SlideShare a Scribd company logo
1 of 23
Download to read offline
CONFIDENTIAL DO NOT DISTRIBUTE
Moving Sucks
Making Secure Cloud Migration Painless
Dan Mannion VP of Partners and Alliances
daniel.mannion@armor.com
@dmannion
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion 2
Agenda
01 Planning a cloud migration
02 Shared responsibility
03 Security considerations
04 Key takeaways
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
MOVE FAST STAY SECUREOR
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
MOVE FAST STAY SECUREAND
Planning a Cloud Migration
5
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
• Ability and scalability
• Increased flexibility
• Rapid infrastructure deployment
• Free capex – pay only for what you consume
Benefits of the Cloud
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
Things to Consider
7
• Determine what you want to put in the cloud
• Identify the right cloud environment (IaaS, PaaS,
SaaS)
• Identify deployment model
• Re-architecting for cloud
• Estimate value and costs up front
• Find a security solution
• Stay compliant
Shared Responsibility
8
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
Cloud can be more secure than your current environment.
IDC released a report which found that most customers can be more secure
than their on-premises environment. How?
Source: Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment, IDC
Automate logging
and monitoring
Simplifying
resource access
Make it easy to
encrypt properly
Enforcing strong
authentication
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion 10
It seems like you’re not responsible for much, right?
APPLICATIONS
DATA
RUNTIME
MIDDLEWARE
OS
VIRTUALIZATION
SERVERS
STORAGE
NETWORKING
APPLICATIONS
DATA
RUNTIME
MIDDLEWARE
OS
VIRTUALIZATION
SERVERS
STORAGE
NETWORKING
Infrastructure
(as a Service)
Platform
(as a Service)
You Manage Provider Manages
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion 11
It’s not simple.
3rd Party Cloud
Azure
AWS
On Premises
How do you account for:
planning & strategy, staff, tools, training, execution, scaling, remediation, & threat hunting?
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion 12
That means the biggest threat to your cloud is
“you don’t know what you don’t know.”
Top Strategic Predictions for 2016 and Beyond – Gartner 2016
95%OF CLOUD SECURITY FAILURES THROUGH
2020 WILL BE THE CUSTOMERS FAULT.
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
Things to Consider
13
Impact on
Business
Cost of Shared
Responsibility
Talent
Considerations
Security Considerations
14
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
40%
15
The Challenges We All Face in 2017
910BN Record breaches in the last 10 years.
www.privacyrights.org/data-breaches
3.2M RECORD BREACHES YTD
That trend is going to continue.
www.bloomberg.com/news/articles/2017-01-19/data-breaches-hit-
record-in-2016-as-dnc-wendy-s-co-hacked
INCREASE IN HACKS 2015-2016
$4M
Per Ponemon Institute.
www-03.ibm.com/security/data-breach/
$4M AVERAGE COST OF DATA BREACH
www.privacyrights.org/data-breaches
INCREASE IN COST SINCE 2013.
Healthcare companies lose an average of
$355 per each stolen record
AVERAGE HEALTHCARE LOSS
29%
$355
Transportation companies may only lose $129
per record
AVERAGE TRANSPORTATION LOSS
$129
3.2M
910BN
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
What Happens If You Do Get Breached?
16
Most solutions are glorified alarm systems that simply notify of you a
breach...leaving it up to you to remediate.
1616
Sources: https://www.csid.com/resources/stats/data-breaches/
VS
2 DAYS 146 DAYS
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
Spot the Hacker
17
LIVEFULLTHROTTLE TANK, FATHER HUYDERMAN PETR0VICH, NOWHERE ALIRRP14 THEHEAD
The images below are either from popular online dating websites, or are currently on the
FBI Cyber’s Most Wanted list. Can you spot which are the proven malicious actors?
Do their aliases help?
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
Macro Cyber Security Trends = We are losing!!!
TALENT
SHORTAGE
HOW THE
SECURITY
INDUSTRY IS
FAILING US ALL
Cybersecurity workforce shortage: Projected to reach 1.5 million by 2019
Cyber talent is expensive: ~20% more costly than general IT talent
Cloud Security is new muscle: Even the top cybersecurity talent on the market is
having to re-learn cybersecurity tools and techniques in the cloud
5000 security tools vendors: Deliver point solutions and no commitment to security
outcomes
MSSP market that treats every customer as a snowflake: “However you’re securing
yourself today, we’ll turn that into a service” – aka “your mess for less”
Compliance frameworks that deliver check boxes but not security: All major health,
financial services, retail and government breaches were compliant organizations
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
Founded on Trust. Fueled by Passion.
19
TRUSTED BY
1,200+ CUSTOMERS IN
45 COUNTRIES
4 OF THE TOP 10
HEALTHCARE IT COMPANIES
MORE THAN $200 BILLION IN
SECURE PAYMENT TRANSACTIONS
C E R T I F I E D
FOR
Armor’s ability to deliver on data
security enables us to dedicate
resources to our core business of
designing and delivering world-
class experiences.”
Sean McElroy
Vice President of IT & Security
“
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion
• Why are you moving to the cloud? Cost? Agility? Scalability?
• How will you address the Shared Responsibility Model?
• How will you upskill your team? Do you need outside help?
• Design a multi-year plan and insure you understand
implications of hybrid approach
• Use this opportunity to design a solid disaster recovery plan –
the cloud is great at DR
• Complete a detailed analysis of cost/benefit and ensure you
design new programs and policies to prevent cloud sprawl
• Security and compliance in the cloud is different – now might
be the time to outsource that burden
Key Takeaways
20
Questions
CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM
@dmannion 22
Enter Your Business Card for a
Chance to Win…
ONE $100 Microsoft Store Gift Card
CONFIDENTIAL DO NOT DISTRIBUTE
Thank You
Dan Mannion VP of Partners and Alliances
daniel.mannion@armor.com
@dmannion

