Your SlideShare is downloading. ×

Everything is in the cloud. Now what ?

1,074

Published on

Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the …

Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practices in a rapidly changing environment, where cloud vendor hype isn't matching our security reality. Now that everything is in the cloud, we need a strategic approach to cloud security.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,074
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1Everything is in the Cloud. Nowwhat?Evelyn de Souza, Sr Data Center Security Strategist, CiscoCloud Security Alliance Control Matrix Co-Chair
  • 2. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2Agenda2Foremost: Answer your questionsHelp you evaluate cloud provider security capabilitiesEnsure safe data handling when working with cloud providersGetting the most from cloud providers
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Which infrastructure models are you adopting?3CompanyACompanyBCompanyCPublicCloud IaaSPublic Cloud SaaSSalesforce.comGoogle.comPrivate Cloud IaaSMFG HROracleENGFINFIN
  • 4. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4Combatting Growing Threats• Cloud Threat Intelligence• Deep packet inspection• Proactive, Continuous MonitoringAvoid a Fire in the Building4
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5Picture a day where your compliancerequirements are signed off in thecloud?Audit and Compliance Management5HIPAAPCI DSSFEDRampPIPEDAGLBAEU Data Privacy Act
  • 6. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6Your Call to Action6Leverage Industry Bodies, e.g., CSA for guidance on benchmarking cloud providersecurity capabilitiesLearn what certifications and security practices your cloud provider has - daily risk audits?Look for ways to increase security posture when you work with cloud providers – itnot just about Capex
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

×