Checklist for Competent Cloud Security
Management
Barriers and Challenges to Opportunities and ROI
Dr. Mariana Carroll
Cloud Advisor and Trainer
© Cloud Credential Council
Poll: Testing - can you hear us and see the slides?
A. Yes, I can hear you and see the slides
B. I can hear you, but not see the slides
C. I can see the slides, but not hear you
D. No, I cannot hear you or see the slides
© Cloud Credential Council
> Introduction: Cloud Credential Council
Tristano Vacondio
Marketing Manager
CCC
> Checklist for Competent Cloud Security Management: Barriers and Challenges to
Opportunities and ROI
Dr. Mariana Carroll
Cloud Advisor and Trainer
Mariana Carroll Consulting
Agenda
© Cloud Credential Council
A. IT training provider
B. IT consultant
C. IT training and consulting
D. IT practitioner
Poll: What is your area of work?
© Cloud Credential Council
A. Extensive experience (approx 6+ years)
B. Some experience (approx 4-6 years)
C. Intermediate (approx 1-3 years)
D. Little (up to 1 year)
E. None
Poll: How much IT security experience do you have?
© Cloud Credential Council
A. True
B. False
1. Customers in the same cloud can attack each other.
© Cloud Credential Council
A. True
B. False
2. External Internet threats are more
threatening in the cloud.
© Cloud Credential Council
A. True
B. False
3. You can't control where your data resides
in the cloud.
© Cloud Credential Council
A. True
B. False
4. Certifications are standard in a cloud
environment and provide assurance to subscribers.
© Cloud Credential Council
A. True
B. False
5. It is easy to change from one cloud provider to
another whenever I want to.
© Cloud Credential Council
Agenda
CCC Introduction
Background
What is the Current State of Cloud Security?
What are the common gaps and how do we address Cloud Security?
Stepping into Cloud Security Management
A Checklist to Ensure Secure Cloud Adoption and Use
Training and Development: Building a Career in Cloud Security
The Future of Cloud Security
Questions and Answers
Quiz Answers
© Cloud Credential Council
Introduction
© Cloud Credential Council
● Vendor Neutral
● International
● Non Profit
The Cloud Credential Council
Professional Cloud SeriesCCC Background
CCC Background (cont…)
© Cloud Credential Council
Certification Scheme
© Cloud Credential Council
Accreditation Scheme
© Cloud Credential Council
Checklist for Competent Cloud Security
Management
Barriers and Challenges to Opportunities and ROI
© Cloud Credential Council
Background
What is the Current State of Cloud Security?
© Cloud Credential Council
Journey to a Digital World
Business
Cloud
Mobile
Data
Social
business
IoT
Wearables
Hacktivists
Insiders
Espionage
Criminal
syndicates
States
Control
failure
© Cloud Credential Council
Cloud Characteristics
What is Cloud Computing?
cloud definition
“A network of remote servers hosted on the Internet and used to
store, manage, and process data in stead of local servers or
personal computers”.
Software-as-a-
Service (SaaS)
Platform-as-a-
Service (PaaS)
Infrastructure-as-a-
Service (IaaS)
Public cloud
Private cloud
Community cloud
Hybrid cloud
Virtual private clouds
● On-demand self service
● Broad network access
● Resource pooling
● Rapid elasticity
● Measured service
“A Cloud is a visible mass of tiny, condensed water droplets or ice crystals suspended in
the atmosphere”
CloudServiceModels
Cloud Deployment Models
© Cloud Credential Council
The State of Cloud Computing
© Cloud Credential Council
The State of Cloud Computing
© Cloud Credential Council
The State of Cloud Computing
Gartner:
• Highest growth
expected in IaaS
(38,4%)
• Solid growth across
public cloud services
• SaaS growing 20,3%
• Cloud management
and security services
growing 24,7%
• PaaS growing 21,1%
IDC: Hyper-convergence
spending will nearly double
from $806.8 million in 2015
to nearly $1.6 billion in 2016.