More Related Content

What's hot

Track C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public SectorTrack C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public Sectorscoopnewsgroup
 
Track A-3: Drive Innovation & Reduce Costs with Managed Services
Track A-3: Drive Innovation & Reduce Costs with Managed ServicesTrack A-3: Drive Innovation & Reduce Costs with Managed Services
Track A-3: Drive Innovation & Reduce Costs with Managed Servicesscoopnewsgroup
 
How Splunk connects Salesforce
How Splunk connects SalesforceHow Splunk connects Salesforce
How Splunk connects SalesforceMuleSoft
 
Track C-3: Digital Workflows for Deeper Citizen Engagement
Track C-3: Digital Workflows for Deeper Citizen EngagementTrack C-3: Digital Workflows for Deeper Citizen Engagement
Track C-3: Digital Workflows for Deeper Citizen Engagementscoopnewsgroup
 
Enterprise Architecture Challenges in the Digital Age
Enterprise Architecture Challenges in the Digital AgeEnterprise Architecture Challenges in the Digital Age
Enterprise Architecture Challenges in the Digital AgeThoughtworks
 
Careless Users In the Cloud (And What IT Can Do About It)
Careless Users In the Cloud (And What IT Can Do About It)Careless Users In the Cloud (And What IT Can Do About It)
Careless Users In the Cloud (And What IT Can Do About It)Softchoice Corporation
 
Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)
Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)
Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)Dynatrace
 
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Internet World
 
Research Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyondResearch Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyondKrishnan Subramanian
 
Building The Pillars Of Modern Enterprise
Building The Pillars Of Modern EnterpriseBuilding The Pillars Of Modern Enterprise
Building The Pillars Of Modern EnterpriseKrishnan Subramanian
 
Mobile Labs: Supercharge Mobile App Testing - All About Speed
Mobile Labs: Supercharge Mobile App Testing - All About SpeedMobile Labs: Supercharge Mobile App Testing - All About Speed
Mobile Labs: Supercharge Mobile App Testing - All About SpeedMobile Labs
 
Tech Overload is Overblown: Cloud Apps and the Happiness Effect
Tech Overload is Overblown: Cloud Apps and the Happiness EffectTech Overload is Overblown: Cloud Apps and the Happiness Effect
Tech Overload is Overblown: Cloud Apps and the Happiness EffectSoftchoice Corporation
 
Next Steps In Your Digital Transformation
Next Steps In Your Digital TransformationNext Steps In Your Digital Transformation
Next Steps In Your Digital TransformationVMware Tanzu
 
DIGITALIZED WORLD- Technology Disruptions & Future Of Software Test Automation
DIGITALIZED WORLD- Technology Disruptions & Future Of Software Test AutomationDIGITALIZED WORLD- Technology Disruptions & Future Of Software Test Automation
DIGITALIZED WORLD- Technology Disruptions & Future Of Software Test AutomationHCL Technologies
 
