Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances)
|
|
- Joy Hodges
- 6 years ago
- Views:
Transcription
1 SESSION ID: CSV-F01 Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances) Aaron McKeown Lead Security Architect Xero
2 Fast or Secure Fast & Secure
3 Beautiful cloud-based accounting software Connecting people with the right numbers anytime, anywhere, on any device 1,450+ staff globally $474m raised in capital $202m sub revenue FY16 $1tr incoming and outgoing transactions in past 12 mths 450m incoming and outgoing transactions in past 12 mths All figures shown are in NZD 3
4 862,000+ Subscribers globally
5 Public Cloud Migration Supporting the next wave of growth Reducing our cost to serve Improving data protection Eliminating scheduled downtime Maintaining and improving security 5
6 Key Challenges Skills are scarce Automation is key Regional representation and recommendations Need to focus on visibility Application architecture has to change Third-party commercial models need to change 6
7 Challenge #1: Skills are scarce Challenge #1: Skills are scarce Make an initial investment in education Join industry groups and forums Selective engagement of contractors Promotion of industry wide cyber skills 7
8 Challenge #2: Regional representation Challenge #2: Regional representation and recommendations Build a strong relationship with AWS Reach out to your contacts Look at alternatives Build a communication path to remote organizations 8
9 Challenge #3: Application architecture changes Challenge #3: Application architecture has to change Work in cross-functional teams Deliver in short, frequent cycles Communicate quickly and effectively Build and deliver security as a service 9
10 Challenge #4: Automation is key Challenge #4: Automation is key Make automation a core principle Start with basic use of CloudFormation Use a code repository Build a Continuous Integration (CI) and Continuous Delivery (CD) system 10
11 Challenge #5: Focus on visibility Challenge #5: Need to focus on visibility CloudTrail is enabled by default for all accounts Track configuration drift Get the development teams invested Extended into a virtual team 11
12 Challenge #6: Third-party commercial models Challenge #6: Third-party commercial models need to change Do what we advise others to do, use the cloud Work with our technology partners and vendors Move from perpetual licenses, to core based licenses Address commercial and legal issues first 12
13 Key Principles Repeatable, automated build and management of security systems Accelerated pace of security innovation On-demand security infrastructure that works at any scale 13
14 Key Learnings Security by design - what s that? Communication is key Measure & Test, monitor everything Welcome to the cloud - Where s my span port? 14
15 Key Learnings: Security by design Build security into every layer Treat your infrastructure as code Iterate, iterate, iterate Security by design - what s that? Build security into the product lifecycle 15
16 Key Learnings: Communication is key Make everyone a spokesperson Evangelize and sell your service Communicate success (as well as failure) Communication is key Documentation is critical 16
17 Key Learnings: Measure everything How do you know what normal looks like? Continually track configuration drift Do a gap analysis Measure & test, monitor everything Perform internal and external testing 17
18 Key Learnings: Where s my span port? Change your way of thinking Expand your scope of responsibility It is a shared journey for all Welcome to the cloud - Where s my span port? Use cross-functional teams 18
19 The New Paradigm of Shared Responsibility Xero + Partner Xero Applications & Content Ecosystem Network Identity & Access Inventory Security Control & Config Data Encryption Security IN the Cloud AWS Foundation Services Compute Storage Database Networking Security OF the Cloud AWS Global Infrastructure Availability Zones Regions Edge Locations 19
20 Security as a Service VPN connectivity Host Based Security Proxy Services Security Operations and Consulting Services Web Application Security and Delivery Shared Key Management Services Secure Bastion Access 20
21 Multi-Factor Authentication The decision to utilize MFA was a core component of security design User awareness was initially an issue Some users refused to utilize the system Multiple MFA systems already in place Enable the MFA enhanced features 21
22 Configuration Drift Management Finding the needle in an automated and freedom-to-deploy haystack Used Netflix Security Monkey to track, monitor, and action key AWS resource changes Watchers configured across all AWS accounts Started as an internal Cloud Security tool Adoption was driven by the product teams Risk and compliance utilization for best practice review 22
23 Host Security Automation Next layer of defense at the host level Used to monitor, notify, and action instance-level configurations, vulnerabilities and integrity Automated roll-out and integration with all hosts Make use of the cloud Adopt elasticity and automation Accelerated pace of development 23
