SlideShare a Scribd company logo
1 of 15
Download to read offline
S e r i o u s a b o u t S u c c e s s ®
Everyone is doing it . . .
But is it safe?
4 December 2014
© Moore Stephens Melbourne 2014 www.moorestephens.com.au
How to enjoy the benefits of the Cloud while
minimising your risk?
Jean-Marie Abi-Ghanem, Lead Partner Cyber Risk Services
Agenda
• Why organisations move and what they move to the
Cloud
• What is the Cloud? The different types of Cloud models
and services
• How to move to the Cloud securely
• Top 10 considerations when moving to the Cloud
Why organisations
move & what they
move to the Cloud
Why organisations move to the
Cloud?
• Improve service delivery
• Increase IT agility
• Reduce costs
• Enhance business resiliency
• Increase security
What organisations move to the
Cloud?
Based on industry trends and our experience the following
are some of the potential applications organisations tend
to move first to the Cloud:
• Educational and training systems
• Public website
• Email
• Supply chain management (SCM)
• Customer Relationship Management system
• Project Planning and Management
• Testing environments
• Help Desk
• Data Analytics
But the landscape is changing.
What is the Cloud?
The different types of
Cloud models and
services
What is the Cloud?
The different types of Cloud models and services
Visual Model of National Institute of Standards and Technology
Working Definition of Cloud Computing
Resource Pooling
On-Demand
Self-Service Essential
Characteristics
Service
Models
Deployment
models
Rapid
Elasticity
Measured
Service
Broad Network
Access
Software as a
Service (SaaS)
Platform as a
Service (PaaS)
Infrastructure as a
Service (IaaS)
Public CommunityHybridPrivate
Source: http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.html
How to move to the
Cloud securely
How to move to the Cloud
securely
Evaluate application / workloads for Cloud readiness and suitability for moving to the Cloud along
with tool and process maturity required to enable moving to the Cloud
Define and document the Business drivers and requirements
Develop a Cloud strategy, with guiding principles for your organisation
Develop a target Cloud deployment architecture, security policies, standards, processes and
guidelines
Identify key opportunities for Cloud adoption by reviewing organisational maturity, infrastructure,
application workloads and process and governance structures
Initiatives to enable deployment to the Cloud
Current State
Assessment
Business
Requirements
Strategy
Architecture
Future State
and Roadmap
Readiness &
Migration Plan
Top 10
considerations
when moving to
the Cloud
Top 10 considerations when
moving to the Cloud
1. Architecture and IT Strategy aligned to Business
Drivers
2. The right partner – Not all partners are equal
3. Right access at the right time
4. Shared security responsibility
5. Data insurance
Top 10 considerations when
moving to the Cloud
6. User Privacy and Secondary Usage of Data
7. Compliance with Regulatory requirements –
i.e. Privacy, PCI-DSS
8. Data security and sovereignty
9. Right to audit
10. Locked in to specific cloud technology,
services and providers
Questions?
FAQ’s
1. How can sensitive information and documents best be protected from
unintended access or loss?
2. Who owns the data we store in the cloud providers service?
3. Do we have a choice as to where our data is going to reside
geographically?
4. What are some of the critical issues from a data sovereignty perspective?
5. What reporting options and audit support are available and does the
provider give us access to real-time performance monitoring and
statistics?
6. Are the cloud providers compliant with PCI DSS, SOX, ISM or other
regulations that are relevant to my industry?
Jean-Marie Abi-Ghanem
Partner, Cyber Risk Services
T. 03 8635 1963
M. 0433 118 551
jabighanem@moorestephens.com.au
Contact
Disclaimer
Our comments and information contain in this presentation are generic in nature and
are not purported to represent advice that can be relied upon. You should seek your
own advice for your own circumstances.
The author or any other persons involved in the preparation or distribution of this
presentation expressly disclaim all and any contractual, tortious or other form of liability
to any person in respect of this presentation and any consequences arising from its use
by any person in reliance in whole or any part of the contents of this presentation.
The comments contained in the presentation shall not in any way constitute a
recommendation as to whether you should invest in any product discussed in the
presentation.

More Related Content

What's hot

Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energyaccenture
 
Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...Axway
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of securityOlivier Schmitt
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...Ravinder Reddy Amanaganti
 
Cisco at v mword 2015
Cisco at v mword 2015Cisco at v mword 2015
Cisco at v mword 2015ldangelo0772
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
Mobility Brief
Mobility BriefMobility Brief
Mobility BriefBettie Hu
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...XEventsHospitality
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centerskanew396
 
IT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USAIT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USAUnified11
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdfSun Technologies
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationITpreneurs
 
How is QOREX different?
How is QOREX different?How is QOREX different?
How is QOREX different?Phil Trickey
 

What's hot (20)

Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
CSA & GRC Stack
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud security
Cloud securityCloud security
Cloud security
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
 
Cisco at v mword 2015
Cisco at v mword 2015Cisco at v mword 2015
Cisco at v mword 2015
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
Mobility Brief
Mobility BriefMobility Brief
Mobility Brief
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centers
 
IT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USAIT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USA
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdf
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
How is QOREX different?
How is QOREX different?How is QOREX different?
How is QOREX different?
 

