• Like
  • Save

Everything is in the cloud. Now what ?

  • 1,048 views
Uploaded on

Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the …

Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practices in a rapidly changing environment, where cloud vendor hype isn't matching our security reality. Now that everything is in the cloud, we need a strategic approach to cloud security.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,048
On Slideshare
0
From Embeds
0
Number of Embeds
3

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1Everything is in the Cloud. Nowwhat?Evelyn de Souza, Sr Data Center Security Strategist, CiscoCloud Security Alliance Control Matrix Co-Chair
  • 2. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2Agenda2Foremost: Answer your questionsHelp you evaluate cloud provider security capabilitiesEnsure safe data handling when working with cloud providersGetting the most from cloud providers
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Which infrastructure models are you adopting?3CompanyACompanyBCompanyCPublicCloud IaaSPublic Cloud SaaSSalesforce.comGoogle.comPrivate Cloud IaaSMFG HROracleENGFINFIN
  • 4. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4Combatting Growing Threats• Cloud Threat Intelligence• Deep packet inspection• Proactive, Continuous MonitoringAvoid a Fire in the Building4
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5Picture a day where your compliancerequirements are signed off in thecloud?Audit and Compliance Management5HIPAAPCI DSSFEDRampPIPEDAGLBAEU Data Privacy Act
  • 6. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6Your Call to Action6Leverage Industry Bodies, e.g., CSA for guidance on benchmarking cloud providersecurity capabilitiesLearn what certifications and security practices your cloud provider has - daily risk audits?Look for ways to increase security posture when you work with cloud providers – itnot just about Capex
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7