© Cloud Credential Council
The State of Cloud Computing
© Cloud Credential Council
The State of Cloud Computing
Key takeaways:
• Increased spending on
Security and Cloud Computing
© Cloud Credential Council
The State of Cloud Computing
Key takeaways:
• Increased spending on Security and
Cloud Computing
• Large need for Cloud Computing and
Security skills
© Cloud Credential Council
Background
What are the common gaps and how do we address
Cloud Security?
© Cloud Credential Council
What is Security?
Protecting information and information systems from unauthorised access, use, disclosure,
disruption, modification, or destruction in order to provide:
1. confidentiality, which means preserving authorised restrictions on access and
disclosure, including means for protecting personal privacy and proprietary information;
2. integrity, which means guarding against improper information modification or
destruction, and includes ensuring information nonrepudiation and authenticity; and
3. availability, which means ensuring timely and reliable access to and use of
information.
Information Systems Security (InfoSec):
Protection of information systems against unauthorised access to or modification of
information, whether in storage, processing, or transit, and against the denial of service to
authorised users, including those measures necessary to detect, document, and counter
such threats.
Source: SP 800-66; 44 U.S.C., Sec 3541, CNSSI-4009
© Cloud Credential Council
Security Considerations when moving to
the Cloud
Shadow ITThird party risks
Complex hybrid models
outside of traditional
“walls”
Controls gap
Single target for attack Resource capability
constraints
© Cloud Credential Council
Cloud Security Opportunities
Free up resources to focus on your core
Cloud providers are in the “business of IT” – security should be their main
concern
Beat the skills gap – cloud providers attract the specialists
© Cloud Credential Council
Cloud Security Responsibility
© Cloud Credential Council
A Risk-based Approach
Source: Deloitte (2015)
© Cloud Credential Council
Stepping into Cloud Security Management
A Checklist to Ensure Secure Cloud Adoption and Use
© Cloud Credential Council
Implementing Cloud Security MeasuresPlanningandscoping
What are the key business
objectives, needs or
challenges?
Look at the value proposition drivers of Cloud
adoption to meet business objectives or solve
existing need(s) or challenge(s).
List the key drivers for Cloud
adoption





Examples: Improve business agility, improve
operating cost, enter new markets.
Select the Cloud service model
that best suit the business need
and security requirements
 SaaS
 PaaS
 IaaS
 BPaaS
 Other
Why?
Select the best suited and
secure method of delivery
 Public
 Private
 Community
 Hybrid
Why?
CloudSecurity
Strategy
© Cloud Credential Council
Implementing Cloud Security Measures
Develop a security strategy to
manage risks as the business
moves to the cloud
 Evaluate the current state (Inherent Risk)
 Assess residual risk for high priority cloud
services
 Develop draft plans, policies and a
strategic roadmap
Develop a cloud security
reference architecture
(blueprint)
Develop a tailored Cloud Security reference
architecture (blueprint) for the various cloud
models together with recommended
technologies.
Implement security and
governance capabilities to
manage cloud security risks
 Design and Implement security controls
 Design and implement platform specific
controls (i.e., SaaS specific)
 Ensue adequate GRC+R across the
cloud and IT stack
DevelopaCloudStrategy
Formalise
Implement
Reviewandmonitor
© Cloud Credential Council
Cloud Security Competencies
• Knowledge of Information Technology concepts, Cloud Computing, IT security, Risk
management, Data security, Network security, Policy creation and maintenance, Regulatory
compliance, IT Governance, Business continuity / disaster recovery, Incident management,
System and application security, Security architecture, and Auditing / Assurance processes /
procedures
• Ability to evaluate business processes and IT technology landscapes, identify risks and
evaluate controls (including risk assessment, gap analysis, business impact analysis, etc.)