Viewers also liked

Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project Jaseel Abdul Rafeek
 
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...Viacheslav Maiakin
 
ROBÓTICA 2014
ROBÓTICA 2014ROBÓTICA 2014
ROBÓTICA 2014Thaly Liz
 
Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?Vinicius Espinolla
 
Инновационные методы лечения
Инновационные методы леченияИнновационные методы лечения
Инновационные методы леченияИрина Головач
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled PresentationErik Peris
 

Viewers also liked (10)

Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project
 
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
 
ROBÓTICA 2014
ROBÓTICA 2014ROBÓTICA 2014
ROBÓTICA 2014
 
E.Hussein Hamdy_CV
E.Hussein Hamdy_CVE.Hussein Hamdy_CV
E.Hussein Hamdy_CV
 
WOW | Cup Moscow by Changellenge | First round
WOW | Cup Moscow by Changellenge | First roundWOW | Cup Moscow by Changellenge | First round
WOW | Cup Moscow by Changellenge | First round
 
SEO
SEOSEO
SEO
 
Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?
 
Инновационные методы лечения
Инновационные методы леченияИнновационные методы лечения
Инновационные методы лечения
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Agama 4 tarekat
Agama 4 tarekatAgama 4 tarekat
Agama 4 tarekat
 

Similar to Cloud - Everyone is doing it, But is it safe?

The Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesThe Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesAmazon Web Services
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Ezhilarasan Natarajan
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Triaxil
 
Mitigate Risks of Cloud Computing
Mitigate Risks of Cloud ComputingMitigate Risks of Cloud Computing
Mitigate Risks of Cloud ComputingDarienYamin
 
SCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEOSCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEOWebXpress.IN
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...Amazon Web Services
 
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdfThe Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdfPolyxer Systems
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)Amazon Web Services
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudCapgemini
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYSilverlineCRM
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
Cloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to SuccessCloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to Successnvpradhan
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudGoogle
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 

Similar to Cloud - Everyone is doing it, But is it safe? (20)

The Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesThe Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial Services
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses.
 
Mitigate Risks of Cloud Computing
Mitigate Risks of Cloud ComputingMitigate Risks of Cloud Computing
Mitigate Risks of Cloud Computing
 
SCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEOSCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEO
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdfThe Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Cloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to SuccessCloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to Success
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 

Recently uploaded

Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 

Recently uploaded (20)

Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 

Cloud - Everyone is doing it, But is it safe?

  • 1. S e r i o u s a b o u t S u c c e s s ® Everyone is doing it . . . But is it safe? 4 December 2014 © Moore Stephens Melbourne 2014 www.moorestephens.com.au How to enjoy the benefits of the Cloud while minimising your risk? Jean-Marie Abi-Ghanem, Lead Partner Cyber Risk Services
  • 2. Agenda • Why organisations move and what they move to the Cloud • What is the Cloud? The different types of Cloud models and services • How to move to the Cloud securely • Top 10 considerations when moving to the Cloud
  • 3. Why organisations move & what they move to the Cloud
  • 4. Why organisations move to the Cloud? • Improve service delivery • Increase IT agility • Reduce costs • Enhance business resiliency • Increase security
  • 5. What organisations move to the Cloud? Based on industry trends and our experience the following are some of the potential applications organisations tend to move first to the Cloud: • Educational and training systems • Public website • Email • Supply chain management (SCM) • Customer Relationship Management system • Project Planning and Management • Testing environments • Help Desk • Data Analytics But the landscape is changing.
  • 6. What is the Cloud? The different types of Cloud models and services
  • 7. What is the Cloud? The different types of Cloud models and services Visual Model of National Institute of Standards and Technology Working Definition of Cloud Computing Resource Pooling On-Demand Self-Service Essential Characteristics Service Models Deployment models Rapid Elasticity Measured Service Broad Network Access Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Public CommunityHybridPrivate Source: http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.html
  • 8. How to move to the Cloud securely
  • 9. How to move to the Cloud securely Evaluate application / workloads for Cloud readiness and suitability for moving to the Cloud along with tool and process maturity required to enable moving to the Cloud Define and document the Business drivers and requirements Develop a Cloud strategy, with guiding principles for your organisation Develop a target Cloud deployment architecture, security policies, standards, processes and guidelines Identify key opportunities for Cloud adoption by reviewing organisational maturity, infrastructure, application workloads and process and governance structures Initiatives to enable deployment to the Cloud Current State Assessment Business Requirements Strategy Architecture Future State and Roadmap Readiness & Migration Plan
  • 11. Top 10 considerations when moving to the Cloud 1. Architecture and IT Strategy aligned to Business Drivers 2. The right partner – Not all partners are equal 3. Right access at the right time 4. Shared security responsibility 5. Data insurance
  • 12. Top 10 considerations when moving to the Cloud 6. User Privacy and Secondary Usage of Data 7. Compliance with Regulatory requirements – i.e. Privacy, PCI-DSS 8. Data security and sovereignty 9. Right to audit 10. Locked in to specific cloud technology, services and providers
  • 14. FAQ’s 1. How can sensitive information and documents best be protected from unintended access or loss? 2. Who owns the data we store in the cloud providers service? 3. Do we have a choice as to where our data is going to reside geographically? 4. What are some of the critical issues from a data sovereignty perspective? 5. What reporting options and audit support are available and does the provider give us access to real-time performance monitoring and statistics? 6. Are the cloud providers compliant with PCI DSS, SOX, ISM or other regulations that are relevant to my industry?
  • 15. Jean-Marie Abi-Ghanem Partner, Cyber Risk Services T. 03 8635 1963 M. 0433 118 551 jabighanem@moorestephens.com.au Contact Disclaimer Our comments and information contain in this presentation are generic in nature and are not purported to represent advice that can be relied upon. You should seek your own advice for your own circumstances. The author or any other persons involved in the preparation or distribution of this presentation expressly disclaim all and any contractual, tortious or other form of liability to any person in respect of this presentation and any consequences arising from its use by any person in reliance in whole or any part of the contents of this presentation. The comments contained in the presentation shall not in any way constitute a recommendation as to whether you should invest in any product discussed in the presentation.