SlideShare a Scribd company logo
Cloud Computing & Security
Kyle Lai
CISSP, CSSLP, CISA, CIPP/G
KLC Consulting, Inc.
Cell: 617-921-5410
Email: klai@klcconsulting.net
KLC Consulting 1
Cloud Computing History
 Distributed Computing ,Web Computing ,
Parallel Computing, Cluster Computing,
Grid Computing
 1999 - Distributed Computing Example:
◦ Build a super-computer with small computers
◦ SETI@Home (Search for Extra-Terrestrial
Intelligence) – UC Berkley project
◦ Volunteers donate their home computer’s
extra processing power
 Name was too techie, too complicated.
 Need a name that’s easy, catchy, good for
headline – CLOUD (Amazon CEO, Jeff
Bezos, made it famous in 2007)
 2010 – Wikipedia, Google, Facebook –
similar distributed computing model, just
without volunteers.
KLC Consulting 2
What is Cloud Computing
KLC Consulting 3
 Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can
be rapidly provisioned and released with minimal
management effort or service provider interaction.
This cloud model promotes availability and is
composed of five essential characteristics, three
service models, and four deployment models.
(NIST definition)
 Cloud enhances collaboration, agility, scalability,
availability, and provides the potential for cost
reduction through optimized and efficient computing.
What is Cloud Computing (cont.)
KLC Consulting 4
Cloud Service Models
 Software as a Service (SaaS)
◦ Use provider’s applications over a network
 Salesforce.com, gmail, Facebook,Twitter, Google Apps
 Platform as a Service (PaaS)
◦ Deploy customer-created applications to a cloud
 AppEngine from Google: based on Python and Django
 Force.com from SalesForce: based on the SalesForce SaaS
infrastructure and Apex language
 Infrastructure as a Service (IaaS)
◦ Rent processing, storage, network capacity, and
other fundamental computing resources
 Amazon EC2, S3 storage service
KLC Consulting 5
Cloud Deployment Models
 Private cloud
◦ enterprise owned or leased
 Community cloud
◦ shared infrastructure for specific community
 i.e. DISA RACE (Dept. of Defense Community Cloud)
 Public cloud
◦ sold to the public, mega-scale infrastructure
 i.e. Google,Amazon, Microsoft cloud services
 Hybrid cloud
◦ composition of two or more clouds
 Virtual Private Cloud (** not in NIST definition)
◦ use public cloud in private manner and interconnect to
private datacenter resources viaVPN
KLC Consulting 6
Virtual Private Cloud
KLC Consulting 7
A diagram of Amazon Virtual Private Cloud and how it connects cloud-based
resources to existing private networks.
What ItTakes to Move to the Cloud
KLC Consulting 8
• Identify the Asset for Cloud Deployment
• Evaluate the Asset
• Map the Asset to Potential Cloud Deployment
Model
• Evaluate Potential Cloud Service Models and
Providers
• Draft the Potential Data Flow
• Evaluate Risk Tolerance, Potential Exposures,
Acceptable Deployment and Service Models
• Implement Security and Risk Controls
Cloud Security – Areas of Focus*
 Governance & Enterprise Risk Management
 Legal & e-Discovery
 Compliance & Audit
 Information Lifecycle Management
 Portability & Interoperability
 Business Continuity & Disaster Recovery
 Incident Response, Notification,& Remediation
 Application Security
 Encryption & Key Management
 Identity & Access Management
 Virtualization – Cloud Service Provider’sVM environment
*based on Cloud Security Alliance (CSA) Security Guidance Domains
KLC Consulting 9
Cloud Security – Sample Questions
 Some questions to answer between Cloud Service
Providers (CSP) and you:
◦ Data ownership – When you put data to CSP’s environment, who owns data
in cloud? Make sure you are comfortable with the arrangement!