Market landscape how pervasive technology has changed the game
Market landscape how pervasive technology has changed the gameMarket landscape how pervasive technology has changed the game
Market landscape how pervasive technology has changed the gameDennis Stoutjesdijk
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 
Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...
Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...
Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...scoopnewsgroup
 
Composable Enterprise - Cloud, Mobile and IoT
Composable Enterprise - Cloud, Mobile and IoTComposable Enterprise - Cloud, Mobile and IoT
Composable Enterprise - Cloud, Mobile and IoTKrishnan Subramanian
 
Fighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceFighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceAjeet Singh
 

What's hot (20)

Track C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public SectorTrack C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public Sector
 
Track A-3: Drive Innovation & Reduce Costs with Managed Services
Track A-3: Drive Innovation & Reduce Costs with Managed ServicesTrack A-3: Drive Innovation & Reduce Costs with Managed Services
Track A-3: Drive Innovation & Reduce Costs with Managed Services
 
How Splunk connects Salesforce
How Splunk connects SalesforceHow Splunk connects Salesforce
How Splunk connects Salesforce
 
Track C-3: Digital Workflows for Deeper Citizen Engagement
Track C-3: Digital Workflows for Deeper Citizen EngagementTrack C-3: Digital Workflows for Deeper Citizen Engagement
Track C-3: Digital Workflows for Deeper Citizen Engagement
 
Enterprise Architecture Challenges in the Digital Age
Enterprise Architecture Challenges in the Digital AgeEnterprise Architecture Challenges in the Digital Age
Enterprise Architecture Challenges in the Digital Age
 
Marketing in the Age of Mobile
Marketing in the Age of MobileMarketing in the Age of Mobile
Marketing in the Age of Mobile
 
Careless Users In the Cloud (And What IT Can Do About It)
Careless Users In the Cloud (And What IT Can Do About It)Careless Users In the Cloud (And What IT Can Do About It)
Careless Users In the Cloud (And What IT Can Do About It)
 
Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)
Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)
Managing Unrealistic User Expectations (i.e Digital for Spoilt Brats)
 
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
 
Research Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyondResearch Report: Cloud Trends in 2011 and beyond
Research Report: Cloud Trends in 2011 and beyond
 
Building The Pillars Of Modern Enterprise
Building The Pillars Of Modern EnterpriseBuilding The Pillars Of Modern Enterprise
Building The Pillars Of Modern Enterprise
 
Mobile Labs: Supercharge Mobile App Testing - All About Speed
Mobile Labs: Supercharge Mobile App Testing - All About SpeedMobile Labs: Supercharge Mobile App Testing - All About Speed
Mobile Labs: Supercharge Mobile App Testing - All About Speed
 
Tech Overload is Overblown: Cloud Apps and the Happiness Effect
Tech Overload is Overblown: Cloud Apps and the Happiness EffectTech Overload is Overblown: Cloud Apps and the Happiness Effect
Tech Overload is Overblown: Cloud Apps and the Happiness Effect
 
Next Steps In Your Digital Transformation
Next Steps In Your Digital TransformationNext Steps In Your Digital Transformation
Next Steps In Your Digital Transformation
 
DIGITALIZED WORLD- Technology Disruptions & Future Of Software Test Automation
DIGITALIZED WORLD- Technology Disruptions & Future Of Software Test AutomationDIGITALIZED WORLD- Technology Disruptions & Future Of Software Test Automation
DIGITALIZED WORLD- Technology Disruptions & Future Of Software Test Automation
 
Market landscape how pervasive technology has changed the game
Market landscape how pervasive technology has changed the gameMarket landscape how pervasive technology has changed the game
Market landscape how pervasive technology has changed the game
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...
Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...
Track B-2: Advancing Collaboration & eLearning to Achieve Mission Goals, ...
 
Composable Enterprise - Cloud, Mobile and IoT
Composable Enterprise - Cloud, Mobile and IoTComposable Enterprise - Cloud, Mobile and IoT
Composable Enterprise - Cloud, Mobile and IoT
 
Fighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and IntelligenceFighting Frauds Using Big Data Visibility and Intelligence
Fighting Frauds Using Big Data Visibility and Intelligence
 

Similar to Moving Sucks. Making Secure Cloud Migration Painless

Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the CloudMike Spaulding
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.martin_lee1969
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Vince Santo
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Big data, security, and the cloud
Big data, security, and the cloudBig data, security, and the cloud
Big data, security, and the cloudPano Xinos
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing NowHudson IT
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackBen Jones
 