24 Apply What You Have Learned Today WEEK 1 MONTH 3 MONTH 6 Activate multi-factor authentication Enable CloudTrail Start your first automation! Define your principles Develop a security architecture Start to track your configuration drift Measure, test & monitor everything Build a culture of communication Automate more! 24
25 Aaron McKeown Lead Security Architect Xero
Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security
Adopting Modern Practices for Improved Cloud Security Cox Automotive - Enterprise Risk & Security 1 About Cox Automotive Cox Automotive is a leading provider of products and services that span the automotive
More informationCloudreach Data Center Migration Services
Cloudreach Data Center Migration Services High Velocity Migration to Leverage Full Benefits of the Cloud The Cloud is Inevitable Cloudreach believe it is not about if, but when enterprises move their IT
More informationSecurely Moving Data to the Cloud with Confidence and Customer Focus
SESSION ID: CSV-R10F Securely Moving Data to the Cloud with Confidence and Customer Focus Michele Iacovone Senior Vice President, Chief Information Security and Fraud Officer Intuit @mikiyako About Michele
More informationMinfy MS Workloads Use Case
Contents Scope... 3 About CUSTOMER... Error! Bookmark not defined. Use Case Description... 3 Technical Stack... 3 AWS Architecture... Error! Bookmark not defined. AWS Solution Overview... 4 Risk Identified
More informationGetting Started with AWS Security
Getting Started with AWS Security Tomas Clemente Sanchez Senior Consultant Security, Risk and Compliance September 21st 2017 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Move
More informationMinfy MS Workloads Use Case
Contents Scope... 3 About Customer... 3 Use Case Description... 3 Technical Stack... 3 AWS Solution... 4 Security... 4 Benefits... 5 Scope This document provides a detailed use case study on Hosting GSP
More informationDelivering Intent for Data Center Networking
INSDCT-2521 Delivering Intent for Data Center Networking Ish Limkakeng SVP Product Management, Data Center Networking Group Network Compute Storage Data Center INSDCT-2521 2018 Cisco and/or its affiliates.
More informationAmazon Web Services. For Government, Education, and Nonprofit Organizations
Amazon Web Services For Government, Education, and Nonprofit Organizations Max Peterson GM EMEA, LATAM and Global Contracts maxpete@amazon.co.uk +44 (0)7342 079563 2015, Amazon Web Services, Inc. or its
More informationDevOps Agility in the Evolving Cloud Services Landscape
DevOps Agility in the Evolving Cloud Services Landscape Kiran Chitturi CTO Architect, Sungard Availability Services @nkchitturi Kiran Chitturi Architect in the Office of the CTO Focus on DevOps and cloud
More informationMinfy-Vara Migration Use Case
Document Details Use Case Name Minfy Migration - Use Case01 First Draft 30 Jul 2018 Author Amrendra Kumar Reviewed By Pradeep Narayanaswamy Contents Scope... 4 About Customer... 4 Use Case Description...
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationTraining and Certification. Guide to Learning and Certification Paths
Training and Certification Guide to Learning and Certification Paths Home Contents Back Next Table of Contents ServiceNow Fundamentals Implementer Developer Fulfiller Training 3 Get Certified Become Indispensable
More informationTHE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD
OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings
More informationAWS Web Application Firewall. Darren Weiner Cloud Architect/Engineer
AWS Web Application Firewall Darren Weiner Cloud Architect/Engineer My journey 20 years in IT 8 years in the cloud Rode the.com wave Web Admin DBA IT Director Cloud Consulting Today s Journey Adoption
More informationin Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM
Delivering the digital enterprise The five stages of infrastructure evolution Ralf Salzmann Human Centric Innovation in Action Manager OEM Sales @Brocade Agenda BRCD Company details What does digital mean
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationTHE RISE OF THE MODERN DATA CENTER
THE RISE OF THE MODERN DATA CENTER 1 Companies have invested heavily in this enterprise-applicationrelated infrastructure, peaking in recent years at around 2.7 trillion US dollars. THE TIME FOR TRANSFORMATION
More informationSIMPLIFY, AUTOMATE & TRANSFORM YOUR BUSINESS
SIMPLIFY, AUTOMATE & TRANSFORM YOUR BUSINESS June 2012 WHAT S HAPPENING IN YOUR WORLD 2 YOUR CHALLENGES TODAY Business Challenges Operational Challenges Financial Challenges Speed to Deliver SLAs & High
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Efficient, Agile and Extensible Software-Defined Networks and Security WHITE PAPER Overview Organizations worldwide have gained significant efficiency and
More informationService Provider Consulting
From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected
More informationCloud solution consultant
Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Job level 18 Job family Professional services Date 23/10/2017 Reports to Cloud services group
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationMicrosoft 365 Security & Compliance For Small- and Mid-Sized Businesses
Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses The reality for your business today, and the importance of proactive security Cyberthreats are becoming more of a reality each day.
