SlideShare a Scribd company logo
1 of 85
Cloud Security- Is my data safe? Justin Pirie @justinpirie blog.mimecast.com jpirie@mimecast.com CMA- London September 29th2010 matthewbradley
Analyst Blogger
Community Manager
Social Media Influence
Where I work
Cloud Services for Microsoft Exchange tipiro
Cloud Wrapper
Email Security matthewbradley
Email Continuity neilalderney123
Email Archive dolescum
Benefits of Google Apps
For Microsoft Exchange
What do users get? minifig
Unlimited Storage mescon
Fast Search Ronan_C
Uptime szeke
Over 500,000 users can’t be wrong!
Cloud Security- Is my data safe? matthewbradley
Today’s Presentation iSlime
Area I normally specialise in... massdistraction
James Blake Barry Gill Cloud Security Experts matthewbradley
James Blake- CISO flik
Barry Gill... bowbrick
Can’t walk... Badly Drawn Dad
Stuck with me Pixzamillion
Cloud Landscape zoutedrop
Lets have some data bionicteaching
To Understand russelldavies
US Cloud Adoption 2009 = 36%
US Cloud Adoption 2010 = 56%
US Businesses Considering Adopting 70%
UK lags behind US attitudes 6%
2010 Hype Cycle
2010 Hype Cycle
Grand Canyon between adopters James Marvin Phelps (mandj98)
Adopters: Cloud Improved Security 57%
Non Adopters: Cloud = Security Risk 62%
Where is the gap? massdistraction
Blocking Cloud Initiatives dmoola
What’s the problem? aturkus
Cloud is embryonic viralbus
Standards just emerging mayakamina
So.... Caveat Emptor  jeffc5000
And why it sometimes feels like this... gxdoyle
Change Direction Paul Wicks
James Blake Barry Gill Security matthewbradley
Presented as Binary MarkOMeara
Reality... cdw9
Ask an InfoSec pro thomasglobal
What is Security? Thomas Hawk
Management of Risk kyz
Too easily think of hardware stars6 / Leonardo Rizzi
Step #1: Define Acceptable Risks tnarik
Step #2: Assess your Risks Eneas
Step #3: Mitigate Risks get down
Step #4: Transfer Risks Brandon Christopher Warren
Step #5: Accept Risks dhammza
Step #6: Monitor / Audit Boyce Duprey
Unsure about Cloud Security? jessicafm
Cloud Security is Opaque Andrew Coulter Enright
Compared to your tin stars6 / Leonardo Rizzi
Baseline Current Risks Chuck “Caveman” Coker
i.e. Where are we today? Chris D 2006
Trusting Users.... Thai Jasmine (Take good care :-))
And Sysadmins.... leftcase
Others... Tambako the Jaguar
Permissions Nightmare marimoon
Managing those risks? Patrick Q
6 Steps? bitchcakesny
Is expensive jo'nas
Got the budget? The Prime Minister's Office
“Quiscustodiet ipsoscustodes?”
Cloud: Guards Guard
Cloud Security? matt.hintsa
#1. It’s their Business Esthr
#2. Financially Responsible wwarby
#3. Scale laffy4k
#4. Specialised Skills SarahMcDॐ
#5. Cumulative Effect of Multiple Customers Leo Reynolds
#6. Best Practice: Embedded, Distributed  Lars Plougmann
#7. Focus Chris Campbell
Want to be the Guards Guard?
Remember: Caveat Emptor  jeffc5000
But proportional to Risk gxdoyle
Any Questions? Justin Pirie @justinpirie blog.mimecast.com jpirie@mimecast.com matthewbradley

More Related Content

Viewers also liked

Challenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanChallenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanKen Chan
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudPoornaprajna Udupi
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcementShawn Wells
 
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud SecurityWhat Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Securitycraigbalding
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at NetflixJason Chan
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTINGKayalvizhi Selvaraj
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop CoursebookShawn Wells
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Jay Zarfoss
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentationelliehood
 

Viewers also liked (20)

Challenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanChallenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y Chan
 
Cloud Security: Ten Things
Cloud Security: Ten ThingsCloud Security: Ten Things
Cloud Security: Ten Things
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public Cloud
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement
 
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud SecurityWhat Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Is My Cloud Data Safe? 40 Character

Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Justin Pirie
 
Cloud Adoption Secrets
Cloud Adoption SecretsCloud Adoption Secrets
Cloud Adoption SecretsJustin Pirie
 
CLT Legal Cloud Conference
CLT Legal Cloud ConferenceCLT Legal Cloud Conference
CLT Legal Cloud ConferenceJustin Pirie
 
