SlideShare a Scribd company logo
1 of 31
Download to read offline
New	
  Security	
  Challenges	
  Facing	
  
Cloud	
  and	
  Mobile	
  Expansion	
  
Juan	
  M.	
  Velasco,	
  
	
  CEO,	
  Aiuken	
  Solu6ons.Spain	
  	
  
Company logos may appear on this title page
01The War of Currents: AC / DC
Cloud Electricity from 1900 to 1930
Nicola
Tesla
Topsy
1903
2
20th Century
19th Century
01 Cloud Introduction– Electricity Cloud
Electricity revolution vs Cloud Revolution
1890 – Anonymous Enterprise:
“Our Business doesn’t need any external current at all,
we are autonomous”
FROM
• No multi-client
• Limited Generation
• No standardization
• High investment required
• Dedicated technical team
required
• Local scope
http://www.ree.es/operacion/curvas_demanda.asp
TO
• Multi-Client
• Standard API (AC/DC – Voltage
110V-220V)
• Pay – per – Use
• 24x7 always on
• Remote management & support
• Unlimited service
• Worldwide service
How to find eficency with IT infrastructures?
IT evolution Cloud as IaaS / SaaS
IT
Infrastructures
Aplications
SW Base & Middleware
IT Equipment
DataCenter
Infrastructures
First Approach to
Cloud
Transformation
Manteinance consolidation
Operations consolidation
Support Considation
Standarazation
Software free
HW Consolidation
Virtualization
Cooling Consolidation
Free Cooling
Cold / Warm corridor
SaaS
IaaS
Services Centers
Private Cloud
(Sharing for Gov
only)
DataCenter
Consolidation
Cloud answer for:
Efficiency?
Standards?
Interoperativity? roll back?
Pricing?
Answers? Security?
SLAs?KPI?
Cloud is NOT a technology is a market transformation
In 2020, people will interact each day with more than 70 devices connected to
Internet. Nowadays we interact with less than 10 devices connected. The
M2M phenomenom will boots Cloud and Internet users and bandwidth use.
From 1 billion users today to 3 billion devices connected in 5 years
Cloud Computing
Market transformation
By 2014 will be more connected devices to Internet than
people on Earth
x5
10/28/13 8
x26
Mobility as an answer for :
Availability
Platforms?
Security?
Standards?
Applications?
BYOD? Backup?
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
Mobile Risk
Fuente: http://searchmobilecomputing.techtarget.com/ (201
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
BYOD `Bring Your Own Device´
BYOD and consumerization, is one based on the desire of
employees to use their own mobile devices (phones,
smartphones, tablets, laptops ...) in the workplace and access to
information from this company, such as the corporate email, DB
or file servers.
It is a reality accepted by IT departments, in the post-pc
According to a survey of CISCO over 90% of CIOs surveyed said
they permit, even doing the "blind eye," the use of mobile devices
owned by employees to access their data.
Of the principals surveyed more than two thirds have overcome
fears this trend and see it as something positive for the
organization.
Yet another study, this time from the company BT, puts out the
lack of vision of the potential risks of this practice on the part of
employees, as only one in four sees risk in using their own
devices, when almost 40% of companies have experienced
security incidents related to this issue.
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
BYOD `Bring Your Own Device´
BYOD the New Threat door
ncreased
Mobile+
Cloud
More Users + More Devices + More Services
Reduced Stress =More Capacity + More Control + More Visibility
DDos
¿Donde se para un DDoS?
CLOUD	
  Security	
  concerns	
  
Concerns about Public Cloud (not
private Cloud?)
15
July,5th 1993.THE NEWYORKER
IDENTITY?
Why	
  is	
  this	
  happening?	
  IPv4	
  
Session / Paper Title 1815-16 Oct 2013
Why	
  is	
  this	
  happening?	
  IPv4	
  
Session / Paper Title 1915-16 Oct 2013
Growing	
  of	
  new	
  aAacks	
  and	
  APTs	
  
	
  
•  Number	
  of	
  threaths	
  x5	
  in	
  4	
  years	
  
•  Nature	
  of	
  threats	
  and	
  aHacks	
  change:	
  
–  From	
  general	
  and	
  diverse	
  to	
  persistent,	
  
avanced	
  and	
  oriented	
  
•  Avanced	
  aHacks	
  grow	
  
–  High	
  vic6ms	
  level	
  profile	
  (i.e,	
  RSA;	
  