Your Journey to the Cloud
Your Journey to the CloudYour Journey to the Cloud
Your Journey to the CloudDori Degenhardt
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudCapgemini
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security DemistyifiedMicrosoft UK
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...Aggregage
 

Similar to Moving Sucks. Making Secure Cloud Migration Painless (20)

Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Big data, security, and the cloud
Big data, security, and the cloudBig data, security, and the cloud
Big data, security, and the cloud
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses Back
 
Your Journey to the Cloud
Your Journey to the CloudYour Journey to the Cloud
Your Journey to the Cloud
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
 

More from JoAnna Cheshire

The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration PlaybookJoAnna Cheshire
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint FrameworkJoAnna Cheshire
 
PowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuidePowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuideJoAnna Cheshire
 
Artificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveArtificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveJoAnna Cheshire
 
Modernizing Data Management
Modernizing Data Management Modernizing Data Management
Modernizing Data Management JoAnna Cheshire
 
Microsoft and Enterprise Search
Microsoft and Enterprise Search Microsoft and Enterprise Search
Microsoft and Enterprise Search JoAnna Cheshire
 
Introduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsIntroduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsJoAnna Cheshire
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
Accelerate your business with flow
Accelerate your business with flowAccelerate your business with flow
Accelerate your business with flowJoAnna Cheshire
 
Building applications for your business using power apps and flow
Building applications for your business using power apps and flowBuilding applications for your business using power apps and flow
Building applications for your business using power apps and flowJoAnna Cheshire
 
The Decomposition Dilemma
The Decomposition DilemmaThe Decomposition Dilemma
The Decomposition DilemmaJoAnna Cheshire
 
Defending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itDefending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itJoAnna Cheshire
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageJoAnna Cheshire
 
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreHealthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreJoAnna Cheshire
 
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...JoAnna Cheshire
 
Define Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandDefine Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandJoAnna Cheshire
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 

More from JoAnna Cheshire (20)

The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
Catching the Next Train
Catching the Next TrainCatching the Next Train
Catching the Next Train
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint Framework
 
PowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuidePowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's Guide
 
Artificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveArtificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs Perspective
 
Modernizing Data Management
Modernizing Data Management Modernizing Data Management
Modernizing Data Management
 
Microsoft and Enterprise Search
Microsoft and Enterprise Search Microsoft and Enterprise Search
Microsoft and Enterprise Search
 
Introduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsIntroduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groups
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Accelerate your business with flow
Accelerate your business with flowAccelerate your business with flow
Accelerate your business with flow
 
Building applications for your business using power apps and flow
Building applications for your business using power apps and flowBuilding applications for your business using power apps and flow
Building applications for your business using power apps and flow
 
The Decomposition Dilemma
The Decomposition DilemmaThe Decomposition Dilemma
The Decomposition Dilemma
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
Defending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itDefending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about it
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business Advantage
 
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreHealthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
 
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
 
Define Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandDefine Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's Brand
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 

Recently uploaded

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Moving Sucks. Making Secure Cloud Migration Painless

