WEBINARS ON CLOUD SECURITY AND PRIVACY 1
REFLECTION ON THE O’REILLY WEBCASTS ABOUT CLOUD SECURITY AND
Jennifer T. Angiwot
De La Salle- College of Saint Benilde
WEBINARS ON CLOUD SECURITY AND PRIVACY 2
This paper is my reflection on the Cloud Security and Privacy presented by Tim Mather, Subra
Kumaraswamy, and Shahed Latif, authors of “Cloud Security and privacy” during the webinars.
The speakers discussed cloud computing’s SPI delivery model, and its impact on various aspects
of enterprise information security, privacy, and compliance. Security as a service and the impact
of cloud computing on corporate IT.
WEBINARS ON CLOUD SECURITY AND PRIVACY 3
1. What is cloud computing? Is it safe to apply?
2. What is data security?
3. What are impacts on role of corporate IT?
Cloud computing is a paradigm of computing in which dynamically scalable and often
virtualized resources are provided as a service over the internet. Cloud computing promises to
speed application deployment, increase innovation, and lower costs, all while increasing business
agility but also transforms the way we design, build and deliver applications. What’s good about
cloud computing is that it is a shared resources, massive scalability, elastic and uses internet
technologies, improve service delivery and enable business innovation. And one thing more,
using cloud computing is safe enough according to the speaker.
The impacts on role of corporate IT: Governance issue as internal IT becomes consultants
and business analysts to business units. Declination of responsibilities between providers and
customers much more nebulous than between customers and outsources, collocation facilities or
ASP’s. Cloud Computing likely to involve more direct business unit interaction with CSP’s.
Relationship between business units and corporate IT departments CSP’s will shift greater
power to business units from IT. IT itself will become more of a commodity as practices and
skills are standardized and automated. Functions performed by corporate IT departments will
shift from those who do to those who define and manage.
So as conclusions: Data security becomes significantly none important yet provider
capabilities are inadequate. Identify and Access Management (IAM) is less than adequate for
enterprises weak management of weak credentials unless authentication delegated back to the
customers. Because of above, expect significant business unit pressures to desensitize or
anonynize data expect this to become chokepoint.
The webinars about the cloud computing is great. The speakers were really successful IT
professionals having more knowledge about IT. And it’s good that we the attendees of the
webinars were able to interact with the speakers and they were able to answer all the questions
raised to them in chat or phone calls and able to share their knowledge about cloud computing.
Seminar on web? Why not…. O’reilly webcasts is cool!
WEBINARS ON CLOUD SECURITY AND PRIVACY 4