Swindon- Talk on Cloud
Swindon- Talk on CloudSwindon- Talk on Cloud
Swindon- Talk on CloudJustin Pirie
 
Criptomoneda y el Dark Web
Criptomoneda y el Dark WebCriptomoneda y el Dark Web
Criptomoneda y el Dark Webdavidmassa8
 
Cloud Computing - Marc Moffitt
Cloud Computing - Marc MoffittCloud Computing - Marc Moffitt
Cloud Computing - Marc MoffittMarc Moffitt
 
Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation Reading Room
 
Seeing Through The Clouds
Seeing Through The CloudsSeeing Through The Clouds
Seeing Through The CloudsAtlas Cloud
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the CloudMike Spaulding
 
Accelerate 2019 presentation slides
Accelerate 2019 presentation slidesAccelerate 2019 presentation slides
Accelerate 2019 presentation slidesAccelerate
 
Sbtug 29 July2009 Agenda
Sbtug 29 July2009 AgendaSbtug 29 July2009 Agenda
Sbtug 29 July2009 AgendaCraig Bailey
 
Constructing the Case for Cloud
Constructing the Case for CloudConstructing the Case for Cloud
Constructing the Case for CloudJustin Pirie
 
Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)
Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)
Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)James Santagata
 
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud -  Click Digital Expo 2016 - Jamin AndrewsBeyond the Cloud -  Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud - Click Digital Expo 2016 - Jamin AndrewsJamin Andrews
 
Google Cloud - Google's vision on AI
Google Cloud - Google's vision on AIGoogle Cloud - Google's vision on AI
Google Cloud - Google's vision on AIBigDataExpo
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace RevolutionAtlas Cloud
 

Similar to Is My Cloud Data Safe? 40 Character (20)

Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?
 
Cloud Adoption Secrets
Cloud Adoption SecretsCloud Adoption Secrets
Cloud Adoption Secrets
 
Cloud. Why? How
Cloud. Why? HowCloud. Why? How
Cloud. Why? How
 
CLT Legal Cloud Conference
CLT Legal Cloud ConferenceCLT Legal Cloud Conference
CLT Legal Cloud Conference
 
Swindon- Talk on Cloud
Swindon- Talk on CloudSwindon- Talk on Cloud
Swindon- Talk on Cloud
 
Criptomoneda y el Dark Web
Criptomoneda y el Dark WebCriptomoneda y el Dark Web
Criptomoneda y el Dark Web
 
Cloud Computing - Marc Moffitt
Cloud Computing - Marc MoffittCloud Computing - Marc Moffitt
Cloud Computing - Marc Moffitt
 
Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation
 
Seeing Through The Clouds
Seeing Through The CloudsSeeing Through The Clouds
Seeing Through The Clouds
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
Accelerate 2019 presentation slides
Accelerate 2019 presentation slidesAccelerate 2019 presentation slides
Accelerate 2019 presentation slides
 
Cloud in 2013
Cloud in 2013Cloud in 2013
Cloud in 2013
 
Security In The Cloud Timed
Security In The Cloud TimedSecurity In The Cloud Timed
Security In The Cloud Timed
 
Sbtug 29 July2009 Agenda
Sbtug 29 July2009 AgendaSbtug 29 July2009 Agenda
Sbtug 29 July2009 Agenda
 
Constructing the Case for Cloud
Constructing the Case for CloudConstructing the Case for Cloud
Constructing the Case for Cloud
 
Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)
Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)
Cloud Computing: What It Is, What It Isn't, Why It Matters (English version)
 
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud -  Click Digital Expo 2016 - Jamin AndrewsBeyond the Cloud -  Click Digital Expo 2016 - Jamin Andrews
Beyond the Cloud - Click Digital Expo 2016 - Jamin Andrews
 
Google Cloud - Google's vision on AI
Google Cloud - Google's vision on AIGoogle Cloud - Google's vision on AI
Google Cloud - Google's vision on AI
 
MENOS METAVERSO Y MÁS WEB3 (v1)
MENOS METAVERSO Y MÁS WEB3 (v1)MENOS METAVERSO Y MÁS WEB3 (v1)
MENOS METAVERSO Y MÁS WEB3 (v1)
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
 

More from Justin Pirie

Adoption Trends for SaaS- Cloud Computing World Forum 2012
Adoption Trends for SaaS- Cloud Computing World Forum 2012Adoption Trends for SaaS- Cloud Computing World Forum 2012
Adoption Trends for SaaS- Cloud Computing World Forum 2012Justin Pirie
 
