The Next Generation of Cloud Security. Joe Chan Vice Chairman Programs & Research Cloud Security Alliance Hong Kong & Macau Chapter

Size: px
Start display at page:

Download "The Next Generation of Cloud Security. Joe Chan Vice Chairman Programs & Research Cloud Security Alliance Hong Kong & Macau Chapter"

Transcription

1

2 The Next Generation of Cloud Security Joe Chan Vice Chairman Programs & Research Cloud Security Alliance Hong Kong & Macau Chapter

3 About the Cloud Security Alliance Global, not-for-profit organization Building security best practices for next generation IT Research and Educational Programs Cloud Provider Certification CSA STAR User Certification - CCSK The globally authoritative source for Trust in the Cloud To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.

4 Today s Cloud Security Pain Points Too many regulations & standards Integrated tenant/provider security architecture Visibility/transparency between provider & tenant Lack understanding of cloud disruption of security & educated staff CSA is focused on the solutions

5 IaaS/PaaS Current State Phenomenal Growth Amazon AWS 55% YoY, $11B+ business Public Cloud 44% YoY (Cisco) Private Cloud 17% YoY (Cisco) Most heavily used IaaS services: virtual machine computing & storage Major IaaS players tend to be PaaS leaders Enterprise Cloud First policy common

6 Cloud s upside down pyramid SaaS PaaS IaaS

7 Key IaaS/PaaS Trends Public cloud surpassing private cloud Serverless computing radically changing Containers Microservices Microsegmentation, Software-defined Architecture DevOps & DevSecOps changing how security implemented Born in the cloud security companies High growth expected to continue

8

9 The Man/Machine Divide Thousands of computers per human We are in here currently World Population Internet connected devices

10 Information Technology of the Future Cloud computing is the back end Internet of Things is the endpoint Compute is Everywhere You won t know where Anything is Applications, topologies, security configurations in constant state of change

11 Technology to create Information Security Scalability Self Driving Information Security People Soon Now People Other stuff Automation AI/Machine learning Continuous Analytics Software defined everything Standards Trust marks Inherited security Blockchain Quantum etc plus the technology we already depend on

12 Emerging Trends We Are Evaluating Blockchain Containers, micro services Internet of Things DevSecOps: DevOps applied to security Analytics Autonomous computing Artificial Intelligence Quantum-Safe Computing

13 hat about Blockchain? Distributed ledgers of digitally signed transactions Huge focus in financial services Infosec implications Audit, control assertions IoT Web of Trust CPE credits Many more

14 Quantum Safe Computing NASA demonstrates quantum computer in December How long will our commercial cryptosystems be safe? CSA Quantum Safe Security:

15 Autonomic Computing Sensing, Adaptive, Self-Optimizing Monitor-Analyze-Plan-Execute architecture Moving humans to the periphery when they can t keep up

16 Artificial Intelligence

17 How do we evolve Information Security? Understand threats and issues of Cloud & IoT Next generation research Self Driving Information Security Automated, Smart, Transparent, Pervasive

18

19 Contact Join us to solve tomorrow s problems today info@cloudsecurityalliance.org

20 THANK YOU Joe Chan Vice Chairman Programs & Research Cloud Security Alliance Hong Kong & Macau Chapter

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance ABOUT THE BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT CLOUD

More information

CHALLENGES GOVERNANCE INTEGRATION SECURITY

CHALLENGES GOVERNANCE INTEGRATION SECURITY CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises

More information

Corporate Membership

Corporate Membership Corporate Membership Introduction Welcome to the Cloud Security Alliance. The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within

More information

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018 Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they

More information

Cloud & Virtualization Technologies

Cloud & Virtualization Technologies Cloud & Virtualization Technologies December 2018 John Blackwood, CIS Faculty Where to begin? Technology at the heart of every company Most companies will need some type of cloudbased solution The Cloud

More information

How to Apply a Zero-Trust Model to Cloud, Data and Identity

How to Apply a Zero-Trust Model to Cloud, Data and Identity SESSION ID: SPO3-T08 How to Apply a Zero-Trust Model to Cloud, Data and Identity Nico Popp Sr. VP of Information Protection Symantec Cloud Security Status Quo Today: CASB CASB Rich SaaS visibility (logs,

More information

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Healthcare and the Cloud:

