Security as a Service (Implementation Guides) Research Sponsorship

Similar documents
CCSK Research Sponsorship

Corporate Membership

Cloud Security Alliance Quantum-safe Security Working Group

Supporting the Cloud Transformation of Agencies across the Public Sector

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

The Business of Security in the Cloud

Government IT Modernization and the Adoption of Hybrid Cloud

Robert Brammer. Senior Advisor to the Internet2 CEO Internet2 NET+ Security Assessment Forum. 8 April 2014

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Accelerate Your Enterprise Private Cloud Initiative

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment

CenturyLink for Microsoft

Perfect Balance of Public and Private Cloud

Delivering Complex Enterprise Applications via Hybrid Clouds

Three Key Challenges Facing ISPs and Their Enterprise Clients

State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

Deliver Data Protection Services that Boost Revenues and Margins

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

5 Steps to Government IT Modernization

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

Cloud Services. Infrastructure-as-a-Service

IT Consulting and Implementation Services

K-12 CYBERSECURITY EDUCATION CONFERENCE

Day One Success for DevSecOps and Automation on Azure

SOC for cybersecurity

Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report

BRINGING CLARITY TO THE CLOUD

Building Trust in the Era of Cloud Computing

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Choosing the Right Cloud. ebook

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

The Impact of Privacy on HP s Customer Relationship Management Solution

Practical Guide to Cloud Computing Version 2. Read whitepaper at

We make hybrid cloud deliver the business outcomes you require

Enterprise & Cloud Security

New Zealand Government IBM Infrastructure as a Service

Accelerate Your Cloud Journey

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

Cisco Cloud Application Centric Infrastructure

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Service Provider Consulting

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security

CSP 2017 Network Virtualisation and Security Scott McKinnon

Better skilled workforce

Accelerating Cloud Adoption

When Computing Becomes Human: Automation, Innovation, and the Rise of the All-Powerful Service Provider

Optimising cloud security, trust and transparency

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

ISACA Enterprise. Solutions and Resources

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure

,000+ What is the BCI Corporate Partnership? What are the benefits of becoming a Corporate Partner? Levels of Partnership

Implementing Executive Order and Presidential Policy Directive 21

I D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management

How to ensure control and security when moving to SaaS/cloud applications

ConCert FAQ s Last revised December 2017

Data Governance Quick Start

Veritas Technology Ecosystem (VTE)

3-Part Guide to Developing a BYOD Strategy

Cloud First Policy General Directorate of Governance and Operations Version April 2017

Cloud First: Policy Not Aspiration. A techuk Paper April 2017

Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Mind your Business We manage your IT

PARTNER QUOTES. BlueWater Communications Group

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government

Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A)

Symantec Secure One Services Program Brief

Eucalyptus Overview The most widely deployed on-premise cloud computing platform

Annexure 08 (Profile of the Project Team)

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance

ISG Provider Lens TM

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

2016 SPONSORSHIP OPPORTUNITIES

10 Considerations for a Cloud Procurement. March 2017

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

VMworld 2015 Track Names and Descriptions

Modern Database Architectures Demand Modern Data Security Measures

I D C T E C H N O L O G Y S P O T L I G H T

INTELLIGENCE DRIVEN GRC FOR SECURITY

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Practical Guide to Hybrid Cloud Computing. Cloud-Computing.

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Sponsorship Opportunities with IIBA

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

The NIST Cybersecurity Framework

Copyright 2011 EMC Corporation. All rights reserved.

Security Models for Cloud

Embedded SIM Study. September 2015 update

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Next-Generation HCI: Fine- Tuned for New Ways of Working

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Run the business. Not the risks.

ACCENTURE & COMMVAULT ACCENTURE CLOUD INNOVATION CENTER

Progress Report National Information Assurance Partnership

ITC Vision for Campus IT: February 28, 2018

BUILDING the VIRtUAL enterprise

Drive Your Career Forward IIA Certifications and Qualifications

Transcription:

Security as a Service (Implementation Guides) Research Sponsorship

Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as a Service means, to categorize the different types of Security as a Service and to provide guidance to organizations on reasonable implementation practices. In October 2011 the work group published its first white paper titled "Defined Categories of Service. We are now ready to expand each category into a series of implementation guides that cover the defined categories of service outlined in the work group s first whitepaper. About the Cloud Security Alliance The Cloud Security Alliance is a not for profit, vendor neutral organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. CSA has grown tremendously since we publicly launched in April 2009, and we continue to set the pace as the industry leader in research and best practices for developing the trusted cloud ecosystem. 35,000 members worldwide, in over 60 chapters Not for profit organization registered as a 501(c)6 corporation with the US Internal Revenue Service Developed first comprehensive best practices for secure cloud computing, Security Guidance for Critical Areas of Focus for Cloud Computing (April 2009, updated December 2010 and October 2011) First and only user certification for cloud security, the CCSK (Certificate of Cloud Security Knowledge, September 2010) Tools for managing Governance, Risk and Compliance in the Cloud (GRC Stack) Registry of cloud provider security practices, the CSA STAR (Security, Trust & Assurance Registry, Q4 2011) Industry leading security practices, education and tools developed by 20 working groups Selection of CSA venue by US White House to announce the US Federal Cloud Strategy in 2011 Leadership in developing new security standards addressing cloud computing Trusted advisor to governments and Global 2000 firms around the world Copyright 2012 Cloud Security Alliance 1