• Investigative, analytical and project management skills
• Ability to translate business needs and problems into viable and accepted solutions
• Ability to liaise with individuals across a wide variety of operational, functional, and technical
disciplines
• Effectively communicating with executive management to ensure support for the Cloud
Security program and effective reporting on metrics
• Advising and making recommendations regarding appropriate personnel, physical and
technical security controls
© Cloud Credential Council
Training and Development
Building a Career in Cloud Security
© Cloud Credential Council
Module 1: Course Introduction
• Course Agenda
• Case Study
• Activities
• Questions and Answers
Module 3: Security Threats and Challenges in Cloud
Computing
• Security and Compliance in the Cloud
• Cloud Operations
• Physical Security and Cloud Computing
Module 2: Security, Governance and Risks
• Cloud Computing Basics
• Security, Governance and Risk in IT
• Cloud Computing Security
Module 4: Security Management in Cloud Computing
• Identity and Access Management
• Data Classification
• Data Security Lifecycle
• Forensics in the Cloud
How far can the CCC Certification get you?
© Cloud Credential Council
Module 5: Legal, Contractual and Operational
Monitoring
• Legal and Regulatory Landscape
• Monitoring – Providers and Subscribers
• Security Operations in the Cloud
Module 7: Business Continuity, Disaster Recovery and
Capacity / Performance Planning
• Business Continuity (BC)
• Disaster Recovery (DR) Resilient Technology
• Capacity and Performance Planning for Cloud
Module 6: Network Security Management
• Network Management in the Cloud
• Vulnerability, Patch Management and Pen-Testing
• Cloud Security Architecture
Module 8: Advanced Cloud Security Management
• Container Cloud Security
• Secure Development Standards in Cloud
• Application Programming Interface API Security
Module 9: Security Planning, Standards and Cloud
• Cloud Security Planning
• Cloud Standards, Controls and Auditing
• Cloud Security Evolution
How far can the CCC Certification get you?
© Cloud Credential Council
Course Details
• Suggested delivery format is instructor-led classroom-based learning
• Suggested duration: 24 learning hours
Exam Details
• Online
• 25 Questions
• 45 Minutes
• No Prerequisites - however, it is recommended to attain the Cloud Technology Associate certification
• Supervision is via Webcam
• Closed book
• Pass rate of 70%
Course and Exam Details
© Cloud Credential Council
Building a Cloud Security Career
© Cloud Credential Council
The Future of Cloud Security
What is Next?
© Cloud Credential Council
Impact over the next 3-5 years
© Cloud Credential Council
What is Next?
Building Block Approach
Business and IT alignment
GRC+R
Fill the skills gap
Identify potential deal breakers & through careful analysis decide on the best approach!
© Cloud Credential Council
Questions and Answers
© Cloud Credential Council
It is not easy for an attack to be triggered by
another cloud subscriber in a multitenant cloud
environment. In addition, some cloud providers
offer options to further mitigate multitenancy
risks.
Cloud subscribers should evaluate their
applications and requirements and choose a
cloud provider and cloud offering based on the
needs of their applications.
1. Customers in the same cloud can attack each other.
© Cloud Credential Council
External Internet threats are real, but no more
threatening to the cloud than to any other service
delivery environment.
Enterprises deploying a private cloud must
provide the same level of scrutiny for both
detection and prevention that they would take
when deploying workloads using a hosting
provider or their own internal IT infrastructure.
2. External Internet threats are more
threatening in the cloud.
© Cloud Credential Council
This myth is easily addressed by selecting a cloud
provider that has a global footprint and offers data
accountability. When the workloads and
applications being moved to cloud require it, a
private cloud is a simple way to address data
governance.
3. You can't control where your data resides
in the cloud.
© Cloud Credential Council
Certifications are good reference points, but by
themselves they are insufficient proof that the cloud
provider will satisfy all of the subscribed
organization's security and compliance needs.