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationCloud solution consultant
Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationVMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017
: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6
More informationCloud Security: Constant Innovation
Cloud Security: Constant Innovation without constant capital expenditure Presented by Richard Brown Wednesday 19 July 2017 CIO Summit Gold Coast, Australia How do we combat evolving threats? Traditional
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationWeaving Security into Every Application
Weaving Security into Every Application Paul Fox AVP Technology AT&T 2018 TM Forum 1 Cyber Security Accelerating Threat Telecom Breaches 300,000 Number of complaints filed with the FBI Internet Crime Complaint
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCYBER SECURITY WHITEPAPER
CYBER SECURITY WHITEPAPER ABOUT GRIDSMART TECHNOLOGIES, INC. GRIDSMART Technologies, Inc. provides Simple, Flexible, and Transparent solutions for the traffic industry that collect and use data to make
More informationWindows 10 IoT Overview. Microsoft Corporation
Windows 10 IoT Overview Microsoft Corporation 25 $7.2 BILLION TRILLION Connected things will by 2020 be in use by 2020 worldwide market for IoT solutions IDC: Worldwide and Regional Internet of Things
More informationSecurity & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web
Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS
More informationBetter skilled workforce
Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style
More informationCisco ONE Enterprise Cloud Suite
Cisco ONE Enterprise Cloud Suite Pragmatic Progression to Cloud Automation Geoff Soon Today s Businesses Require Greater Agility Focus on increasing speed of business Customers expect on-demand service
More information10 Considerations for a Cloud Procurement. March 2017
10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationDELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS
DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS Building digital trust and cyber security resilience is no longer just an IT issue, it s a business mandate. Fusion brings a simplified approach to our client
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationLeading Investment Management Software Firm Slashes Infrastructure Costs, Maximizes Application Availability ATTENTION. ALWAYS.
Leading Investment Management Software Firm Slashes Infrastructure Costs, Maximizes Application Availability ATTENTION. ALWAYS. THE CUSTOMER Our customer develops specialized software solutions for global
More informationDesign Build Services - Service Description-v7
Design Build Services - Service Description Hyper-scale clouds, such as Microsoft s Azure platform, allow organizations to take advantage of flexible, cost-effective cloud solutions that have the power
More informationINTRO TO AWS: SECURITY
INTRO TO AWS: SECURITY Rob Whitmore Solutions Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Security is the foundation Familiar security model Validated by security experts
More informationArchiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention
Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.
More informationAWS Security. Stephen E. Schmidt, Directeur de la Sécurité
AWS Security Stephen E. Schmidt, Directeur de la Sécurité 2014 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express
More informationAWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services
AWS Webinar Navigating GDPR Compliance on AWS Christian Hesse Amazon Web Services What is the GDPR? What is the GDPR? The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection
More informationManaging Security While Driving Digital Transformation
Avivi Siman-Tov, Senior Product Manager AlgoSec Managing Security While Driving Digital Transformation Goals for today 01 02 03 Will my organization s applications be migrated to the cloud? Why or why
More informationDefensible Security DefSec 101
Defensible Security DefSec 101 Security Day November 2017 Information Security Branch Paul Falohun Senior Security Analyst Dan Lathigee Senior Project Manager Content 1 Introduction 2 DefSec for PSO 3
More informationAWS Well Architected Framework
AWS Well Architected Framework What We Will Cover The Well-Architected Framework Key Best Practices How to Get Started Resources Main Pillars Security Reliability Performance Efficiency Cost Optimization
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationLTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security
LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationSecurity & Compliance in the AWS Cloud. Amazon Web Services
Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any
More informationBest Practices to Transition to the Cloud. Five ways to improve IT agility and speed development by adopting a Cloud DevOps approach
Best Practices to Transition to the Cloud Five ways to improve IT agility and speed development by adopting a Cloud DevOps approach Benefiting from Cloud Computing Is Not Easy Seventy percent of IT resources
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationColocation Enabler for Hybrid and Multi Cloud Solutions. Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH
Colocation Enabler for Hybrid and Multi Cloud Solutions Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH 1 Disruption forces business transformation Who wants to be
More informationVMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018
VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding
More informationCisco Digital Network Architecture The Network Enables Digital Business. Rene Andersen Cisco DK
Cisco Digital Network Architecture The Network Enables Digital Business Rene Andersen Cisco DK IT Priorities for Digital Transformation Faster Innovation Slow IT processes Technology innovation speed Only
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationThe fast-track to NFV
The fast-track to NFV Five years from now, there will only be two kinds of telco: those that have put NFV at the heart of their network architecture and business model, and those that fail. The challenge
More informationManchester Metropolitan University Information Security Strategy
Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History
More informationWhat s New at AWS? looking at just a few new things for Enterprise. Philipp Behre, Enterprise Solutions Architect, Amazon Web Services
What s New at AWS? looking at just a few new things for Enterprise Philipp Behre, Enterprise Solutions Architect, Amazon Web Services 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
More informationMatrix IT work Copyright Do not remove source or Attribution from any graphic or portion of graphic
Cloud: your daily concerns Cost? Security? Compliance? People Process Product Virtualization to Cloud : Your challenging journey Hardware Software People 2,3M 1,6M Capex & opex costs for compute/nw/storage
More informationBest Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ
Best Practices for Cloud Security at Scale Phil Rodrigues Security Solutions Architect Web Services, ANZ www.cloudsec.com #CLOUDSEC Best Practices for Security at Scale Best of the Best tips for Security
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationLove Containers, Love Devops, Love Openshift, Where's my business case?
