Submit Search
Upload
CSA Argentina - Jornada CXO Cloud
•
0 likes
•
416 views
CSA Argentina
Follow
26 de septiembre de 2012
Read less
Read more
Technology
Report
Share
Report
Share
1 of 26
Download now
Download to read offline
Recommended
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
Netskope
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
Netskope
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Netskope
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
Netskope
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
Seclore
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Netskope
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Netskope
Recommended
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
Netskope
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
Netskope
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Netskope
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
Netskope
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
Seclore
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Netskope
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Netskope
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Netskope
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Netskope
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
Netskope
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
JoAnna Cheshire
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
David Terrar
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Netskope
Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
Cloud Security
Cloud Security
The TNS Group
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
CipherCloud
Tufin SecureCloud
Tufin SecureCloud
Matt Kerr
Identity as the Perimeter
Identity as the Perimeter
scoopnewsgroup
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
OpenStack Cloud Learning
OpenStack Cloud Learning
Michael Mullins
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
NetCraftsmen
Security In The Cloud Timed
Security In The Cloud Timed
Frederick James Rathweg
Accelerating Information with Identity
Accelerating Information with Identity
scoopnewsgroup
3245224.ppt
3245224.ppt
ahmad21315
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
More Related Content
What's hot
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Netskope
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Netskope
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
Netskope
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
JoAnna Cheshire
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
David Terrar
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Netskope
Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
Cloud Security
Cloud Security
The TNS Group
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
CipherCloud
Tufin SecureCloud
Tufin SecureCloud
Matt Kerr
Identity as the Perimeter
Identity as the Perimeter
scoopnewsgroup
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
OpenStack Cloud Learning
OpenStack Cloud Learning
Michael Mullins
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
NetCraftsmen
Security In The Cloud Timed
Security In The Cloud Timed
Frederick James Rathweg
Accelerating Information with Identity
Accelerating Information with Identity
scoopnewsgroup
What's hot
(20)
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Scot-Cloud 2015
Scot-Cloud 2015
Cloud Security
Cloud Security
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
Tufin SecureCloud
Tufin SecureCloud
Identity as the Perimeter
Identity as the Perimeter
C-Level tools for Cloud security
C-Level tools for Cloud security
OpenStack Cloud Learning
OpenStack Cloud Learning
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
Security In The Cloud Timed
Security In The Cloud Timed
Accelerating Information with Identity
Accelerating Information with Identity
Similar to CSA Argentina - Jornada CXO Cloud
3245224.ppt
3245224.ppt
ahmad21315
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
CSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO Cloud
cloudsa_arg
CSA & GRC Stack
CSA & GRC Stack
CloudSecurityAllianceAustralia
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Oracle here. now. your choice.
Oracle here. now. your choice.
CIOEastAfrica
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Phil Agcaoili
Alfresco digital assetmanagement-042111-final
Alfresco digital assetmanagement-042111-final
Emil Loreto
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
HarshitParkar6677
Presentation big data
Presentation big data
xKinAnx
Let's Talk Mobile
Let's Talk Mobile
Chris Muir
Cloud Native Empowered Culture
Cloud Native Empowered Culture
VMware Tanzu
Cloud Native Infrastructure Automation
Cloud Native Infrastructure Automation
VMware Tanzu
Blockchain and Apache NiFi
Blockchain and Apache NiFi
Timothy Spann
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
RightScale
CSA Standards Development Summary
CSA Standards Development Summary
CloudSecurityAllianceAustralia
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Research
guestba832ad
Isaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) print
Marc Vael
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure
Similar to CSA Argentina - Jornada CXO Cloud
(20)
3245224.ppt
3245224.ppt
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
CSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO Cloud
CSA & GRC Stack
CSA & GRC Stack
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
Oracle here. now. your choice.
Oracle here. now. your choice.