Healthcare and the Cloud: Healthcare and the Cloud: Pros & Cons of Security and Privacy Information Systems Security Association (ISSA) Healthcare SIG and Cloud Security Alliance (CSA) March 16, 2017 1 Vince Campitelli Enterprise

More information

OpenStack Seminar Disruption, Consolidation and Growth. Woodside Capital Partners

OpenStack Seminar Disruption, Consolidation and Growth. Woodside Capital Partners OpenStack Seminar Disruption, Consolidation and Growth Woodside Capital Partners December 2, 2014 AGENDA I. Evolution of Enterprise IT II. III. IV. Cloud Market Opportunity Cloud Market Landscape OpenStack

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

Cloud Trend. Technology that dominate trends Cloud Computing in Central and Easter Europe - Past, Present and Bright Future Ahead

Cloud Trend. Technology that dominate trends Cloud Computing in Central and Easter Europe - Past, Present and Bright Future Ahead Cloud Trend Technology that dominate trends Cloud Computing in Central and Easter Europe - Past, Present and Bright Future Ahead Mirosław Burnejko Cloud Lead, IDC CEMA Athens Belgrade Bucharest Budapest

More information

Tripwire State of Container Security Report

Tripwire State of Container Security Report RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams

More information

CCSK Research Sponsorship

CCSK Research Sponsorship CCSK Research Sponsorship Overview The industry s first user certification program for secure cloud computing, the Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range

More information

VMworld 2018 Call for Papers

VMworld 2018 Call for Papers VMworld 2018 Call for Papers Submission Template Session Information *Which VMworld event are you submitting for? - US - Both events - Europe *Session Title A compelling title that clearly and concisely

More information

CLOUD COMPUTING PRIMER FOR EXECUTIVES

CLOUD COMPUTING PRIMER FOR EXECUTIVES CLOUD COMPUTING PRIMER FOR EXECUTIVES Cloud Computing Who Cares? Enables New products, services, business models (digital) Faster growth (agility) Better efficiency (not necessarily cheaper) Requires different

More information

Cloud Services. Infrastructure-as-a-Service

Cloud Services. Infrastructure-as-a-Service Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability

More information

Security as a Service (Implementation Guides) Research Sponsorship

Security as a Service (Implementation Guides) Research Sponsorship Security as a Service (Implementation Guides) Research Sponsorship Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as

More information

Application Networking Trends

Application Networking Trends HIGHLIGHTS OF ASN SURVEY RESULTS n The Futuriom Applications Specific Networking (ASN) Survey collected detailed feedback from 2 enterprise technology end users on the topic of networking cloud applications.

More information

Using Workload Automation to Optimize Hybrid Cloud Estates

Using Workload Automation to Optimize Hybrid Cloud Estates BRKPAR-4121 Using Workload Automation to Optimize Hybrid Cloud Estates Ben Nye Using Workload Automation to Optimize Hybrid Cloud Estates Ben Nye CEO Key Drivers Digital Transformation Proliferation of

More information

Choosing a Secure Cloud Service Provider

Choosing a Secure Cloud Service Provider Choosing a Secure Cloud Service Provider Dr. Ricci IEONG, CISSP, CISA, CISM, CCSK, CCSP, CEH,GPEN, GIAC Advisory Board, ISSAP, ISSMP, F.ISFS Vice President Professional Development Cloud Security Alliance

More information

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC Cloud Connections SEE Partner Summit 2015 Janos Strausz Product Sales Specialist, DC 75% of Businesses To be Digital in 5 years 1 81% 80% 81% 80% Mobile Technologies Mobile for Technologies Customer for

More information

Cloud Security Alliance Quantum-safe Security Working Group

Cloud Security Alliance Quantum-safe Security Working Group Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security

More information

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment

More information

Managing SaaS risks for cloud customers

Managing SaaS risks for cloud customers Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost

More information

CLOUD ARCHITECT Certification. Cloud Architect

CLOUD ARCHITECT Certification. Cloud Architect CLOUD ARCHITECT Certification Cloud Architect The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,

More information

Evolving IoT with Smart Objects

Evolving IoT with Smart Objects Evolving IoT with Smart Objects John Soldatos (jsol@ait.gr) Associate Professor Athens Information Technology isprint Workshop, Brussels, September 19th, 2017 Monolithic IoT applications (2005-2010) IoT