Symantec,	
  Google)	
  
–  Great	
  variety	
  of	
  new	
  APTs	
  like	
  Aurora	
  
Opera6on,	
  Shady	
  RAT,	
  GhostNet,	
  
Night	
  Dragon,	
  Nitro	
  
“Organizations face an evolving threat scenario that they are ill-prepared to
deal with….advanced threats that have bypassed their traditional security
protection techniques and reside undetected on their systems.”
Gartner, 2012
2004 2006 2008 2010 2012
Advanced
Persistent Threats
Zero-day
Targeted Attacks
Dynamic Trojans
Stealth Bots
Worms
Viruses
Disruption Spyware/
Bots
Cybercrime
Cyber-espionage
and Cybercrime
DamageofAttacks
Source
APT	
  AAacks.	
  AAacks	
  profile	
  has	
  increased	
  
source
APTs,	
  new	
  tools	
  for	
  DDoS	
  /	
  TDoS
Advanced Persistent Threats (APTs) are created by different organizations from
hackers like Lulzsec, Anonymous,etc. Also by Federeal Goverments like CIA,
Mossad, etc.Their main motivation are:
1.  Goverment
2.  Economical
3.  Technical
4.  Military
23
Botnets	
  
Botnet	
  Ecosystem	
  
24
Botnets	
  
The	
  Criminal	
  Opera6ons	
  Team	
  
DDoS	
  the	
  increasing	
  threat,	
  for	
  all	
  Internet	
  Services	
  
Reason	
  1	
  
• Universal	
  
Reason	
  2	
  
• Cheap	
  
Reason	
  3	
  
• Eficiency	
  
Reason	
  4	
  
• No	
  pushment	
  
Reason	
  5	
  
• Big	
  Impact	
  
Reason	
  6	
  
• Easy	
  to	
  replicate	
  
Reason	
  7	
  
• Underes6mate	
  
28
The New Perimeter. Security for and
from Cloud.
•  Cloud	
  must	
  play	
  an	
  
ac6ve	
  defense	
  role	
  
•  Cloud	
  must	
  be	
  an	
  
ac6ve	
  player	
  for	
  the	
  
perimeter	
  defense	
  
•  Cloud	
  can	
  be	
  use	
  
nowadays	
  as	
  an	
  
ac6ve	
  extension	
  of	
  
our	
  security	
  
perimeter	
  
•  Cloud	
  nowadays	
  is	
  
able	
  to	
  provide	
  at	
  
least	
  secure	
  email	
  
and	
  internet	
  access	
  
•  Cloud	
  must	
  provide	
  
ac6ve	
  defense	
  
ACT don’t REACT
29
Email Security
Security	
  Challenges	
  of	
  Email	
  in	
  the	
  Cloud	
  
Conclusion:	
  Secure	
  Cloud+	
  Mobile	
  
Session / Paper Title 3015-16 Oct 2013
Clean Pipes AntiDDoS
SOC
DataCentre
AntiAPTs
ID Mgmt
DNSNAT
IPv6LTE
WAFDPI
31
Juan Miguel Velasco López-Urda
jmvelasco@aiuken.com
CEO Aiuken Solutions

More Related Content

What's hot

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsVertex Holdings
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditingsyrinxtech
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013Wolfgang Kandek
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
 

What's hot (19)

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environments
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditing
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
Cyber security colombo meetup
Cyber security colombo meetupCyber security colombo meetup
Cyber security colombo meetup
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 

Viewers also liked

‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد __يرفع آسمى معانى الشكر وا...
‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد  __يرفع آسمى معانى الشكر وا...‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد  __يرفع آسمى معانى الشكر وا...
‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد __يرفع آسمى معانى الشكر وا...alkoga teacher
 
Instructional Design Part 2
Instructional Design Part 2Instructional Design Part 2
Instructional Design Part 2heathh
 
Project - Week 7
Project - Week 7Project - Week 7
Project - Week 7mlwilson522
 
Surviving Economic Crises through Education
Surviving Economic Crises through EducationSurviving Economic Crises through Education
Surviving Economic Crises through EducationDavid R Cole
 
Guió judici sessió 4
Guió judici sessió 4Guió judici sessió 4
Guió judici sessió 4reduiressumar
 

Viewers also liked (13)

301330 tc3 9
301330 tc3 9301330 tc3 9
301330 tc3 9
 
my CV
my CVmy CV
my CV
 
C tutorial
C tutorialC tutorial
C tutorial
 
‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد __يرفع آسمى معانى الشكر وا...
‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد  __يرفع آسمى معانى الشكر وا...‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد  __يرفع آسمى معانى الشكر وا...
‫إلى ‫#‏الرئيس عبد الفتاح_السيسى‬ __ الحسينى محمد __يرفع آسمى معانى الشكر وا...
 