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Alfresco digital assetmanagement-042111-final
Alfresco digital assetmanagement-042111-final
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Presentation big data
Presentation big data
Let's Talk Mobile
Let's Talk Mobile
Cloud Native Empowered Culture
Cloud Native Empowered Culture
Cloud Native Infrastructure Automation
Cloud Native Infrastructure Automation
Blockchain and Apache NiFi
Blockchain and Apache NiFi
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
CSA Standards Development Summary
CSA Standards Development Summary
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Research
Isaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) print
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
More from CSA Argentina
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
CSA Argentina
Cloud native y donde esta el piloto
Cloud native y donde esta el piloto
CSA Argentina
Iam dev secops the infinity loop saga
Iam dev secops the infinity loop saga
CSA Argentina
Presentacion DevSecOps Argentina
Presentacion DevSecOps Argentina
CSA Argentina
Revista CSA LATAM FORUM 2019
Revista CSA LATAM FORUM 2019
CSA Argentina
Cloud security adoption sophos
Cloud security adoption sophos
CSA Argentina
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
CSA Argentina
Hardening usuarios smartfense
Hardening usuarios smartfense
CSA Argentina
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
CSA Argentina
Automated security analysis of aws clouds v1.0
Automated security analysis of aws clouds v1.0
CSA Argentina
2018 cyberark evento cloud
2018 cyberark evento cloud
CSA Argentina
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
Csa Summit 2017 - Managing multicloud environments
Csa Summit 2017 - Managing multicloud environments
CSA Argentina
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
CSA Argentina
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
CSA Argentina
Csa Summit 2017 - Csa Star for dummies
Csa Summit 2017 - Csa Star for dummies
CSA Argentina
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
CSA Argentina
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
CSA Argentina
SECURITY AS A WAR - Infosecurity 2015
SECURITY AS A WAR - Infosecurity 2015
CSA Argentina
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
CSA Argentina
More from CSA Argentina
(20)
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
Cloud native y donde esta el piloto
Cloud native y donde esta el piloto
Iam dev secops the infinity loop saga
Iam dev secops the infinity loop saga
Presentacion DevSecOps Argentina
Presentacion DevSecOps Argentina
Revista CSA LATAM FORUM 2019
Revista CSA LATAM FORUM 2019
Cloud security adoption sophos
Cloud security adoption sophos
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
Hardening usuarios smartfense
Hardening usuarios smartfense
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
Automated security analysis of aws clouds v1.0
Automated security analysis of aws clouds v1.0
2018 cyberark evento cloud
2018 cyberark evento cloud
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Managing multicloud environments
Csa Summit 2017 - Managing multicloud environments
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
Csa Summit 2017 - Csa Star for dummies
Csa Summit 2017 - Csa Star for dummies
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
SECURITY AS A WAR - Infosecurity 2015
SECURITY AS A WAR - Infosecurity 2015
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
Recently uploaded
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Recently uploaded
(20)
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Slack Application Development 101 Slides
Slack Application Development 101 Slides
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
CSA Argentina - Jornada CXO Cloud
1.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance Haciendo Sinergia Lic. Diego San Esteban, CRISC Board Member CSA Argentina
2.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Promover el uso de las mejores prácticas para ofrecer garantías de seguridad en Cloud Computing, y proporcionar educación sobre los usos de la computación en la nube para ayudar a asegurar todas las otras formas de computación.
3.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
4.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance 2012 – Capitulo Oficial 2 años trabajando + 20 miembros + 6 reuniones anuales Proyectos Locales en Idioma local
5.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Afiliación Capítulos Corporativos Patrocinante s
6.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://chapters.cloudsecurityalliance.org/argentina/ @Cloudsa_arg
7.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance http://cloudsecurityalliance.org/research/
8.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Consensus Assessments Initiative + 200 Cloud Controls Matrix + 90
9.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance La versión 3 amplía el contenido que se incluye en las versiones anteriores con recomendaciones prácticas y requisitos que se pueden medir y auditar.
10.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance SLA Chapters group Effective SLAs and their Management is a key factor in the successful adoption of the Cloud
11.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Initiative 1 - Top Mobile Threats) Initiative 6 - Mobile Device Management Mobile Device Management Key Components www.cloudsecurityalliance.org/mobile
12.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Identify Threats unique to, or magnified by Cloud Development of V2.1 Top Threats Submission and Review https://cloudsecurityalliance.org/research/top-threats/#_submit For more information on the Top Threats Working Group https://cloudsecurityalliance.org/topthreats/
13.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://cloudsecurityalliance.org/research/big-data/ Initiatives Data Analytics for Security Privacy Preserving/Enhancing Technologies Big Data-Scale Crypto Cloud Infrastructures’ Attack Surface Analysis and Reduction Policy and Governance Big Data Framework
14.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance 5 Telecom Initiatives Telecom and the GRC Stack ISO 27017 Compliance Monitoring Cloud Forensics and Legal https://cloudsecurityalliance.org/research/telecom/
15.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance New Working Group Co-chairs Introducing Sean Cordero, Evelyn de Souza, Thomas Kenyon CCM 1.3 peer review released in July More updates scheduled in 2012 (AICPA, NIST, and more) CCM 2.0 release 2013 CSA Interact coming soon
16.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance CSA, Trusted Cloud Initiative Interactive Site https://research.cloudsecurityalliance.org/tci/ TCI Roadmap for Q2 Architecture Maintenance Site – on CSA Interact soon Architecture Feedback Forum Interactive Site: Phase II - Heatmapping Interactive Site: Phase III – Input/Output Questionnaire Get Involved https://cloudsecurityalliance.org/research/tci/#_get-involved
17.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Health Initiatives HIPAA and HiTech Best Practices https://cloudsecurityalliance.org/research/him/
18.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Implementation Guidance for Categories
19.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance SLA + Pricacy = PLA
20.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Cloud Data Governance Initiatives Key Concerns of Cloud Data Stakeholders Data Lifecycle Model and Taxonomy Emerging Technologies
21.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Learn how you can participate in Cloud Security Alliance's goals to promote the use of best practices for providing security assurance within Cloud Computing http://www.linkedin.com/groups?gid=1864210 https://cloudsecurityalliance.org/get-involved/
22.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://cloudsecurityalliance.org/research/, the Submit Ideas tab Submit Your Research Ideas
23.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://cloudsecurityalliance.org/education/white-papers-and- educational-material/ Contribute to the CSA library
24.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
25.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Help Us Secure Cloud Computing https://chapters.cloudsecurityalliance.org/argentina/ press@ar.chapters.cloudsecurityalliance.org LinkedIn: www.linkedin.com/groups?gid=1864210 Twitter: @cloudsa_ar
26.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Download now