TiE Cloud:Breakthroughs inCloud SecurityTim MatherFebruary 2nd, 2012
That‟s me (co-author)© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG networ...
Definition of “break”           Main Entry: break           Pronunciation: ˈbrāk            Function: verb           Infle...
5 security technologies „broken‟ by the cloud1) Cryptographic Key Management2) Data Leakage Prevention (DLP)3) Data Saniti...
Cloud security winners and losers: products                                  Virtual private SaaS                         ...
Cloud security winners and losers: job roles                                 Data scientists                              ...
Upcoming „food fights‟© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG netwo...
Upcoming „food fights‟• Telcos are moving to become CSPs (cloud service providers)• EU updates the Data Protection Directi...
Upcoming SlideShare
Loading in …5
×

TiE Cloud Event - Tim Mather - KPMG

860 views

Published on

Feb 2nd Cloud Event

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
860
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

TiE Cloud Event - Tim Mather - KPMG

  1. 1. TiE Cloud:Breakthroughs inCloud SecurityTim MatherFebruary 2nd, 2012
  2. 2. That‟s me (co-author)© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network ofindependent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 1
  3. 3. Definition of “break” Main Entry: break Pronunciation: ˈbrāk Function: verb Inflected Form(s): broke ˈbrōk bro·ken ˈbrō ; -kən... Etymology: Middle English breken... Date: before 12th century transitive verb: to render inoperable; as in <the cloud broke the security technology>© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network ofindependent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 2
  4. 4. 5 security technologies „broken‟ by the cloud1) Cryptographic Key Management2) Data Leakage Prevention (DLP)3) Data Sanitization – remanence4) Federated Identity Management (FIM)5) Security Incident & Event Management (SIEM)© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network ofindependent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 3
  5. 5. Cloud security winners and losers: products Virtual private SaaS • Examples: CipherCloud, Navajo Systems (recently acquired by Salesforce.com), PerspecSys, and Vaultive ‘Big data’ security platforms • Examples: Red Lambda (proprietary), Splunk SIEM (security incident and event management) • Examples: multiple vendors© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network ofindependent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 4
  6. 6. Cloud security winners and losers: job roles Data scientists • Someone needs to be able to query, manipulate and makes sense of all that ‘big data’ SysAdmins • Fabric gets humans out of the loop DBAs • NoSQL databases do not have schemas and do not need DBAs© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network ofindependent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 5
  7. 7. Upcoming „food fights‟© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network ofindependent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 6
  8. 8. Upcoming „food fights‟• Telcos are moving to become CSPs (cloud service providers)• EU updates the Data Protection Directive (95/46/EC) – andeffectively regulates cloud computing (‘Safe Harbor II’)• ITU-T meeting in Dubai in December – will seek to bringICAAN under UN control (and probably regulate cloudcomputing)• Net neutrality (United States)• ‘CALEA II’ (United States)© 2011 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network ofindependent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 7

×