SlideShare a Scribd company logo
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 2
Private
Public
Hybrid
FINANCIAL 
MANAGEMENT
• CAPEX to OPEX 
• Capital can be on used for growth 
of business.
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 3
Opportunities
• Cloud may create a permanent establishment (PE) for:
– Service provider through its infrastructure
– Client through the use of servers in a territory outside the 
home jurisdiction. 
• A business conducted in the cloud creates practical 
difficulties in determining where that income was 
sourced.
– Cloud uses shared resources, servers can be located in 
multiple jurisdictions, a simple transaction may be 
processed in multiple countries. 
– The place where a transaction takes place is difficult to 
ascertain in these circumstances, as only part of 
a transaction may be completed in any one jurisdiction. 
• Consumption‐based taxes – GST / VAT apply where the 
service is consumed or content is delivered 
• Organizations that transfer data, software and other 
Cloud services across border need to be aware of the 
potential liability to export controls.
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 4
Businesses risk getting taxed in more than one place
LEAKING CLOUDS?
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 5
SECURITY AND PRIVACY
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 6
For a large, 
regulated 
organization: it 
may be a 
nightmare…
For a small 
organization: it 
may offer 
much better 
security
Private
Public
Hybrid
SECURITY
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 7
IDENTITY & 
ACCESS
ENCRYPTION STORAGE
COLLATERAL 
DAMAGE
AVAILABILITY & 
DESTRUCTION
HUMAN THREAT
OPERATIONAL 
CHALLENGES
Control and 
Governance
SLA
Change 
Management
BCP & DR 
Investigations 
and Audit
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 8
REGULATIONS & COMPLIANCE
 Data Privacy Laws and Regulations
 IT Act, 
 RBI / IRDA regulations…
 Encryption / Lawful interception 
 Who owns the data?
 Under the ITA, a corporate entity when transferring sensitive personal 
information to another entity should ensure, that the entity to whom such 
information is being transferred should have similar security practices to 
protect such information.
 Further, a corporate entity in possession of sensitive personal information 
should ensure that the provider of such information is aware of the 
agency collecting and retaining information, the intended recipients of the 
information and the purpose for which the information shall be used.
 As per ITA, data security audits need to be carried by companies through 
approved auditors at least once a year or when significant changes / 
upgrades happen.
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 9
16 JULY 2014 PARAG DEODHAR ‐ 3rd Annual Asian GRC & IT Security Conference 2014 10

More Related Content

What's hot

Cloud security
Cloud securityCloud security
Cloud security
Tushar Kayande
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Muhammad Usama Zuberi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Syam Lal
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud computing
Cloud computingCloud computing
Cloud computing
Rupak Chaulagain
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Aditya Dwivedi
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
Mayank Aggarwal
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud Architecture
Derek Keats
 
cloud computing
cloud computingcloud computing
cloud computing
Yasir Hilal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
kanchu17
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
Ajay p
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Waseem Ahmed
 
Task scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud ComputingTask scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud Computing
Ramandeep Kaur
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
Ashok Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ripal Ranpara
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
Raj Sarode
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
ragibhasan
 

What's hot (20)

Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud Architecture
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Task scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud ComputingTask scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud Computing
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 

Viewers also liked

Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014
Parag Deodhar
 
Moving to the Cloud – Risk, Control, and Accounting Considerations
Moving to the Cloud – Risk, Control, and Accounting ConsiderationsMoving to the Cloud – Risk, Control, and Accounting Considerations
Moving to the Cloud – Risk, Control, and Accounting Considerations
Proformative, Inc.
 