It is ultimately the cloud consumers who are
accountable for ensuring that their organizations'
security and compliance requirements are met.
Subscribers need to understand the security
capabilities and processes of their cloud provider
and not rely on certifications alone.
4. Certifications are standard in a cloud
environment and provide assurance to subscribers.
© Cloud Credential Council
In fact, the bottom lines of many niche cloud
providers require them to lock in their customers,
typically with long-term contracts or painfully high
early termination fees.
If you don’t go with an industry-leading provider,
make sure to read all the fine print and get a
professional second opinion.
5. It is easy to change from one cloud provider to
another whenever I want to.

Checklist for Competent Cloud Security Management

  • 1.
    Checklist for CompetentCloud Security Management Barriers and Challenges to Opportunities and ROI Dr. Mariana Carroll Cloud Advisor and Trainer
  • 2.
    © Cloud CredentialCouncil Poll: Testing - can you hear us and see the slides? A. Yes, I can hear you and see the slides B. I can hear you, but not see the slides C. I can see the slides, but not hear you D. No, I cannot hear you or see the slides
  • 3.
    © Cloud CredentialCouncil > Introduction: Cloud Credential Council Tristano Vacondio Marketing Manager CCC > Checklist for Competent Cloud Security Management: Barriers and Challenges to Opportunities and ROI Dr. Mariana Carroll Cloud Advisor and Trainer Mariana Carroll Consulting Agenda
  • 4.
    © Cloud CredentialCouncil A. IT training provider B. IT consultant C. IT training and consulting D. IT practitioner Poll: What is your area of work?
  • 5.
    © Cloud CredentialCouncil A. Extensive experience (approx 6+ years) B. Some experience (approx 4-6 years) C. Intermediate (approx 1-3 years) D. Little (up to 1 year) E. None Poll: How much IT security experience do you have?
  • 6.
    © Cloud CredentialCouncil A. True B. False 1. Customers in the same cloud can attack each other.
  • 7.
    © Cloud CredentialCouncil A. True B. False 2. External Internet threats are more threatening in the cloud.
  • 8.
    © Cloud CredentialCouncil A. True B. False 3. You can't control where your data resides in the cloud.
  • 9.
    © Cloud CredentialCouncil A. True B. False 4. Certifications are standard in a cloud environment and provide assurance to subscribers.
  • 10.
    © Cloud CredentialCouncil A. True B. False 5. It is easy to change from one cloud provider to another whenever I want to.
  • 11.
    © Cloud CredentialCouncil Agenda CCC Introduction Background What is the Current State of Cloud Security? What are the common gaps and how do we address Cloud Security? Stepping into Cloud Security Management A Checklist to Ensure Secure Cloud Adoption and Use Training and Development: Building a Career in Cloud Security The Future of Cloud Security Questions and Answers Quiz Answers
  • 12.
    © Cloud CredentialCouncil Introduction
  • 13.
    © Cloud CredentialCouncil ● Vendor Neutral ● International ● Non Profit The Cloud Credential Council
  • 14.
  • 15.
  • 16.
    © Cloud CredentialCouncil Certification Scheme
  • 17.
    © Cloud CredentialCouncil Accreditation Scheme
  • 18.
    © Cloud CredentialCouncil Checklist for Competent Cloud Security Management Barriers and Challenges to Opportunities and ROI
  • 19.
    © Cloud CredentialCouncil Background What is the Current State of Cloud Security?
  • 20.
    © Cloud CredentialCouncil Journey to a Digital World Business Cloud Mobile Data Social business IoT Wearables Hacktivists Insiders Espionage Criminal syndicates States Control failure
  • 21.
