SlideShare a Scribd company logo
1 of 31
Download to read offline
New	
  Security	
  Challenges	
  Facing	
  
Cloud	
  and	
  Mobile	
  Expansion	
  
Juan	
  M.	
  Velasco,	
  
	
  CEO,	
  Aiuken	
  Solu6ons.Spain	
  	
  
Company logos may appear on this title page
01The War of Currents: AC / DC
Cloud Electricity from 1900 to 1930
Nicola
Tesla
Topsy
1903
2
20th Century
19th Century
01 Cloud Introduction– Electricity Cloud
Electricity revolution vs Cloud Revolution
1890 – Anonymous Enterprise:
“Our Business doesn’t need any external current at all,
we are autonomous”
FROM
• No multi-client
• Limited Generation
• No standardization
• High investment required
• Dedicated technical team
required
• Local scope
http://www.ree.es/operacion/curvas_demanda.asp
TO
• Multi-Client
• Standard API (AC/DC – Voltage
110V-220V)
• Pay – per – Use
• 24x7 always on
• Remote management & support
• Unlimited service
• Worldwide service
How to find eficency with IT infrastructures?
IT evolution Cloud as IaaS / SaaS
IT
Infrastructures
Aplications
SW Base & Middleware
IT Equipment
DataCenter
Infrastructures
First Approach to
Cloud
Transformation
Manteinance consolidation
Operations consolidation
Support Considation
Standarazation
Software free
HW Consolidation
Virtualization
Cooling Consolidation
Free Cooling
Cold / Warm corridor
SaaS
IaaS
Services Centers
Private Cloud
(Sharing for Gov
only)
DataCenter
Consolidation
Cloud answer for:
Efficiency?
Standards?
Interoperativity? roll back?
Pricing?
Answers? Security?
SLAs?KPI?
Cloud is NOT a technology is a market transformation
In 2020, people will interact each day with more than 70 devices connected to
Internet. Nowadays we interact with less than 10 devices connected. The
M2M phenomenom will boots Cloud and Internet users and bandwidth use.
From 1 billion users today to 3 billion devices connected in 5 years
Cloud Computing
Market transformation
By 2014 will be more connected devices to Internet than
people on Earth
x5
10/28/13 8
x26
Mobility as an answer for :
Availability
Platforms?
Security?
Standards?
Applications?
BYOD? Backup?
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
Mobile Risk
Fuente: http://searchmobilecomputing.techtarget.com/ (201
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
BYOD `Bring Your Own Device´
BYOD and consumerization, is one based on the desire of
employees to use their own mobile devices (phones,
smartphones, tablets, laptops ...) in the workplace and access to
information from this company, such as the corporate email, DB
or file servers.
It is a reality accepted by IT departments, in the post-pc
According to a survey of CISCO over 90% of CIOs surveyed said
they permit, even doing the "blind eye," the use of mobile devices
owned by employees to access their data.
Of the principals surveyed more than two thirds have overcome
fears this trend and see it as something positive for the
organization.
Yet another study, this time from the company BT, puts out the
lack of vision of the potential risks of this practice on the part of
employees, as only one in four sees risk in using their own
devices, when almost 40% of companies have experienced
security incidents related to this issue.
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
BYOD `Bring Your Own Device´
BYOD the New Threat door
ncreased
Mobile+
Cloud
More Users + More Devices + More Services
Reduced Stress =More Capacity + More Control + More Visibility
DDos
¿Donde se para un DDoS?
CLOUD	
  Security	
  concerns	
  
Concerns about Public Cloud (not
private Cloud?)
15
July,5th 1993.THE NEWYORKER
IDENTITY?
Why	
  is	
  this	
  happening?	
  IPv4	
  
Session / Paper Title 1815-16 Oct 2013
Why	
  is	
  this	
  happening?	
  IPv4	
  
Session / Paper Title 1915-16 Oct 2013
Growing	
  of	
  new	
  aAacks	
  and	
  APTs	
  
	
  
•  Number	
  of	
  threaths	
  x5	
  in	
  4	
  years	
  
•  Nature	
  of	
  threats	
  and	
  aHacks	
  change:	
  
–  From	
  general	
  and	
  diverse	
  to	
  persistent,	
  
avanced	
  and	
  oriented	
  
•  Avanced	
  aHacks	
  grow	
  
–  High	
  vic6ms	
  level	
  profile	
  (i.e,	
  RSA;	
  