Love Containers, Love Devops, Love Openshift, Where's my business case? Helping you build your business case for Openshift. Graeme Colman, Keith Lynch, Daniel Oh Red Hat 2nd May 2017 What is this session
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More information10 QUESTIONS, 10 ANSWERS. Get to know VMware Cloud on AWS The Best-in-Class Hybrid Cloud Service
10 QUESTIONS, 10 ANSWERS Get to know VMware Cloud on AWS The Best-in-Class Hybrid Cloud Service GET TO KNOW VMWARE CLOUD ON AWS: THE BEST-IN-CLASS HYBRID CLOUD SERVICE IT leaders focused on finding ways
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationOSS for Digital Services From evolution to revolution
OSS for Digital Services From evolution to revolution Domenico Convertino WW OSS Leader HPE 2017 TM Forum 1 The world is changing, everything is becoming connected Technology will be embedded everywhere
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationProfessional Services for Cloud Management Solutions
Professional Services for Cloud Management Solutions Accelerating Your Cloud Management Capabilities CEOs need people both internal staff and thirdparty providers who can help them think through their
More informationCloud Security Strategy - Adapt to Changes with Security Automation -
SESSION ID: CMI-F03 Cloud Security Strategy - Adapt to Changes with Security Automation - Hayato Kiriyama Security Solutions Architect Amazon Web Services Japan K.K. @hkiriyam1 Agenda New Normal of Security
More informationThe Mobile World Introduction
TABLE OF CONTENTS The Mobile World 3 SMS for Courier & Postal Services - Introduction 7 SMS for Courier & Postal Services Outbound SMS 8 SMS for Courier & Postal Services Inbound SMS 10 Technical Overview
More informationGetting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption
Getting Hybrid IT Right A Softchoice Guide to Hybrid Cloud Adoption Your Path to an Effective Hybrid Cloud The hybrid cloud is on the radar for business and IT leaders everywhere. IDC estimates 1 that
More informationWhat It Takes to be a CISO in 2017
What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge
More informationBUILDING the VIRtUAL enterprise
BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,
More informationDelivering the Digital Institution
Delivering the Digital Institution All CHANGE Ability to embrace digital will decide the winners and the losers for the next decade Only 14% of education decision makers are completely confident they
More informationVMware Cloud on AWS. A Closer Look. Frank Denneman Senior Staff Architect Cloud Platform BU
VMware Cloud on AWS A Closer Look Frank Denneman Senior Staff Architect Cloud Platform BU Speed is the New Currency Cloud Computing We are in the 3 rd fundamental structural transition in the history of
More informationRED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect
RED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to Cloud Infrastructure CLOUD TYPES AND DEPLOYMENT
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationService provider GTM strategy session: New revenue opportunities with Veeam
Service provider GTM strategy session: New revenue opportunities with Veeam Jordan Jacobs Senior Director, Global Cloud Solutions Anthony Spiteri Global Technologist, Product Strategy Leah Troscianecki
More informationData Protection Everywhere. For the modern data center
Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright
More informationDigital Network Architecture
Digital Network Architecture Capturing the Digital Explosion Thomas Latzer, Cisco Digital Enterprise Definition Digital Enterprise: An organization or business that uses technology as a competitive advantage
More informationArcGIS in the Cloud. Andrew Sakowicz & Alec Walker
ArcGIS in the Cloud Andrew Sakowicz & Alec Walker Key Takeaways How to Identify Organizational Strategy & Priorities Esri s Cloud Offerings A Broad Spectrum Successfully Executing Your Strategy The Cloud
More informationInternet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin
Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP
More informationEBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS
EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks
More informationClosing the Hybrid Cloud Security Gap with Cavirin
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations
More informationService Delivery Platform
Solution Brief Service Delivery Platform Enabling the transition to high-value and more differentiated network services with new consumption models for deploying VNFs. Keeping Up With Cloud Expectations
More information