◦ Service Level Agreement – what’s reasonable downtime / uptime?
◦ US and International Privacy Laws – where does the data reside?
◦ Security ofVirtual Operating Systems – how does CSP manage them?
◦ Encryption for admin access, application access, and data at rest – Is there a
single key for all customers or one key per customer?
◦ Availability of logs for accountability
◦ Version control for the SaaS applications
◦ Business Continuity and Disaster Recovery Planning for cloud
◦ Compliance (HIPAA, PCI, SOX, SAS70, FISMA, FFIEC, Privacy)
◦ Review CSP’s SAS 70 Report – verify effective security measures are in place
KLC Consulting 10
Cloud Computing Security (Cont.)
 Some questions to answer between Cloud Service
Providers (CSP) and you (Continue):
◦ Understand the responsibilities between CSP and you – Understand what you
need to do. Read User Controls Consideration section in SAS 70 report
◦ Plan for expected and unexpected termination of CSP contract
◦ Retrieve data from CSP – understand how you get all your data back?
◦ Delete data in the cloud (Data remanance) – data is really destroyed or CSP
just made it inaccessible to you?
◦ Monitoring CSP service performance
◦ Vulnerability Assessment on the CSP – ensure sound security
◦ Switching CSP – how easy is it? (in event of degrading service, cease of bus)
◦ Incident response, notification and remediation – what is the CSP’s procedure?
◦ Legal e-Discovery
 Refer to CSA Cloud Security Guide for more details:
http://www.cloudsecurityalliance.org/csaguide.pdf
KLC Consulting 11
Cloud Security References
 Cloud Security Alliance (CSA) - http://www.cloudsecurityalliance.org/
 CSA's Cloud Security Guide - http://www.cloudsecurityalliance.org/csaguide.pdf
 ENISA – Cloud Computing Risk Assessment -
http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment
 Cloud Computing Use Cases Group – common use cases - http://www.cloudusecases.org/
 NIST Cloud Computing Group –
http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
 GAO Report: Information Security: Federal Guidance Needed to Address Control Issues
with Implementing Cloud Computing - http://www.gao.gov/products/GAO-10-513
 GAOTestimony: Information Security: Government-wide Guidance Needed to Assist
Agencies in Implementing Cloud Computing - http://www.gao.gov/new.items/d10855t.pdf
 Gartner: KnowYour Rights in IT Maintenance and Cloud Computing -
http://www.gartner.com/DisplayDocument?doc_cd=201001&ref=g_sitelink&ref=g_noreg
 Gartner Free Report: Rights and Responsibilities for Consumers of Cloud Computing
Services - http://www.gartnerinsight.com/Landing.aspx?WT.mc_id=PCP_GITCLD
 PCWorld:Lawmakers Question the Security of Cloud Computing
 Pew Report:The Future of Cloud Computing
KLC Consulting 12
KLC Consulting Overview
 KLC was founded in 2002
 SBA 8(a) Certified Small Business
 Navy Seaport-e ContractVehicle
 Past Performance: DoD, DISA,VA, NIH
 Participates in Cloud Security Alliance (CSA) projects
 Focus on providing Information Assurance / Security and IT Audit
services to government and Fortune 1000 companies.
 Dedicated consultants at Central, East and West Coast
 KLC staff hold certifications including CISSP, CSSLP, CISM, CISA,
CIPP/G, CCNA, CCNP, CCSP, MCSE, ISO 27001 Lead Auditor.
 Most of KLC Consultants are Infragard Members (passed FBI
Security Background Check) with at least 8 years of experience
 KLC also publishes SMAC, a popular network privacy and security
software with more than 1.5 Million users worldwide
KLC Consulting 13
Questions?
Next step?
KLC Consulting 14
Kyle Lai
President
617-314-9721
klai@klcconsulting.net
Tarek El Heneidy
Director of Operations
781-424-2257
telheneidy@klcconsulting.net