    © Cloud CredentialCouncil Cloud Characteristics What is Cloud Computing? cloud definition “A network of remote servers hosted on the Internet and used to store, manage, and process data in stead of local servers or personal computers”. Software-as-a- Service (SaaS) Platform-as-a- Service (PaaS) Infrastructure-as-a- Service (IaaS) Public cloud Private cloud Community cloud Hybrid cloud Virtual private clouds ● On-demand self service ● Broad network access ● Resource pooling ● Rapid elasticity ● Measured service “A Cloud is a visible mass of tiny, condensed water droplets or ice crystals suspended in the atmosphere” CloudServiceModels Cloud Deployment Models
  • 22.
    © Cloud CredentialCouncil The State of Cloud Computing
  • 23.
    © Cloud CredentialCouncil The State of Cloud Computing
  • 24.
    © Cloud CredentialCouncil The State of Cloud Computing Gartner: • Highest growth expected in IaaS (38,4%) • Solid growth across public cloud services • SaaS growing 20,3% • Cloud management and security services growing 24,7% • PaaS growing 21,1% IDC: Hyper-convergence spending will nearly double from $806.8 million in 2015 to nearly $1.6 billion in 2016.
  • 25.
    © Cloud CredentialCouncil The State of Cloud Computing
  • 26.
    © Cloud CredentialCouncil The State of Cloud Computing Key takeaways: • Increased spending on Security and Cloud Computing
  • 27.
    © Cloud CredentialCouncil The State of Cloud Computing Key takeaways: • Increased spending on Security and Cloud Computing • Large need for Cloud Computing and Security skills
  • 28.
    © Cloud CredentialCouncil Background What are the common gaps and how do we address Cloud Security?
  • 29.
    © Cloud CredentialCouncil What is Security? Protecting information and information systems from unauthorised access, use, disclosure, disruption, modification, or destruction in order to provide: 1. confidentiality, which means preserving authorised restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; 2. integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity; and 3. availability, which means ensuring timely and reliable access to and use of information. Information Systems Security (InfoSec): Protection of information systems against unauthorised access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorised users, including those measures necessary to detect, document, and counter such threats. Source: SP 800-66; 44 U.S.C., Sec 3541, CNSSI-4009
  • 30.
    © Cloud CredentialCouncil Security Considerations when moving to the Cloud Shadow ITThird party risks Complex hybrid models outside of traditional “walls” Controls gap Single target for attack Resource capability constraints
  • 31.
    © Cloud CredentialCouncil Cloud Security Opportunities Free up resources to focus on your core Cloud providers are in the “business of IT” – security should be their main concern Beat the skills gap – cloud providers attract the specialists
  • 32.
    © Cloud CredentialCouncil Cloud Security Responsibility
  • 33.
    © Cloud CredentialCouncil A Risk-based Approach Source: Deloitte (2015)
  • 34.
    © Cloud CredentialCouncil Stepping into Cloud Security Management A Checklist to Ensure Secure Cloud Adoption and Use
  • 35.
    © Cloud CredentialCouncil Implementing Cloud Security MeasuresPlanningandscoping What are the key business objectives, needs or challenges? Look at the value proposition drivers of Cloud adoption to meet business objectives or solve existing need(s) or challenge(s). List the key drivers for Cloud adoption      Examples: Improve business agility, improve operating cost, enter new markets. Select the Cloud service model that best suit the business need and security requirements  SaaS  PaaS  IaaS  BPaaS  Other Why? Select the best suited and secure method of delivery  Public  Private  Community  Hybrid Why? CloudSecurity Strategy
  • 36.
    © Cloud CredentialCouncil Implementing Cloud Security Measures Develop a security strategy to manage risks as the business moves to the cloud  Evaluate the current state (Inherent Risk)  Assess residual risk for high priority cloud services  Develop draft plans, policies and a strategic roadmap Develop a cloud security reference architecture (blueprint) Develop a tailored Cloud Security reference architecture (blueprint) for the various cloud models together with recommended technologies. Implement security and governance capabilities to manage cloud security risks  Design and Implement security controls  Design and implement platform specific controls (i.e., SaaS specific)  Ensue adequate GRC+R across the cloud and IT stack DevelopaCloudStrategy Formalise Implement Reviewandmonitor
  • 37.