  • 1. CONFIDENTIAL DO NOT DISTRIBUTE Moving Sucks Making Secure Cloud Migration Painless Dan Mannion VP of Partners and Alliances daniel.mannion@armor.com @dmannion
  • 2. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion 2 Agenda 01 Planning a cloud migration 02 Shared responsibility 03 Security considerations 04 Key takeaways
  • 3. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion MOVE FAST STAY SECUREOR
  • 4. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion MOVE FAST STAY SECUREAND
  • 5. Planning a Cloud Migration 5
  • 6. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion • Ability and scalability • Increased flexibility • Rapid infrastructure deployment • Free capex – pay only for what you consume Benefits of the Cloud
  • 7. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion Things to Consider 7 • Determine what you want to put in the cloud • Identify the right cloud environment (IaaS, PaaS, SaaS) • Identify deployment model • Re-architecting for cloud • Estimate value and costs up front • Find a security solution • Stay compliant
  • 9. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion Cloud can be more secure than your current environment. IDC released a report which found that most customers can be more secure than their on-premises environment. How? Source: Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment, IDC Automate logging and monitoring Simplifying resource access Make it easy to encrypt properly Enforcing strong authentication
  • 10. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion 10 It seems like you’re not responsible for much, right? APPLICATIONS DATA RUNTIME MIDDLEWARE OS VIRTUALIZATION SERVERS STORAGE NETWORKING APPLICATIONS DATA RUNTIME MIDDLEWARE OS VIRTUALIZATION SERVERS STORAGE NETWORKING Infrastructure (as a Service) Platform (as a Service) You Manage Provider Manages
  • 11. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion 11 It’s not simple. 3rd Party Cloud Azure AWS On Premises How do you account for: planning & strategy, staff, tools, training, execution, scaling, remediation, & threat hunting?
  • 12. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion 12 That means the biggest threat to your cloud is “you don’t know what you don’t know.” Top Strategic Predictions for 2016 and Beyond – Gartner 2016 95%OF CLOUD SECURITY FAILURES THROUGH 2020 WILL BE THE CUSTOMERS FAULT.
  • 13. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion Things to Consider 13 Impact on Business Cost of Shared Responsibility Talent Considerations
  • 15. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion 40% 15 The Challenges We All Face in 2017 910BN Record breaches in the last 10 years. www.privacyrights.org/data-breaches 3.2M RECORD BREACHES YTD That trend is going to continue. www.bloomberg.com/news/articles/2017-01-19/data-breaches-hit- record-in-2016-as-dnc-wendy-s-co-hacked INCREASE IN HACKS 2015-2016 $4M Per Ponemon Institute. www-03.ibm.com/security/data-breach/ $4M AVERAGE COST OF DATA BREACH www.privacyrights.org/data-breaches INCREASE IN COST SINCE 2013. Healthcare companies lose an average of $355 per each stolen record AVERAGE HEALTHCARE LOSS 29% $355 Transportation companies may only lose $129 per record AVERAGE TRANSPORTATION LOSS $129 3.2M 910BN
  • 16. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion What Happens If You Do Get Breached? 16 Most solutions are glorified alarm systems that simply notify of you a breach...leaving it up to you to remediate. 1616 Sources: https://www.csid.com/resources/stats/data-breaches/ VS 2 DAYS 146 DAYS
  • 17. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion Spot the Hacker 17 LIVEFULLTHROTTLE TANK, FATHER HUYDERMAN PETR0VICH, NOWHERE ALIRRP14 THEHEAD The images below are either from popular online dating websites, or are currently on the FBI Cyber’s Most Wanted list. Can you spot which are the proven malicious actors? Do their aliases help?
  • 18. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion Macro Cyber Security Trends = We are losing!!! TALENT SHORTAGE HOW THE SECURITY INDUSTRY IS FAILING US ALL Cybersecurity workforce shortage: Projected to reach 1.5 million by 2019 Cyber talent is expensive: ~20% more costly than general IT talent Cloud Security is new muscle: Even the top cybersecurity talent on the market is having to re-learn cybersecurity tools and techniques in the cloud 5000 security tools vendors: Deliver point solutions and no commitment to security outcomes MSSP market that treats every customer as a snowflake: “However you’re securing yourself today, we’ll turn that into a service” – aka “your mess for less” Compliance frameworks that deliver check boxes but not security: All major health, financial services, retail and government breaches were compliant organizations
  • 19. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion Founded on Trust. Fueled by Passion. 19 TRUSTED BY 1,200+ CUSTOMERS IN 45 COUNTRIES 4 OF THE TOP 10 HEALTHCARE IT COMPANIES MORE THAN $200 BILLION IN SECURE PAYMENT TRANSACTIONS C E R T I F I E D FOR Armor’s ability to deliver on data security enables us to dedicate resources to our core business of designing and delivering world- class experiences.” Sean McElroy Vice President of IT & Security “
  • 20. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion • Why are you moving to the cloud? Cost? Agility? Scalability? • How will you address the Shared Responsibility Model? • How will you upskill your team? Do you need outside help? • Design a multi-year plan and insure you understand implications of hybrid approach • Use this opportunity to design a solid disaster recovery plan – the cloud is great at DR • Complete a detailed analysis of cost/benefit and ensure you design new programs and policies to prevent cloud sprawl • Security and compliance in the cloud is different – now might be the time to outsource that burden Key Takeaways 20
  • 22. CONFIDENTIAL DO NOT DISTRIBUTE | THE FIRST TOTALLY SECURE CLOUD COMPANYTM @dmannion 22 Enter Your Business Card for a Chance to Win… ONE $100 Microsoft Store Gift Card
  • 23. CONFIDENTIAL DO NOT DISTRIBUTE Thank You Dan Mannion VP of Partners and Alliances daniel.mannion@armor.com @dmannion