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Knowledge Group
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
Padma Jella
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
Evaluating an Instructional Sequence with Interactive Simulations (ISIS)
Evaluating an Instructional Sequence with Interactive Simulations (ISIS)Evaluating an Instructional Sequence with Interactive Simulations (ISIS)
Evaluating an Instructional Sequence with Interactive Simulations (ISIS)
David Geelan
 
синеглазая гжель»
синеглазая гжель»синеглазая гжель»
синеглазая гжель»
lubov17
 
MobileDiagnosis Project technical Presentation 2014
MobileDiagnosis Project  technical Presentation  2014MobileDiagnosis Project  technical Presentation  2014
MobileDiagnosis Project technical Presentation 2014
MobileDiagnosis Non Profit Association
 
Ist storyboard final
Ist storyboard finalIst storyboard final
Ist storyboard finalkayeleanne
 
UP BUSINESS MART
UP BUSINESS MART UP BUSINESS MART
UP BUSINESS MART
NEERAJ SRIVASTAVA
 
Cleaning Out Your IT Closet - SPSRED 2013
Cleaning Out Your IT Closet - SPSRED 2013Cleaning Out Your IT Closet - SPSRED 2013
Cleaning Out Your IT Closet - SPSRED 2013
adamtoth
 
Insert latest articles on blogger
Insert latest articles on bloggerInsert latest articles on blogger
Insert latest articles on blogger
Stefano Vinci
 
Happier teams by cesario ramos and pascal dufour
Happier teams by cesario ramos and pascal dufourHappier teams by cesario ramos and pascal dufour
Happier teams by cesario ramos and pascal dufour
Pascal Dufour
 
36448696 alege-jucariile-potrivite-bebelusului-tau
36448696 alege-jucariile-potrivite-bebelusului-tau36448696 alege-jucariile-potrivite-bebelusului-tau
36448696 alege-jucariile-potrivite-bebelusului-tauHentea Mariana
 
Amazon summit 2015
Amazon summit 2015Amazon summit 2015
Amazon summit 2015
Olivier (DaffyDuke) Duquesne
 
The Connected Company - Event Anders Vergaderen
The Connected Company - Event Anders VergaderenThe Connected Company - Event Anders Vergaderen
The Connected Company - Event Anders Vergaderen
Joris Poelmans
 
Ex louisville 2011
Ex louisville 2011Ex louisville 2011
Ex louisville 2011
rdurhamuk
 

Viewers also liked (20)

Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014
 
Moving to the Cloud – Risk, Control, and Accounting Considerations
Moving to the Cloud – Risk, Control, and Accounting ConsiderationsMoving to the Cloud – Risk, Control, and Accounting Considerations
Moving to the Cloud – Risk, Control, and Accounting Considerations
 
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
Evaluating an Instructional Sequence with Interactive Simulations (ISIS)
Evaluating an Instructional Sequence with Interactive Simulations (ISIS)Evaluating an Instructional Sequence with Interactive Simulations (ISIS)
Evaluating an Instructional Sequence with Interactive Simulations (ISIS)
 
синеглазая гжель»
синеглазая гжель»синеглазая гжель»
синеглазая гжель»
 
Grand Chase
Grand  ChaseGrand  Chase
Grand Chase
 
MobileDiagnosis Project technical Presentation 2014
MobileDiagnosis Project  technical Presentation  2014MobileDiagnosis Project  technical Presentation  2014
MobileDiagnosis Project technical Presentation 2014
 
Ist storyboard final
Ist storyboard finalIst storyboard final
Ist storyboard final
 
New era
New eraNew era
New era
 
UP BUSINESS MART
UP BUSINESS MART UP BUSINESS MART
UP BUSINESS MART
 
Cleaning Out Your IT Closet - SPSRED 2013
Cleaning Out Your IT Closet - SPSRED 2013Cleaning Out Your IT Closet - SPSRED 2013
Cleaning Out Your IT Closet - SPSRED 2013
 
Insert latest articles on blogger
Insert latest articles on bloggerInsert latest articles on blogger
Insert latest articles on blogger
 
Happier teams by cesario ramos and pascal dufour
Happier teams by cesario ramos and pascal dufourHappier teams by cesario ramos and pascal dufour
Happier teams by cesario ramos and pascal dufour
 
36448696 alege-jucariile-potrivite-bebelusului-tau
36448696 alege-jucariile-potrivite-bebelusului-tau36448696 alege-jucariile-potrivite-bebelusului-tau
36448696 alege-jucariile-potrivite-bebelusului-tau
 