More information

State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks State of Office 365 Adoption & Risk A Dive into the Data Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks Q4 2016 Office 365 Usage and Risk Report Brandon Cook, Skyhigh

More information

Implementing and maintaining a DevSecOps approach in the cloud George Gerchow - VP of Security &

Implementing and maintaining a DevSecOps approach in the cloud George Gerchow - VP of Security & Implementing and maintaining a DevSecOps approach in the cloud George Gerchow - VP of Security & Compliance @sumologic Agenda The Sumo Cloud DevSecOps = Baking Security into your DNA Sumo Logic Security

More information

Cloud - the new World Economy Avner Algom, CEO IGTCloud

Cloud - the new World Economy Avner Algom, CEO IGTCloud Cloud - the new World Economy Avner Algom, CEO IGTCloud About Us Israeli Cloud Organization +5,400 Members Network with Partners, Customers, Investors and Potential Employees Learn from each other about

More information

EY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services

EY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services EY Norwegian Cloud Maturity Survey 2019 Current and planned adoption of cloud services Contents 01 Cloud maturity 4 02 Drivers and challenges 6 03 Current usage 10 04 Future plans 16 05 About the survey

More information

Custom hosting solutions orchastrated for your needs.

Custom hosting solutions orchastrated for your needs. Custom hosting solutions orchastrated for your needs. Cloud Hosting IaaS Colocation DRaaS & Backup Hosting AWS Monitoring PaaS/CaaS (for Developers) Why Customers Choose Us Whether you re just starting

More information

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management CONTENTS INTRODUCTION 1 SECTION 1: MULTI-CLOUD COVERAGE 2 SECTION 2: MULTI-CLOUD VISIBILITY

More information

2018 THALES DATA THREAT REPORT

2018 THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security GLOBAL EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K. GERMANY KOREA

More information

Cloud Capacity Specialist Certification

Cloud Capacity Specialist Certification Cloud Capacity Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture, security, governance

More information

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability Dubrovnik, Croatia, South East Europe 20-22 May, 2013 IoT, Cloud and Managed Services Accelerating the vision to reality to profitability M. Abdul Munim Cloud and Managed Services Program Lead EMEAR Region

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, John Burke Principal Research Analyst & CIO

Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, John Burke Principal Research Analyst & CIO Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, 2016 John Burke Principal Research Analyst & CIO john@nemertes Agenda ± Introductions ± SDN Adoption ± Cloud Management Adoption

More information

Cloud Computing Foundation Certification Training - Brochure

Cloud Computing Foundation Certification Training - Brochure Cloud Computing Foundation Certification Training - Brochure Manage cloud services and utilize it to power your business Course Name : Cloud Computing Foundation Version : INVL_CCF_BR_02_1.3 Course ID

More information

Building Trust in the Era of Cloud Computing

Building Trust in the Era of Cloud Computing Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.

More information

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS Introduction Load balancing isn t just about managing traffic anymore. As your infrastructure expands to include applications in

More information

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Module Day Topic. 1 Definition of Cloud Computing and its Basics Module Day Topic 1 Definition of Cloud Computing and its Basics 1 2 3 1. How does cloud computing provides on-demand functionality? 2. What is the difference between scalability and elasticity? 3. What

More information

Danish Cloud Maturity Survey 2018

Danish Cloud Maturity Survey 2018 Danish Cloud Maturity Survey 2018 Current and planned adoption of cloud services Danish Cloud Maturity Survey 2018 1 Early days for cloud adoption with concerns for security and expertise, and complexity

More information

2018 THALES DATA THREAT REPORT

2018 THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. HEALTHCARE EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K.

