1Big Data, Security, and the Cloud:This isn’t Football, It’s Your Data          Pano M. Xinos
2Whirlwind TourWhere have we been?Where are we now?Where are we going?
3WHERE HAVE WE BEEN?
4The PastMainframeClient-server modele-CommerceVirtualisationOutsourcing
5WHERE ARE WE NOW?
6The PresentEarly days of massive decentralizationFocus on cost cuttingFocus on increasing agility/flexibility
7Big Data   BigData, Clou    dComputingBig Data,Security
8WHERE ARE WE GOING?
9The FutureCommodity based computeCommodity based storageImperative to revise governance
10To be clear…“Big Data is not a hail-mary pass. It’s arunning play with the defensive teamrunning in slow motion.”       ...
11THE CLOUD AND YOU(R BIG DATA)
12Cloud Computing In ReviewEssential CharacteristicsOn-demand, Self-serviceBroad network accessResource poolingRapid elast...
13 Cloud Computing—Part DeuxDeployment Models   Service ModelsPublic Cloud        InfrastructurePrivate Cloud       Platfo...
14Big Data <3’s Cloud     Massive workloads,            meet      Cloud Computing          XOXOXOX
15SECURITY AND YOU(R BIG DATA)
16Security is not one-size-fits-all                 http://teradatamagazine.com/v09n04/Features/One-size-does-not-fit-all/
17And…It should be tightly coupled with yourtolerance to risk and risk managementpolicies including BC/DR
18Ownage!          http://www.citytv.com/toronto/citynews/sports/article/231050
19I’ve said this before…“The biggest security vulnerability is people.Always has been, always will be.”                   ...
20StandardsCSA STAR and BDWGNIST reference architectureITU reference architecture
21Service Level AgreementsWhat is the value of your brand?QMUL Cloud Legal Project…leave a lot to be desired
22Privacy“...Privacy by Design -privacy by default, end-to-end security, and strong accountability- byenabling enterprises...
23How-toDress in layersObfuscate data                          IDC, circa 2010Address vulnerabilitiesApp security
24Example of Personal Security“SolaS uses Lockheed Martin’sintelligence-driven defense approachto provide proactive and co...
25To Sum Up...Cloud, Big Data, and SecurityTolerance to RiskGovernanceAdaptability
26                THANK YOU!                QUESTIONS?Pano M. XinosPanoXinos.TDWI@GMail.comhttp://ca.LinkedIn.com/in/panox...
Upcoming SlideShare
Loading in …5
×

Big data, security, and the cloud

483 views

Published on

Presentation from TDWI Solution Summit: Cloud BI

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Big data, security, and the cloud

  1. 1. 1Big Data, Security, and the Cloud:This isn’t Football, It’s Your Data Pano M. Xinos
  2. 2. 2Whirlwind TourWhere have we been?Where are we now?Where are we going?
  3. 3. 3WHERE HAVE WE BEEN?
  4. 4. 4The PastMainframeClient-server modele-CommerceVirtualisationOutsourcing
  5. 5. 5WHERE ARE WE NOW?
  6. 6. 6The PresentEarly days of massive decentralizationFocus on cost cuttingFocus on increasing agility/flexibility
  7. 7. 7Big Data BigData, Clou dComputingBig Data,Security
  8. 8. 8WHERE ARE WE GOING?
  9. 9. 9The FutureCommodity based computeCommodity based storageImperative to revise governance
  10. 10. 10To be clear…“Big Data is not a hail-mary pass. It’s arunning play with the defensive teamrunning in slow motion.” –Me
  11. 11. 11THE CLOUD AND YOU(R BIG DATA)
  12. 12. 12Cloud Computing In ReviewEssential CharacteristicsOn-demand, Self-serviceBroad network accessResource poolingRapid elasticityMeasured service
  13. 13. 13 Cloud Computing—Part DeuxDeployment Models Service ModelsPublic Cloud InfrastructurePrivate Cloud PlatformCommunity Cloud SoftwareHybrid Cloud
  14. 14. 14Big Data <3’s Cloud Massive workloads, meet Cloud Computing XOXOXOX
  15. 15. 15SECURITY AND YOU(R BIG DATA)
  16. 16. 16Security is not one-size-fits-all http://teradatamagazine.com/v09n04/Features/One-size-does-not-fit-all/
  17. 17. 17And…It should be tightly coupled with yourtolerance to risk and risk managementpolicies including BC/DR
  18. 18. 18Ownage! http://www.citytv.com/toronto/citynews/sports/article/231050
  19. 19. 19I’ve said this before…“The biggest security vulnerability is people.Always has been, always will be.” -Me
  20. 20. 20StandardsCSA STAR and BDWGNIST reference architectureITU reference architecture
  21. 21. 21Service Level AgreementsWhat is the value of your brand?QMUL Cloud Legal Project…leave a lot to be desired
  22. 22. 22Privacy“...Privacy by Design -privacy by default, end-to-end security, and strong accountability- byenabling enterprises to automatically encrypt(decrypt) data locally and on-the-fly when usingthird-party cloud [based] serviceapplications, with no loss of functionality.Maintaining control over encryption anddecryption processes is an excellent approach tosafeguarding personal data, regardless of wherethe data resides.” –Ann Cavoukian, Ph.D. Information and Privacy Commissioner of Ontario, Canada http://www.perspecsys.com/
  23. 23. 23How-toDress in layersObfuscate data IDC, circa 2010Address vulnerabilitiesApp security
  24. 24. 24Example of Personal Security“SolaS uses Lockheed Martin’sintelligence-driven defense approachto provide proactive and continuouscloud security situational awareness,and real-time compliance andconfiguration management” http://www.marketwatch.com/story/lockheed-martin-delivers-solastm-hybrid-cloud-solution-2012-09-27
  25. 25. 25To Sum Up...Cloud, Big Data, and SecurityTolerance to RiskGovernanceAdaptability
  26. 26. 26 THANK YOU! QUESTIONS?Pano M. XinosPanoXinos.TDWI@GMail.comhttp://ca.LinkedIn.com/in/panoxinos@pmxinoshttp://TheCaseforCloud.blogspot.com

×