISFI. All Rights Reserved. Outline ATIS SON Work-plan Gap Analysis with ATIS
More informationOpenStack Seminar Disruption, Consolidation and Growth. Woodside Capital Partners
OpenStack Seminar Disruption, Consolidation and Growth Woodside Capital Partners December 2, 2014 AGENDA I. Evolution of Enterprise IT II. III. IV. Cloud Market Opportunity Cloud Market Landscape OpenStack
More informationSMART MANUFACTURING: TECHNOLOGIES AND GLOBAL MARKETS
SMART MANUFACTURING: TECHNOLOGIES AND GLOBAL MARKETS IFT126A June 2016 Nathalie Granato Project Analyst ISBN: 1-62296-321-0 BCC Research 49 Walnut Park, Building 2 Wellesley, MA 02481 USA 866-285-7215
More informationETSI SR V2.0.0 ( )
SR 003 392 V2.0.0 (2015-11) SPECIAL REPORT Cloud Computing Standards Maturity Assessment A new snapshot of Cloud Computing Standards Analysis, conclusions and recommendations from Cloud Standards Coordination
More informationBuilding a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationDr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt
Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?
More informationWhere is the EU in cloud security certification?: Main findings
WE CAN DO SO MUCH TOGETHER Where is the EU in cloud security certification?: Main findings Certification schemes for cloud computing SMART 2016 / 0029 Leire Orue-Echevarria TECNALIA December 11 th, 2017
More informationRichard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel
Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationForecast: sizing the software-defined networking market
Forecast: sizing the software-defined networking market By Lee Doyle February 7, 2013 Cloud TABLE OF CONTENTS Introduction: sizing the SDN market 3 Defining the SDN taxonomy 4 SDN vendors and products
More informationCloud ecosystem and the role of cloud interconnect
Cloud ecosystem and the role of interconnect Data center interconnect for the era Strategic White Paper Data center interconnect (DCI) solutions are used to link and transport traffic between. Although
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationCHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS
CHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS CLOUD SERVICE MODELS The Cloud Service Models can be categorized into three main categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service
More informationCloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA
Cloud Computing: A European Perspective Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Overview Cloud Universe Definitions Cloud Risks in Europe Governance, Risk and Compliance
More informationNetwork and Information Security Directive
Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information
More informationWireless Communications Initiative
Wireless Communications Initiative Launched in 2010 Advocate in the Local Jurisdictions Provide a strong regional voice speaking to the competitive and economic implications of a robust wireless infrastructure.
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationCLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to
CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.
More information