More information

Security Models for Cloud

Security Models for Cloud Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer

More information

Everything You Need to Know About Cloud Security (and then some)

Everything You Need to Know About Cloud Security (and then some) Everything You Need to Know About Cloud Security (and then some) Mike Rothman Securosis, L.L.C. About Securosis A long time ago... You know, 2008 In a galaxy far far away You know, the Internet (Where

More information

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

Cloud & CyberSecurity Services

Cloud & CyberSecurity Services Cloud & CyberSecurity Services Franck Greverie Cloud & CyberSecurity, Group Leader, EVP Sept 12th Cloud & CyberSecurity services A huge business opportunity for Capgemini Key enablers for the digital enterprise

More information

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program Agenda and Objectives The Digital Transformation (Dx) Problem NISTCSF.COM Cybersecurity Curriculum

More information

The Business of Security in the Cloud

The Business of Security in the Cloud The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing

More information

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security

More information

Cloud Computing Overview. The Business and Technology Impact. October 2013

Cloud Computing Overview. The Business and Technology Impact. October 2013 Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility

More information

Atos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC

Atos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Atos Canopy Orchestrated Hybrid Cloud Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Cloud Animation Video 02-03-2017 Addressing Customer Challenges in all verticals With

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Expand Your Cyber Expertise. Secure Your Future.

Expand Your Cyber Expertise. Secure Your Future. Expand Your Cyber Expertise. Secure Your Future. CSX 2018 Europe will help you stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around

More information

Cloud in Europe Markets, Players, Trends

Cloud in Europe Markets, Players, Trends Cloud in Europe Markets, Players, Trends Cloud Independence Day Paris, 7 July 2016 Karsten Leclerque PAC a CXP Group Company Cloud: from IT transformation to digital disruption Internet of Things Connected

More information

Enterprise & Cloud Security

Enterprise & Cloud Security Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013

More information

The Hyperconvergence Handbook: An innovator s guide to achieving the hyperpossible

The Hyperconvergence Handbook: An innovator s guide to achieving the hyperpossible The Hyperconvergence Handbook: An innovator s guide to achieving the hyperpossible Table of contents 03 04 07 11 14 Introduction Chapter 1 Navigating the evolving IT landscape Chapter 2 Enabling an innovative

More information

Cisco Container Platform

Cisco Container Platform Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click

More information

The Oracle Trust Fabric Securing the Cloud Journey

The Oracle Trust Fabric Securing the Cloud Journey The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline

More information

CLOUD GOVERNANCE SPECIALIST Certification

CLOUD GOVERNANCE SPECIALIST Certification CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,

More information

CLOUD PROFESSIONAL Certification

CLOUD PROFESSIONAL Certification CLOUD PROFESSIONAL Certification The Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture, security, governance

More information

Morgan Independent Software Vendor Lead

Morgan Independent Software Vendor Lead Morgan Webb @morgan_msft Independent Software Vendor Lead Digital transformation Hybrid Cloud Platform Choice Global: Hyper-scale, globally connected cloud services deployed from regional Microsoft datacenters.

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

Next Generation Data Center : Future Trends and Technologies

Next Generation Data Center : Future Trends and Technologies Next Generation Data Center : Future Trends and Technologies November 18 th 2016 Rajender Singh Bhandari Director Technology and Solutions Group NetApp India 1 Agenda 1)About NetApp 2)Next Generation Data

More information

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY DevOps Anti-Patterns Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! 31 Anti-Pattern: Throw it Over the Wall Development Operations 32 Anti-Pattern: DevOps Team Silo

More information

"Home to the Cloud" e-shelter Marktplatz für eine Hybride und Multi-Cloud Welt Toan Nguyen, e-shelter

Home to the Cloud e-shelter Marktplatz für eine Hybride und Multi-Cloud Welt Toan Nguyen, e-shelter "Home to the Cloud" e-shelter Marktplatz für eine Hybride und Multi-Cloud Welt Toan Nguyen, e-shelter 1 The e-shelter quality promise we leverage our powerful data center platform to deliver top-class

More information

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect.

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect. CLOUD COMPUTING Rajesh Kumar DevOps Architect @RajeshKumarIN www.rajeshkumar.xyz www.scmgalaxy.com 1 Session Objectives This session will help you to: Introduction to Cloud Computing Cloud Computing Architecture

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Encounter LATP-ETPs 19 October 2015, Lisbon, Portugal Ernestina Menasalvas, Universidad Politécnica de Madrid

Encounter LATP-ETPs 19 October 2015, Lisbon, Portugal Ernestina Menasalvas, Universidad Politécnica de Madrid Encounter LATP-ETPs 19 October 2015, Lisbon, Portugal Ernestina Menasalvas, Universidad Politécnica de Madrid NESSI is an H2020 ETP the Commission's Horizon 2020 proposal for an integrated research and