The CSA Portfolio CSA quickly captured industry thought leadership by being the first mover in several areas due to our philosophy of agility, community and meritocracy. Cloud computing can be seen as a generation shift towards creating a global compute utility,, even if it will create several different global and local clouds. Cloud s dynamism and the criticall decisions being made by the public and private sector today with a long tail of impact have createdd a growing sense of urgency within CSA to continue our aggressive production of critical research, education and tools. Our research includes fundamental projects needed to define and implement trust within the future of information technology, which include cloud computing, mobile and big data. Copyright 2012 Cloud Security Alliance 2

Security as a Service Research Initiative Cloud Computing represents one of the most significant shifts in information technology many of us are likely to see in our lifetimes. Reaching the point where computing functions as a utility has great potential, promising innovations we cannot yet imagine. Vendors have attempted to satisfy this demand for security by offering security services in a cloud platform, but because these services take many forms, they have caused market confusion and complicated the selection process. This has led to limited adoption of cloud based security services thus far. To aid both cloud customers and cloud providers, CSA has embarked on a new research project to provide greater clarity on the area of Security as a Service. Security as a Service refers to the provision of security applications and services via the cloud either to cloud based infrastructure and software or from the cloud to the customers on premise systems. This will enable enterprises to make use of security services in new ways, or in ways that would not be cost effective if provisioned locally. Numerous security vendors are now leveraging cloud based models to deliver security solutions. This shift has occurred for a variety of reasons, including greater economies of scale and streamlined delivery mechanisms. Consumers are increasingly faced with evaluating security solutions, which do not run on premises. Consumers need to understand the unique nature of cloud delivered security offerings so they can evaluate the offerings and understand if they will meet their needs. As part of our effort to provide guidance to organizations on reasonable implementation practices the SecaaS Work Group is publishing a series of implementation guides that cover the following defined categories of service: Identity and Access Management (IAM) Data Loss Prevention (DLP) Web Security Email Security Security Assessments Intrusion Management Security Information and Event Management (SIEM) Encryption Business Continuity and Disaster Recovery Network Security Copyright 2012 Cloud Security Alliance 3

SecaaS Implementation Guide Milestones and Activities Implementation Guide Format Each Implementation Guide is developed by industry experts and will provide useful information for organizations interested in procuring the given security as a service offering. The guides cover the key issues, threats and solution benefits. Each guide will be between 12 20 pages, with the following format: Introduction Requirements Addressed Implementation Considerations and Concerns Detailed Implementation References and Useful Links SecaaS Research Sponsorship Benefits Branding of Project Deliverables The implementation guide, presentations and related project deliverables will include an acknowledgement of sponsor and will include sponsor logo. Sponsor will also be allowed to incorporate project deliverables into sponsor s own whitepapers and related collateral with appropriate acknowledgements to CSA. Sponsored Research Listing Sponsor will be permanently listed as a charter sponsor with logo and URL link at the CSA Security as a Service website and related areas, such as printed collateral. Copyright 2012 Cloud Security Alliance 4

Whitepaper Download Information Sponsor will receive monthly list of individuals opting in when downloading the individual SecaaS whitepaper. Press activity Sponsor will be included in press release activity related to key project milestones, including the opportunity to provide supporting quotes for the project. Blogging, Twitter & Webcasts Sponsor will participate in communications related to the project, including project blogs and use of the CSA corporate Twitter account. Project Observer Status Sponsor will be allowed the opportunity to monitor the project and will be provided regular updates from the project leadership. Sponsor will also be allowed the opportunity to interview customer participants. Events The CSA SecaaS Research Initiative will be highlighted in CSA events, providing exposure for sponsors of the initiative. Signing Up Interested parties can select to sponsor one or two SecaaS Categories that are listed below: Identity and Access Management (IAM) Data Loss Prevention (DLP) Web Security Email Security Security Assessments Intrusion Management Security Information and Event Management (SIEM) Encryption Business Continuity and Disaster Recovery Network Security Please contact Jim Reavis at jreavis@cloudsecurityalliance.org for more information, pricing and terms for SecaaS Research Sponsorship. Copyright 2012 Cloud Security Alliance 5