Instructional Design Part 2
Instructional Design Part 2Instructional Design Part 2
Instructional Design Part 2
 
Project - Week 7
Project - Week 7Project - Week 7
Project - Week 7
 
Surviving Economic Crises through Education
Surviving Economic Crises through EducationSurviving Economic Crises through Education
Surviving Economic Crises through Education
 
Learning HTML
Learning HTMLLearning HTML
Learning HTML
 
wedding ideas
wedding ideaswedding ideas
wedding ideas
 
公開
公開公開
公開
 
sofia azam
sofia azamsofia azam
sofia azam
 
Guió judici sessió 4
Guió judici sessió 4Guió judici sessió 4
Guió judici sessió 4
 
Resume
ResumeResume
Resume
 

Similar to New Security Challenges Facing Cloud and Mobile Expansion

Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?OurCrowd
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse Microsoft
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...Amazon Web Services
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017SMAU
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 

Similar to New Security Challenges Facing Cloud and Mobile Expansion (20)

Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 

Recently uploaded

Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDemandbase
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationAli Raza
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一s SS
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckToluwanimi Balogun
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)Jomer Gregorio
 
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptxBrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptxcollette15
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?Searchable Design
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldScalenut
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingJuan Pineda
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesPushON Ltd
 
Word Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample GenresWord Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample GenresLisa M. Masiello
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentationdgtivemarketingagenc
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AIRinky
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 

Recently uploaded (20)

Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store Optimization
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship Deck
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)
 
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptxBrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven World
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO Copywriting
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surges
 
Word Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample GenresWord Count for Writers: Examples of Word Counts for Sample Genres
Word Count for Writers: Examples of Word Counts for Sample Genres
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentation
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AI
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 