Symantec,	
  Google)	
  
–  Great	
  variety	
  of	
  new	
  APTs	
  like	
  Aurora	
  
Opera6on,	
  Shady	
  RAT,	
  GhostNet,	
  
Night	
  Dragon,	
  Nitro	
  
“Organizations face an evolving threat scenario that they are ill-prepared to
deal with….advanced threats that have bypassed their traditional security
protection techniques and reside undetected on their systems.”
Gartner, 2012
2004 2006 2008 2010 2012
Advanced
Persistent Threats
Zero-day
Targeted Attacks
Dynamic Trojans
Stealth Bots
Worms
Viruses
Disruption Spyware/
Bots
Cybercrime
Cyber-espionage
and Cybercrime
DamageofAttacks
Source
APT	
  AAacks.	
  AAacks	
  profile	
  has	
  increased	
  
source
APTs,	
  new	
  tools	
  for	
  DDoS	
  /	
  TDoS
Advanced Persistent Threats (APTs) are created by different organizations from
hackers like Lulzsec, Anonymous,etc. Also by Federeal Goverments like CIA,
Mossad, etc.Their main motivation are:
1.  Goverment
2.  Economical
3.  Technical
4.  Military
23
Botnets	
  
Botnet	
  Ecosystem	
  
24
Botnets	
  
The	
  Criminal	
  Opera6ons	
  Team	
  
DDoS	
  the	
  increasing	
  threat,	
  for	
  all	
  Internet	
  Services	
  
Reason	
  1	
  
• Universal	
  
Reason	
  2	
  
• Cheap	
  
Reason	
  3	
  
• Eficiency	
  
Reason	
  4	
  
• No	
  pushment	
  
Reason	
  5	
  
• Big	
  Impact	
  
Reason	
  6	
  
• Easy	
  to	
  replicate	
  
Reason	
  7	
  
• Underes6mate	
  
28
The New Perimeter. Security for and
from Cloud.
•  Cloud	
  must	
  play	
  an	
  
ac6ve	
  defense	
  role	
  
•  Cloud	
  must	
  be	
  an	
  
ac6ve	
  player	
  for	
  the	
  
perimeter	
  defense	
  
•  Cloud	
  can	
  be	
  use	
  
nowadays	
  as	
  an	
  
ac6ve	
  extension	
  of	
  
our	
  security	
  
perimeter	
  
•  Cloud	
  nowadays	
  is	
  
able	
  to	
  provide	
  at	
  
least	
  secure	
  email	
  
and	
  internet	
  access	
  
•  Cloud	
  must	
  provide	
  
ac6ve	
  defense	
  
ACT don’t REACT
29
Email Security
Security	
  Challenges	
  of	
  Email	
  in	
  the	
  Cloud	
  
Conclusion:	
  Secure	
  Cloud+	
  Mobile	
  
Session / Paper Title 3015-16 Oct 2013
Clean Pipes AntiDDoS
SOC
DataCentre
AntiAPTs
ID Mgmt
DNSNAT
IPv6LTE
WAFDPI
31
Juan Miguel Velasco López-Urda
jmvelasco@aiuken.com
CEO Aiuken Solutions

More Related Content

What's hot

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsVertex Holdings
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditingsyrinxtech
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013Wolfgang Kandek
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
 

What's hot (19)

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environments
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditing
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
Cyber security colombo meetup
Cyber security colombo meetupCyber security colombo meetup
Cyber security colombo meetup
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 

Viewers also liked

mferrari_collateral_portfolio
mferrari_collateral_portfoliomferrari_collateral_portfolio
mferrari_collateral_portfolioMike Ferrari
 
Bibliografías de manejo de materiales
Bibliografías de manejo de materialesBibliografías de manejo de materiales
Bibliografías de manejo de materialesnohelisbaquero
 
Presentation_Found Money Program
Presentation_Found Money ProgramPresentation_Found Money Program
Presentation_Found Money ProgramMatt Walsh
 
Las políticas del gobierno cardenista
Las políticas del gobierno cardenistaLas políticas del gobierno cardenista
Las políticas del gobierno cardenistaAlexis Hernandez
 