Unifying Devices in the Cloud
Unifying Devices in the CloudUnifying Devices in the Cloud
Unifying Devices in the CloudJustin Pirie
 
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudMicrosoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudJustin Pirie
 
The end of IT as we know it.
The end of IT as we know it.The end of IT as we know it.
The end of IT as we know it.Justin Pirie
 
CLT Law Conference Cloud intro
CLT Law Conference Cloud introCLT Law Conference Cloud intro
CLT Law Conference Cloud introJustin Pirie
 
Empowering and Securing BYOD Email
Empowering and Securing BYOD EmailEmpowering and Securing BYOD Email
Empowering and Securing BYOD EmailJustin Pirie
 
Copenhagen Lean Startup
Copenhagen Lean StartupCopenhagen Lean Startup
Copenhagen Lean StartupJustin Pirie
 
The Great Migration- Cloud Circle
The Great Migration- Cloud CircleThe Great Migration- Cloud Circle
The Great Migration- Cloud CircleJustin Pirie
 
Bristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean StartupBristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean StartupJustin Pirie
 
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...Justin Pirie
 
Microsoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference SessionMicrosoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference SessionJustin Pirie
 
Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?Justin Pirie
 
Email: The Future Direction
Email: The Future DirectionEmail: The Future Direction
Email: The Future DirectionJustin Pirie
 
Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?Justin Pirie
 
Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?Justin Pirie
 
Lean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for EntrepreneursLean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for EntrepreneursJustin Pirie
 
The Hidden Security Danger – Don’t Let Email Be Your Downfall
The Hidden Security Danger –  Don’t Let Email Be Your Downfall The Hidden Security Danger –  Don’t Let Email Be Your Downfall
The Hidden Security Danger – Don’t Let Email Be Your Downfall Justin Pirie
 
Mimecast Partner Day
Mimecast Partner DayMimecast Partner Day
Mimecast Partner DayJustin Pirie
 
Rackspace Feb 2010 with Text
Rackspace Feb 2010 with TextRackspace Feb 2010 with Text
Rackspace Feb 2010 with TextJustin Pirie
 
Does the Cloud ROI Stack up- or does it fall?
Does the Cloud ROI Stack up- or does it fall?Does the Cloud ROI Stack up- or does it fall?
Does the Cloud ROI Stack up- or does it fall?Justin Pirie
 

More from Justin Pirie (20)

Adoption Trends for SaaS- Cloud Computing World Forum 2012
Adoption Trends for SaaS- Cloud Computing World Forum 2012Adoption Trends for SaaS- Cloud Computing World Forum 2012
Adoption Trends for SaaS- Cloud Computing World Forum 2012
 
Unifying Devices in the Cloud
Unifying Devices in the CloudUnifying Devices in the Cloud
Unifying Devices in the Cloud
 
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudMicrosoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
 
The end of IT as we know it.
The end of IT as we know it.The end of IT as we know it.
The end of IT as we know it.
 
CLT Law Conference Cloud intro
CLT Law Conference Cloud introCLT Law Conference Cloud intro
CLT Law Conference Cloud intro
 
Empowering and Securing BYOD Email
Empowering and Securing BYOD EmailEmpowering and Securing BYOD Email
Empowering and Securing BYOD Email
 
Copenhagen Lean Startup
Copenhagen Lean StartupCopenhagen Lean Startup
Copenhagen Lean Startup
 
The Great Migration- Cloud Circle
The Great Migration- Cloud CircleThe Great Migration- Cloud Circle
The Great Migration- Cloud Circle
 
Bristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean StartupBristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean Startup
 
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
 
Microsoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference SessionMicrosoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference Session
 
Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?
 
Email: The Future Direction
Email: The Future DirectionEmail: The Future Direction
Email: The Future Direction
 
Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?
 
Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?
 
Lean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for EntrepreneursLean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for Entrepreneurs
 
The Hidden Security Danger – Don’t Let Email Be Your Downfall
The Hidden Security Danger –  Don’t Let Email Be Your Downfall The Hidden Security Danger –  Don’t Let Email Be Your Downfall
The Hidden Security Danger – Don’t Let Email Be Your Downfall
 
Mimecast Partner Day
Mimecast Partner DayMimecast Partner Day
Mimecast Partner Day
 
Rackspace Feb 2010 with Text
Rackspace Feb 2010 with TextRackspace Feb 2010 with Text
Rackspace Feb 2010 with Text
 
Does the Cloud ROI Stack up- or does it fall?
Does the Cloud ROI Stack up- or does it fall?Does the Cloud ROI Stack up- or does it fall?
Does the Cloud ROI Stack up- or does it fall?
 