New Security Challenges Facing Cloud and Mobile Expansion

  • 1. New  Security  Challenges  Facing   Cloud  and  Mobile  Expansion   Juan  M.  Velasco,    CEO,  Aiuken  Solu6ons.Spain     Company logos may appear on this title page
  • 2. 01The War of Currents: AC / DC Cloud Electricity from 1900 to 1930 Nicola Tesla Topsy 1903 2 20th Century 19th Century
  • 3. 01 Cloud Introduction– Electricity Cloud Electricity revolution vs Cloud Revolution 1890 – Anonymous Enterprise: “Our Business doesn’t need any external current at all, we are autonomous” FROM • No multi-client • Limited Generation • No standardization • High investment required • Dedicated technical team required • Local scope http://www.ree.es/operacion/curvas_demanda.asp TO • Multi-Client • Standard API (AC/DC – Voltage 110V-220V) • Pay – per – Use • 24x7 always on • Remote management & support • Unlimited service • Worldwide service
  • 4. How to find eficency with IT infrastructures? IT evolution Cloud as IaaS / SaaS IT Infrastructures Aplications SW Base & Middleware IT Equipment DataCenter Infrastructures First Approach to Cloud Transformation Manteinance consolidation Operations consolidation Support Considation Standarazation Software free HW Consolidation Virtualization Cooling Consolidation Free Cooling Cold / Warm corridor SaaS IaaS Services Centers Private Cloud (Sharing for Gov only) DataCenter Consolidation
  • 5. Cloud answer for: Efficiency? Standards? Interoperativity? roll back? Pricing? Answers? Security? SLAs?KPI?
  • 6. Cloud is NOT a technology is a market transformation In 2020, people will interact each day with more than 70 devices connected to Internet. Nowadays we interact with less than 10 devices connected. The M2M phenomenom will boots Cloud and Internet users and bandwidth use. From 1 billion users today to 3 billion devices connected in 5 years Cloud Computing Market transformation
  • 7. By 2014 will be more connected devices to Internet than people on Earth x5
  • 9. Mobility as an answer for : Availability Platforms? Security? Standards? Applications? BYOD? Backup?
  • 10. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E Mobile Risk Fuente: http://searchmobilecomputing.techtarget.com/ (201
  • 11. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E BYOD `Bring Your Own Device´ BYOD and consumerization, is one based on the desire of employees to use their own mobile devices (phones, smartphones, tablets, laptops ...) in the workplace and access to information from this company, such as the corporate email, DB or file servers. It is a reality accepted by IT departments, in the post-pc According to a survey of CISCO over 90% of CIOs surveyed said they permit, even doing the "blind eye," the use of mobile devices owned by employees to access their data. Of the principals surveyed more than two thirds have overcome fears this trend and see it as something positive for the organization. Yet another study, this time from the company BT, puts out the lack of vision of the potential risks of this practice on the part of employees, as only one in four sees risk in using their own devices, when almost 40% of companies have experienced security incidents related to this issue.
  • 12. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E BYOD `Bring Your Own Device´ BYOD the New Threat door
  • 13. ncreased Mobile+ Cloud More Users + More Devices + More Services Reduced Stress =More Capacity + More Control + More Visibility DDos ¿Donde se para un DDoS?
  • 14. CLOUD  Security  concerns   Concerns about Public Cloud (not private Cloud?)
  • 15. 15
  • 17.
  • 18. Why  is  this  happening?  IPv4   Session / Paper Title 1815-16 Oct 2013
  • 19. Why  is  this  happening?  IPv4   Session / Paper Title 1915-16 Oct 2013
  • 20. Growing  of  new  aAacks  and  APTs     •  Number  of  threaths  x5  in  4  years   •  Nature  of  threats  and  aHacks  change:   –  From  general  and  diverse  to  persistent,   avanced  and  oriented   •  Avanced  aHacks  grow   –  High  vic6ms  level  profile  (i.e,  RSA;   Symantec,  Google)   –  Great  variety  of  new  APTs  like  Aurora   Opera6on,  Shady  RAT,  GhostNet,   Night  Dragon,  Nitro   “Organizations face an evolving threat scenario that they are ill-prepared to deal with….advanced threats that have bypassed their traditional security protection techniques and reside undetected on their systems.” Gartner, 2012 2004 2006 2008 2010 2012 Advanced Persistent Threats Zero-day Targeted Attacks Dynamic Trojans Stealth Bots Worms Viruses Disruption Spyware/ Bots Cybercrime Cyber-espionage and Cybercrime DamageofAttacks Source
  • 21. APT  AAacks.  AAacks  profile  has  increased   source
  • 22. APTs,  new  tools  for  DDoS  /  TDoS Advanced Persistent Threats (APTs) are created by different organizations from hackers like Lulzsec, Anonymous,etc. Also by Federeal Goverments like CIA, Mossad, etc.Their main motivation are: 1.  Goverment 2.  Economical 3.  Technical 4.  Military
  • 24. 24 Botnets   The  Criminal  Opera6ons  Team  
  • 25. DDoS  the  increasing  threat,  for  all  Internet  Services   Reason  1   • Universal   Reason  2   • Cheap   Reason  3   • Eficiency   Reason  4   • No  pushment   Reason  5   • Big  Impact   Reason  6   • Easy  to  replicate   Reason  7   • Underes6mate  
  • 26.
  • 27.
  • 28. 28 The New Perimeter. Security for and from Cloud. •  Cloud  must  play  an   ac6ve  defense  role   •  Cloud  must  be  an   ac6ve  player  for  the   perimeter  defense   •  Cloud  can  be  use   nowadays  as  an   ac6ve  extension  of   our  security   perimeter   •  Cloud  nowadays  is   able  to  provide  at   least  secure  email   and  internet  access   •  Cloud  must  provide   ac6ve  defense   ACT don’t REACT
  • 29. 29 Email Security Security  Challenges  of  Email  in  the  Cloud  
  • 30. Conclusion:  Secure  Cloud+  Mobile   Session / Paper Title 3015-16 Oct 2013 Clean Pipes AntiDDoS SOC DataCentre AntiAPTs ID Mgmt DNSNAT IPv6LTE WAFDPI
  • 31. 31 Juan Miguel Velasco López-Urda jmvelasco@aiuken.com CEO Aiuken Solutions