AWMI NY Chapter 2015 Calendar
AWMI NY Chapter 2015 CalendarAWMI NY Chapter 2015 Calendar
AWMI NY Chapter 2015 CalendarBecky E Hites
 
Academic Presentation On Review Of Road Network
Academic Presentation On Review Of Road NetworkAcademic Presentation On Review Of Road Network
Academic Presentation On Review Of Road NetworkKamal Rumah
 

Viewers also liked (13)

mferrari_collateral_portfolio
mferrari_collateral_portfoliomferrari_collateral_portfolio
mferrari_collateral_portfolio
 
Porfolio
PorfolioPorfolio
Porfolio
 
Bibliografías de manejo de materiales
Bibliografías de manejo de materialesBibliografías de manejo de materiales
Bibliografías de manejo de materiales
 
Heba elkhouly cv
Heba elkhouly cvHeba elkhouly cv
Heba elkhouly cv
 
Presentation_Found Money Program
Presentation_Found Money ProgramPresentation_Found Money Program
Presentation_Found Money Program
 
Las políticas del gobierno cardenista
Las políticas del gobierno cardenistaLas políticas del gobierno cardenista
Las políticas del gobierno cardenista
 
El dengue 2
El dengue 2El dengue 2
El dengue 2
 
AWMI NY Chapter 2015 Calendar
AWMI NY Chapter 2015 CalendarAWMI NY Chapter 2015 Calendar
AWMI NY Chapter 2015 Calendar
 
JabriX compilation 1
JabriX compilation 1JabriX compilation 1
JabriX compilation 1
 
Tairell Leeyoung ppt
Tairell Leeyoung pptTairell Leeyoung ppt
Tairell Leeyoung ppt
 
Neha_Kansal
Neha_KansalNeha_Kansal
Neha_Kansal
 
RDS 2016 - Presse Canada
RDS 2016 - Presse CanadaRDS 2016 - Presse Canada
RDS 2016 - Presse Canada
 
Academic Presentation On Review Of Road Network
Academic Presentation On Review Of Road NetworkAcademic Presentation On Review Of Road Network
Academic Presentation On Review Of Road Network
 

Similar to Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing

Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?OurCrowd
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse Microsoft
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...Amazon Web Services
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017SMAU
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 

Similar to Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing (20)

Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 

Recently uploaded

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 

Recently uploaded (20)