More information

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments The New Normal Unique Challenges When Monitoring Hybrid Cloud Environments The Evolving Cybersecurity Landscape Every day, the cybersecurity landscape is expanding around us. Each new device connected

More information

WHITE PAPER. Five AWS Practices. Enhancing Cloud Security through Better Visibility

WHITE PAPER. Five AWS Practices. Enhancing Cloud Security through Better Visibility WHITE PAPER Five AWS Practices Enhancing Cloud Security through Better Visibility Continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and

More information

EU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017

EU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017 EU Cloud Computing Policy Luis C. Busquets Pérez 26 September 2017 The digital revolution is built on data Most economic activity will depend on data within a decade Potential of the data-driven economy

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Managing Your Privileged Identities: The Choke Point of Advanced Attacks Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why

More information

EY Norwegian Cloud Maturity Survey 2018

EY Norwegian Cloud Maturity Survey 2018 EY Norwegian Cloud Maturity Survey 2018 Current and planned adoption of cloud services EY Norwegian Cloud Maturity Survey 2018 1 It is still early days for cloud adoption in Norway, and the complexity

More information

Flash in a Hybrid Cloud World. How Cloud Shift will affect flash in the Data Center Steve Knipple: Cloud Shift Advisors

Flash in a Hybrid Cloud World. How Cloud Shift will affect flash in the Data Center Steve Knipple: Cloud Shift Advisors Flash in a Hybrid Cloud World How Cloud Shift will affect flash in the Data Center Steve Knipple: Cloud Shift Advisors Abstract Study the Intersection of 2 Major Trends The maturation of FLASH products

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

CLOUD WORKLOAD SECURITY

CLOUD WORKLOAD SECURITY SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Learning From Real Practice of Providing Highly Available Hybrid Cloud Service with OpenStack Neutron

Learning From Real Practice of Providing Highly Available Hybrid Cloud Service with OpenStack Neutron Learning From Real Practice of Providing Highly Available Hybrid Cloud Service with OpenStack Neutron Kazuhiro MIYASHITA FUJITSU LIMITED PLATFORM SOFTWARE BUSINESS UNIT PLATFORM SOFTWARE DIV.I DEVELOPMENT

More information

A Welcome to Federated Identity Nate Klingenstein, Internet2, USA. Prepared for the Matsuyama University, December 2013

A Welcome to Federated Identity Nate Klingenstein, Internet2, USA. Prepared for the Matsuyama University, December 2013 A Welcome to Federated Identity Nate Klingenstein, Internet2, USA Prepared for the Matsuyama University, December 2013 www.incommon.org Welcome to the presentation and thanks to our hosts What is Federated

More information

Network Security Protection Alternatives for the Cloud

Network Security Protection Alternatives for the Cloud A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances

More information

Research Challenges in Cloud Computing

Research Challenges in Cloud Computing Research Challenges in Cloud Computing November 7th, 2016 Cloud Computing Consultation Orange Labs 1 Orange Restricted next big things for the digital future Big Data Internet of Things Cloud g g g 21

More information

The Intersection of Hype & Performance

The Intersection of Hype & Performance The Intersection of Hype & Performance Singapore 2018 The Intersection of Hype & Performance Singapore 2018 INTRODUCTION KEY FINDINGS RECOMMENDATIONS CONCLUSION DEMOGRAPHICS FULL SURVEY RESULTS 3 4 7 10

More information

CLOUD COMPUTING. The Old Ways Are New Again. Jeff Rowland, Vice President, USAA IT/Security Audit Services. Public Information

CLOUD COMPUTING. The Old Ways Are New Again. Jeff Rowland, Vice President, USAA IT/Security Audit Services. Public Information CLOUD COMPUTING The Old Ways Are New Again Jeff Rowland, Vice President, USAA IT/Security Audit Services Public Information Who We Are Our Mission The mission of the association is to facilitate the financial

More information

LFS170x - Blockchain: Understanding Its Uses and Implications

LFS170x - Blockchain: Understanding Its Uses and Implications LFS170x - Blockchain: Understanding Its Uses and Implications Course Overview Blockchain technology is changing how business is executed. It s important to understand why blockchain is different and how

More information

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist CLOUD SECURITY SPECIALIST Certification Cloud Security The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms,

More information