More Related Content

What's hot

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Dhaval Dave
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Impact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionImpact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoption
Andreja Pucihar
 

What's hot (20)

Public, Private, Hybrid Cloud Oh My! (Plus an OpenStack intro)
Public, Private, Hybrid Cloud Oh My! (Plus an OpenStack intro)Public, Private, Hybrid Cloud Oh My! (Plus an OpenStack intro)
Public, Private, Hybrid Cloud Oh My! (Plus an OpenStack intro)
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
FOSE Cloudbursting
FOSE CloudburstingFOSE Cloudbursting
FOSE Cloudbursting
 
Track technologique multi-cloud adoption
Track technologique multi-cloud adoptionTrack technologique multi-cloud adoption
Track technologique multi-cloud adoption
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Providing Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud EnvironmentsProviding Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud Environments
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Impact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoptionImpact of busines model elements on cloud computing adoption
Impact of busines model elements on cloud computing adoption
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Computing - ISO/IEC 17788
Cloud Computing - ISO/IEC 17788Cloud Computing - ISO/IEC 17788
Cloud Computing - ISO/IEC 17788
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud Outage
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
The Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsThe Latest in Cloud Computing Standards
The Latest in Cloud Computing Standards
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 

Viewers also liked (7)

Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similar to Cloud Computing and Security - by KLC Consulting

Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicum
David Linthicum
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Phil Copperwheat
 
Cloud Considerations What you need to kn.docx
Cloud Considerations What you need to kn.docxCloud Considerations What you need to kn.docx
Cloud Considerations What you need to kn.docx
mary772
 

Similar to Cloud Computing and Security - by KLC Consulting (20)

Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicum
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Cloud management
Cloud managementCloud management
Cloud management
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
 
Cloud Considerations What you need to kn.docx
Cloud Considerations What you need to kn.docxCloud Considerations What you need to kn.docx
Cloud Considerations What you need to kn.docx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em NuvemO Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICES
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt
 
Briefing 47
Briefing 47Briefing 47
Briefing 47
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 