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 

Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing

  • 1. New  Security  Challenges  Facing   Cloud  and  Mobile  Expansion   Juan  M.  Velasco,    CEO,  Aiuken  Solu6ons.Spain     Company logos may appear on this title page
  • 2. 01The War of Currents: AC / DC Cloud Electricity from 1900 to 1930 Nicola Tesla Topsy 1903 2 20th Century 19th Century
  • 3. 01 Cloud Introduction– Electricity Cloud Electricity revolution vs Cloud Revolution 1890 – Anonymous Enterprise: “Our Business doesn’t need any external current at all, we are autonomous” FROM • No multi-client • Limited Generation • No standardization • High investment required • Dedicated technical team required • Local scope http://www.ree.es/operacion/curvas_demanda.asp TO • Multi-Client • Standard API (AC/DC – Voltage 110V-220V) • Pay – per – Use • 24x7 always on • Remote management & support • Unlimited service • Worldwide service
  • 4. How to find eficency with IT infrastructures? IT evolution Cloud as IaaS / SaaS IT Infrastructures Aplications SW Base & Middleware IT Equipment DataCenter Infrastructures First Approach to Cloud Transformation Manteinance consolidation Operations consolidation Support Considation Standarazation Software free HW Consolidation Virtualization Cooling Consolidation Free Cooling Cold / Warm corridor SaaS IaaS Services Centers Private Cloud (Sharing for Gov only) DataCenter Consolidation
  • 5. Cloud answer for: Efficiency? Standards? Interoperativity? roll back? Pricing? Answers? Security? SLAs?KPI?
  • 6. Cloud is NOT a technology is a market transformation In 2020, people will interact each day with more than 70 devices connected to Internet. Nowadays we interact with less than 10 devices connected. The M2M phenomenom will boots Cloud and Internet users and bandwidth use. From 1 billion users today to 3 billion devices connected in 5 years Cloud Computing Market transformation
  • 7. By 2014 will be more connected devices to Internet than people on Earth x5
  • 9. Mobility as an answer for : Availability Platforms? Security? Standards? Applications? BYOD? Backup?
  • 10. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E Mobile Risk Fuente: http://searchmobilecomputing.techtarget.com/ (201
  • 11. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E BYOD `Bring Your Own Device´ BYOD and consumerization, is one based on the desire of employees to use their own mobile devices (phones, smartphones, tablets, laptops ...) in the workplace and access to information from this company, such as the corporate email, DB or file servers. It is a reality accepted by IT departments, in the post-pc According to a survey of CISCO over 90% of CIOs surveyed said they permit, even doing the "blind eye," the use of mobile devices owned by employees to access their data. Of the principals surveyed more than two thirds have overcome fears this trend and see it as something positive for the organization. Yet another study, this time from the company BT, puts out the lack of vision of the potential risks of this practice on the part of employees, as only one in four sees risk in using their own devices, when almost 40% of companies have experienced security incidents related to this issue.
  • 12. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E BYOD `Bring Your Own Device´ BYOD the New Threat door
  • 13. ncreased Mobile+ Cloud More Users + More Devices + More Services Reduced Stress =More Capacity + More Control + More Visibility DDos ¿Donde se para un DDoS?
  • 14. CLOUD  Security  concerns   Concerns about Public Cloud (not private Cloud?)
  • 15. 15
  • 17.
  • 18. Why  is  this  happening?  IPv4   Session / Paper Title 1815-16 Oct 2013
  • 19. Why  is  this  happening?  IPv4   Session / Paper Title 1915-16 Oct 2013
  • 20. Growing  of  new  aAacks  and  APTs     •  Number  of  threaths  x5  in  4  years   •  Nature  of  threats  and  aHacks  change:   –  From  general  and  diverse  to  persistent,   avanced  and  oriented   •  Avanced  aHacks  grow   –  High  vic6ms  level  profile  (i.e,  RSA;   Symantec,  Google)   –  Great  variety  of  new  APTs  like  Aurora   Opera6on,  Shady  RAT,  GhostNet,   Night  Dragon,  Nitro   “Organizations face an evolving threat scenario that they are ill-prepared to deal with….advanced threats that have bypassed their traditional security protection techniques and reside undetected on their systems.” Gartner, 2012 2004 2006 2008 2010 2012 Advanced Persistent Threats Zero-day Targeted Attacks Dynamic Trojans Stealth Bots Worms Viruses Disruption Spyware/ Bots Cybercrime Cyber-espionage and Cybercrime DamageofAttacks Source
  • 21. APT  AAacks.  AAacks  profile  has  increased   source
  • 22. APTs,  new  tools  for  DDoS  /  TDoS Advanced Persistent Threats (APTs) are created by different organizations from hackers like Lulzsec, Anonymous,etc. Also by Federeal Goverments like CIA, Mossad, etc.Their main motivation are: 1.  Goverment 2.  Economical 3.  Technical 4.  Military
  • 24. 24 Botnets   The  Criminal  Opera6ons  Team  
  • 25. DDoS  the  increasing  threat,  for  all  Internet  Services   Reason  1   • Universal   Reason  2   • Cheap   Reason  3   • Eficiency   Reason  4   • No  pushment   Reason  5   • Big  Impact   Reason  6   • Easy  to  replicate   Reason  7   • Underes6mate  
  • 26.
  • 27.
  • 28. 28 The New Perimeter. Security for and from Cloud. •  Cloud  must  play  an   ac6ve  defense  role   •  Cloud  must  be  an   ac6ve  player  for  the   perimeter  defense   •  Cloud  can  be  use   nowadays  as  an   ac6ve  extension  of   our  security   perimeter   •  Cloud  nowadays  is   able  to  provide  at   least  secure  email   and  internet  access   •  Cloud  must  provide   ac6ve  defense   ACT don’t REACT
  • 29. 29 Email Security Security  Challenges  of  Email  in  the  Cloud  
  • 30. Conclusion:  Secure  Cloud+  Mobile   Session / Paper Title 3015-16 Oct 2013 Clean Pipes AntiDDoS SOC DataCentre AntiAPTs ID Mgmt DNSNAT IPv6LTE WAFDPI
  • 31. 31 Juan Miguel Velasco López-Urda jmvelasco@aiuken.com CEO Aiuken Solutions