    © Cloud CredentialCouncil Cloud Security Competencies • Knowledge of Information Technology concepts, Cloud Computing, IT security, Risk management, Data security, Network security, Policy creation and maintenance, Regulatory compliance, IT Governance, Business continuity / disaster recovery, Incident management, System and application security, Security architecture, and Auditing / Assurance processes / procedures • Ability to evaluate business processes and IT technology landscapes, identify risks and evaluate controls (including risk assessment, gap analysis, business impact analysis, etc.) • Investigative, analytical and project management skills • Ability to translate business needs and problems into viable and accepted solutions • Ability to liaise with individuals across a wide variety of operational, functional, and technical disciplines • Effectively communicating with executive management to ensure support for the Cloud Security program and effective reporting on metrics • Advising and making recommendations regarding appropriate personnel, physical and technical security controls
  • 38.
    © Cloud CredentialCouncil Training and Development Building a Career in Cloud Security
  • 39.
    © Cloud CredentialCouncil Module 1: Course Introduction • Course Agenda • Case Study • Activities • Questions and Answers Module 3: Security Threats and Challenges in Cloud Computing • Security and Compliance in the Cloud • Cloud Operations • Physical Security and Cloud Computing Module 2: Security, Governance and Risks • Cloud Computing Basics • Security, Governance and Risk in IT • Cloud Computing Security Module 4: Security Management in Cloud Computing • Identity and Access Management • Data Classification • Data Security Lifecycle • Forensics in the Cloud How far can the CCC Certification get you?
  • 40.
    © Cloud CredentialCouncil Module 5: Legal, Contractual and Operational Monitoring • Legal and Regulatory Landscape • Monitoring – Providers and Subscribers • Security Operations in the Cloud Module 7: Business Continuity, Disaster Recovery and Capacity / Performance Planning • Business Continuity (BC) • Disaster Recovery (DR) Resilient Technology • Capacity and Performance Planning for Cloud Module 6: Network Security Management • Network Management in the Cloud • Vulnerability, Patch Management and Pen-Testing • Cloud Security Architecture Module 8: Advanced Cloud Security Management • Container Cloud Security • Secure Development Standards in Cloud • Application Programming Interface API Security Module 9: Security Planning, Standards and Cloud • Cloud Security Planning • Cloud Standards, Controls and Auditing • Cloud Security Evolution How far can the CCC Certification get you?
  • 41.
    © Cloud CredentialCouncil Course Details • Suggested delivery format is instructor-led classroom-based learning • Suggested duration: 24 learning hours Exam Details • Online • 25 Questions • 45 Minutes • No Prerequisites - however, it is recommended to attain the Cloud Technology Associate certification • Supervision is via Webcam • Closed book • Pass rate of 70% Course and Exam Details
  • 42.
    © Cloud CredentialCouncil Building a Cloud Security Career
  • 43.
    © Cloud CredentialCouncil The Future of Cloud Security What is Next?
  • 44.
    © Cloud CredentialCouncil Impact over the next 3-5 years
  • 45.
    © Cloud CredentialCouncil What is Next? Building Block Approach Business and IT alignment GRC+R Fill the skills gap Identify potential deal breakers & through careful analysis decide on the best approach!
  • 46.
    © Cloud CredentialCouncil Questions and Answers
  • 47.
    © Cloud CredentialCouncil It is not easy for an attack to be triggered by another cloud subscriber in a multitenant cloud environment. In addition, some cloud providers offer options to further mitigate multitenancy risks. Cloud subscribers should evaluate their applications and requirements and choose a cloud provider and cloud offering based on the needs of their applications. 1. Customers in the same cloud can attack each other.
  • 48.