Cloud Computing and Security - by KLC Consulting

  • 1. Cloud Computing & Security Kyle Lai CISSP, CSSLP, CISA, CIPP/G KLC Consulting, Inc. Cell: 617-921-5410 Email: klai@klcconsulting.net KLC Consulting 1
  • 2. Cloud Computing History  Distributed Computing ,Web Computing , Parallel Computing, Cluster Computing, Grid Computing  1999 - Distributed Computing Example: ◦ Build a super-computer with small computers ◦ SETI@Home (Search for Extra-Terrestrial Intelligence) – UC Berkley project ◦ Volunteers donate their home computer’s extra processing power  Name was too techie, too complicated.  Need a name that’s easy, catchy, good for headline – CLOUD (Amazon CEO, Jeff Bezos, made it famous in 2007)  2010 – Wikipedia, Google, Facebook – similar distributed computing model, just without volunteers. KLC Consulting 2
  • 3. What is Cloud Computing KLC Consulting 3  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. (NIST definition)  Cloud enhances collaboration, agility, scalability, availability, and provides the potential for cost reduction through optimized and efficient computing.
  • 4. What is Cloud Computing (cont.) KLC Consulting 4
  • 5. Cloud Service Models  Software as a Service (SaaS) ◦ Use provider’s applications over a network  Salesforce.com, gmail, Facebook,Twitter, Google Apps  Platform as a Service (PaaS) ◦ Deploy customer-created applications to a cloud  AppEngine from Google: based on Python and Django  Force.com from SalesForce: based on the SalesForce SaaS infrastructure and Apex language  Infrastructure as a Service (IaaS) ◦ Rent processing, storage, network capacity, and other fundamental computing resources  Amazon EC2, S3 storage service KLC Consulting 5
  • 6. Cloud Deployment Models  Private cloud ◦ enterprise owned or leased  Community cloud ◦ shared infrastructure for specific community  i.e. DISA RACE (Dept. of Defense Community Cloud)  Public cloud ◦ sold to the public, mega-scale infrastructure  i.e. Google,Amazon, Microsoft cloud services  Hybrid cloud ◦ composition of two or more clouds  Virtual Private Cloud (** not in NIST definition) ◦ use public cloud in private manner and interconnect to private datacenter resources viaVPN KLC Consulting 6
  • 7. Virtual Private Cloud KLC Consulting 7 A diagram of Amazon Virtual Private Cloud and how it connects cloud-based resources to existing private networks.
  • 8. What ItTakes to Move to the Cloud KLC Consulting 8 • Identify the Asset for Cloud Deployment • Evaluate the Asset • Map the Asset to Potential Cloud Deployment Model • Evaluate Potential Cloud Service Models and Providers • Draft the Potential Data Flow • Evaluate Risk Tolerance, Potential Exposures, Acceptable Deployment and Service Models • Implement Security and Risk Controls
  • 9. Cloud Security – Areas of Focus*  Governance & Enterprise Risk Management  Legal & e-Discovery  Compliance & Audit  Information Lifecycle Management  Portability & Interoperability  Business Continuity & Disaster Recovery  Incident Response, Notification,& Remediation  Application Security  Encryption & Key Management  Identity & Access Management  Virtualization – Cloud Service Provider’sVM environment *based on Cloud Security Alliance (CSA) Security Guidance Domains KLC Consulting 9
  • 10. Cloud Security – Sample Questions  Some questions to answer between Cloud Service Providers (CSP) and you: ◦ Data ownership – When you put data to CSP’s environment, who owns data in cloud? Make sure you are comfortable with the arrangement! ◦ Service Level Agreement – what’s reasonable downtime / uptime? ◦ US and International Privacy Laws – where does the data reside? ◦ Security ofVirtual Operating Systems – how does CSP manage them? ◦ Encryption for admin access, application access, and data at rest – Is there a single key for all customers or one key per customer? ◦ Availability of logs for accountability ◦ Version control for the SaaS applications ◦ Business Continuity and Disaster Recovery Planning for cloud ◦ Compliance (HIPAA, PCI, SOX, SAS70, FISMA, FFIEC, Privacy) ◦ Review CSP’s SAS 70 Report – verify effective security measures are in place KLC Consulting 10
  • 11. Cloud Computing Security (Cont.)  Some questions to answer between Cloud Service Providers (CSP) and you (Continue): ◦ Understand the responsibilities between CSP and you – Understand what you need to do. Read User Controls Consideration section in SAS 70 report ◦ Plan for expected and unexpected termination of CSP contract ◦ Retrieve data from CSP – understand how you get all your data back? ◦ Delete data in the cloud (Data remanance) – data is really destroyed or CSP just made it inaccessible to you? ◦ Monitoring CSP service performance ◦ Vulnerability Assessment on the CSP – ensure sound security ◦ Switching CSP – how easy is it? (in event of degrading service, cease of bus) ◦ Incident response, notification and remediation – what is the CSP’s procedure? ◦ Legal e-Discovery  Refer to CSA Cloud Security Guide for more details: http://www.cloudsecurityalliance.org/csaguide.pdf KLC Consulting 11
  • 12. Cloud Security References  Cloud Security Alliance (CSA) - http://www.cloudsecurityalliance.org/  CSA's Cloud Security Guide - http://www.cloudsecurityalliance.org/csaguide.pdf  ENISA – Cloud Computing Risk Assessment - http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment  Cloud Computing Use Cases Group – common use cases - http://www.cloudusecases.org/  NIST Cloud Computing Group – http://csrc.nist.gov/groups/SNS/cloud-computing/index.html  GAO Report: Information Security: Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing - http://www.gao.gov/products/GAO-10-513  GAOTestimony: Information Security: Government-wide Guidance Needed to Assist Agencies in Implementing Cloud Computing - http://www.gao.gov/new.items/d10855t.pdf  Gartner: KnowYour Rights in IT Maintenance and Cloud Computing - http://www.gartner.com/DisplayDocument?doc_cd=201001&ref=g_sitelink&ref=g_noreg  Gartner Free Report: Rights and Responsibilities for Consumers of Cloud Computing Services - http://www.gartnerinsight.com/Landing.aspx?WT.mc_id=PCP_GITCLD  PCWorld:Lawmakers Question the Security of Cloud Computing  Pew Report:The Future of Cloud Computing KLC Consulting 12
  • 13. KLC Consulting Overview  KLC was founded in 2002  SBA 8(a) Certified Small Business  Navy Seaport-e ContractVehicle  Past Performance: DoD, DISA,VA, NIH  Participates in Cloud Security Alliance (CSA) projects  Focus on providing Information Assurance / Security and IT Audit services to government and Fortune 1000 companies.  Dedicated consultants at Central, East and West Coast  KLC staff hold certifications including CISSP, CSSLP, CISM, CISA, CIPP/G, CCNA, CCNP, CCSP, MCSE, ISO 27001 Lead Auditor.  Most of KLC Consultants are Infragard Members (passed FBI Security Background Check) with at least 8 years of experience  KLC also publishes SMAC, a popular network privacy and security software with more than 1.5 Million users worldwide KLC Consulting 13
  • 14. Questions? Next step? KLC Consulting 14 Kyle Lai President 617-314-9721 klai@klcconsulting.net Tarek El Heneidy Director of Operations 781-424-2257 telheneidy@klcconsulting.net