Is My Cloud Data Safe? 40 Character

Editor's Notes

  1. Security
  2. Security
  3. Continutity
  4. Archive
  5. Bringing all the benefits of Google apps- horizontal scalability, reliability, etc
  6. To Microsoft Exchange
  7. Security
  8. Security
  9. From the Mimecast Cloud Adoption Survey
  10. From the Mimecast Cloud Adoption Survey http://www.mimecast.com/events-press/press-releases/article/view/cloud-computing-delivering-on-its-promise-but-doubts-still-hold-back-adoption/462/
  11. From the Mimecast Cloud Adoption Survey http://www.mimecast.com/events-press/press-releases/article/view/cloud-computing-delivering-on-its-promise-but-doubts-still-hold-back-adoption/462/
  12. From the Mimecast Cloud Adoption Survey http://www.mimecast.com/events-press/press-releases/article/view/cloud-computing-delivering-on-its-promise-but-doubts-still-hold-back-adoption/462/
  13. 2010 Gartner Hype Cycle for emerging technologies
  14. 2010 Gartner Hype Cycle for emerging technologies
  15. From the Mimecast Cloud Adoption Survey http://www.mimecast.com/events-press/press-releases/article/view/cloud-computing-delivering-on-its-promise-but-doubts-still-hold-back-adoption/462/
  16. From the Mimecast Cloud Adoption Survey http://www.mimecast.com/events-press/press-releases/article/view/cloud-computing-delivering-on-its-promise-but-doubts-still-hold-back-adoption/462/
  17. Or being blocked
  18. What’s the problem?
  19. Standards are only just emerging
  20. Buyer Beware- http://en.wikipedia.org/wiki/Caveat_emptorUnder the doctrine of caveat emptor, the buyer could not recover from the seller for defects on the property that rendered the property unfit for ordinary purposes. The only exception was if the seller actively concealed latent defects or otherwise made material misrepresentations amounting to fraud.Before statutory law, the buyer had no warranty of the quality of goods. In many jurisdictions now, the law requires that goods must be of "merchantable quality". However, this implied warranty can be difficult to enforce and may not apply to all products. Hence, buyers are still advised to be cautious.
  21. Which is why we in cloud feel like we’re being beaten up...
  22. Security
  23. Security is often presented as a binary object. It’s not.
  24. It’s much more complex than that.
  25. What is security?
  26. Security is the management of risks
  27. Define Acceptable risk
  28. Step #6: Monitor Risks
  29. Some People are unsure about Cloud Security
  30. Probably because of the relative opacity of Cloud compared to the transparency of a private network and the control you can exert on it
  31. The key is to understand your current risks- baseline them
  32. i.e. Where are we today?
  33. Users Applications File shares Email Document management
  34. Sysadmins User based access Server access Database access
  35. Others: Internet VPN Extranet Customer/Partner portals API’s Suppliers Telco’s Tape warehousing Backup delivery personnel
  36. Permissions Nightmare
  37. How are we managing those risks today?
  38. Applying the 6 step process?
  39. Are you given the budget / skills to do it?
  40. “Quiscustodietipsoscustodes?”Who will guard the guards themselves?DecimusIuniusIuvenalis
  41. Cloud can be a way to become a guard’s guard, instead of the guard
  42. Reasons to go Cloud Security
  43. Reason to go Cloud security #1 It’s their business- and their reputation depends on it
  44. #2 Money - they are held financially responsible
  45. Reason #3 Scale- Cloud platforms have scale that customers could never achieve on their own- protecting against large scale attacks
  46. Reason #4 Specialised Skills- employ specific people to do specialised job. Cumulative effect of multiple customers
  47. Cumulative effect of multiple customers
  48. Best Practice embedded in organisation and distributed. Not dependent on one person
  49. Not just about competence and budget- but focus. It’s all they do.
  50. Cloud can be a way to become a guard’s guard, instead of the guard
  51. Buyer Beware- http://en.wikipedia.org/wiki/Caveat_emptorUnder the doctrine of caveat emptor, the buyer could not recover from the seller for defects on the property that rendered the property unfit for ordinary purposes. The only exception was if the seller actively concealed latent defects or otherwise made material misrepresentations amounting to fraud.Before statutory law, the buyer had no warranty of the quality of goods. In many jurisdictions now, the law requires that goods must be of "merchantable quality". However, this implied warranty can be difficult to enforce and may not apply to all products. Hence, buyers are still advised to be cautious.
  52. But make it proportional to risk- especially to CURRENT RISKS
  53. Security