    © Cloud CredentialCouncil External Internet threats are real, but no more threatening to the cloud than to any other service delivery environment. Enterprises deploying a private cloud must provide the same level of scrutiny for both detection and prevention that they would take when deploying workloads using a hosting provider or their own internal IT infrastructure. 2. External Internet threats are more threatening in the cloud.
  • 49.
    © Cloud CredentialCouncil This myth is easily addressed by selecting a cloud provider that has a global footprint and offers data accountability. When the workloads and applications being moved to cloud require it, a private cloud is a simple way to address data governance. 3. You can't control where your data resides in the cloud.
  • 50.
    © Cloud CredentialCouncil Certifications are good reference points, but by themselves they are insufficient proof that the cloud provider will satisfy all of the subscribed organization's security and compliance needs. It is ultimately the cloud consumers who are accountable for ensuring that their organizations' security and compliance requirements are met. Subscribers need to understand the security capabilities and processes of their cloud provider and not rely on certifications alone. 4. Certifications are standard in a cloud environment and provide assurance to subscribers.
  • 51.
    © Cloud CredentialCouncil In fact, the bottom lines of many niche cloud providers require them to lock in their customers, typically with long-term contracts or painfully high early termination fees. If you don’t go with an industry-leading provider, make sure to read all the fine print and get a professional second opinion. 5. It is easy to change from one cloud provider to another whenever I want to.

Editor's Notes

  • #3 Welcome everyone, thank you for joining today. I am very happy to host this webinar and I have the honor to have a special guest - Mario Bojilov - author of the Big Data Foundation syllabus.
  • #4 Dr. Mariana Carroll is an enthusiastic technology advisor and academic. She has a passion for consulting and training services and solutions around Emerging Technologies. She consults on major projects for large corporates across the globe, advising on cutting-edge research, insights and solutions with a strong focus on Africa. Working Deloitte she launched and steered the Cloud Computing Centre of Excellence, as well as a research and eminence unit called Deloitte TechSights Africa. Mariana currently facilitates the CIO Transition Labs at Deloitte South Africa. Mariana completed her PhD in IT Governance and Risk Management and is a regular guest lecturer at South Africa’s leading universities. She has a Post- Doctoral Fellowship and serves on the Academic Advisory Board of the University of Pretoria: Informatics Department. Mariana is an alumni of the ISACA SA Board. Her research interests include Emerging Technologies, IT Management, IT Governance, IT Strategy and IT Effectiveness. She is an eminent speaker and author with articles published in conference proceedings, both locally and abroad, on the topics of Cloud Computing, Virtualization and IT Auditing. Mariana built her professional career on the belief that knowledge and transformation are the two fundamental building blocks of any successful organisation and strives to add value to people by helping them excel at work.
  • #14 The CCC is independent and vendor neutral, with membership that includes user organizations, vendors, professional associations and international certification bodies. The CCC has developed a professional certification program for cloud on top of the Cloud Essentials certification. Organizations like Microsoft, IBM, HP, Dell, and more have participated in the design and development of this program. Global not-for-profit organization 100+ members and increasing Several thousand certified across the globe on Cloud Essentials and Virtualization Essentials Associate level Exams: +5000 Professional Series: 230
  • #15 2010 ING decides to consolidate data centers, adopt cloud. Realizes it needs training for its employees. CCC formed - Cloud Experts that work at VMware, Cisco, IBM, HP, contribute to course and exam development. Cloud Essentials first and Virtualization Essentials released
  • #16 Development work on advanced courses started. With input from cloud experts that work at leading cloud companies now –advanced courses and certifications across the globe through Partners
  • #18 In order to get accredited it is important to understand that is necessary to follow the CCC accreditation scheme: Training must be organized by a CCC accredited training partner and delivered by a CCC accredited trainer using CCC accredited courseware material. This provides a standard of quality at all levels. Training Partners are assessed directly by the CCC. All the Trainers must bring proof of experience and need to pass the exam with high grades. All the courseware has been accredited directly by the CCC.