Amazon summit 2015
Amazon summit 2015Amazon summit 2015
Amazon summit 2015
 
The Connected Company - Event Anders Vergaderen
The Connected Company - Event Anders VergaderenThe Connected Company - Event Anders Vergaderen
The Connected Company - Event Anders Vergaderen
 
Ex louisville 2011
Ex louisville 2011Ex louisville 2011
Ex louisville 2011
 

Similar to Cloud computing risk & challenges

Understanding Cloud Computing & How Global Trade Management Solutions Work in...
Understanding Cloud Computing & How Global Trade Management Solutions Work in...Understanding Cloud Computing & How Global Trade Management Solutions Work in...
Understanding Cloud Computing & How Global Trade Management Solutions Work in...
Integration Point
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing Loughtec
 
Cloud Computing and Data Center Futures
Cloud Computing and Data Center FuturesCloud Computing and Data Center Futures
Cloud Computing and Data Center Futures
Martin Hingley
 
Introduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationIntroduction to Cloud B2B Integration
Introduction to Cloud B2B Integration
Mark Morley, MBA
 
Application of Cloud Computing in the Retail sector
Application of Cloud Computing in the Retail sectorApplication of Cloud Computing in the Retail sector
Application of Cloud Computing in the Retail sector
Nupur Agarwal
 
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
SURFnet
 
5 Reasons Why Accountants Should Use Cloud Computing
5 Reasons Why Accountants Should Use Cloud Computing5 Reasons Why Accountants Should Use Cloud Computing
5 Reasons Why Accountants Should Use Cloud Computing
Monika Goel
 
The 4 Things You Need To Know Before Migrating Your Business To The Cloud
The 4 Things You Need To Know Before Migrating Your Business To The CloudThe 4 Things You Need To Know Before Migrating Your Business To The Cloud
The 4 Things You Need To Know Before Migrating Your Business To The Cloud
Bright Technology
 
FOUNDATION for ROM - Petrobras Event
FOUNDATION for ROM - Petrobras EventFOUNDATION for ROM - Petrobras Event
FOUNDATION for ROM - Petrobras Event
FieldComm Group
 
IFRS 15 - The state of progress in Europe
IFRS 15 - The state of progress in EuropeIFRS 15 - The state of progress in Europe
IFRS 15 - The state of progress in Europe
Aptitude Software
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
Fast Data Overview
Fast Data OverviewFast Data Overview
Fast Data Overview
C. Scyphers
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)
ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)
ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)
Emtec Inc.
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Maureen Donovan
 
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless
 
Cloudonomics in Advanced Cloud Computing
Cloudonomics in Advanced Cloud ComputingCloudonomics in Advanced Cloud Computing
Cloudonomics in Advanced Cloud Computing
Mahbubur Rahman
 
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless
 
Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?
James Crawshaw
 
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businessesUnderstanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
Sentronex
 

Similar to Cloud computing risk & challenges (20)

Understanding Cloud Computing & How Global Trade Management Solutions Work in...
Understanding Cloud Computing & How Global Trade Management Solutions Work in...Understanding Cloud Computing & How Global Trade Management Solutions Work in...
Understanding Cloud Computing & How Global Trade Management Solutions Work in...
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing
 
Cloud Computing and Data Center Futures
Cloud Computing and Data Center FuturesCloud Computing and Data Center Futures
Cloud Computing and Data Center Futures
 
Introduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationIntroduction to Cloud B2B Integration
Introduction to Cloud B2B Integration
 
Application of Cloud Computing in the Retail sector
Application of Cloud Computing in the Retail sectorApplication of Cloud Computing in the Retail sector
Application of Cloud Computing in the Retail sector
 
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
Nieuwe onderwijs- en onderzoekstoepassingen door slimme wifi-netwerken - Roy ...
 
5 Reasons Why Accountants Should Use Cloud Computing
5 Reasons Why Accountants Should Use Cloud Computing5 Reasons Why Accountants Should Use Cloud Computing
5 Reasons Why Accountants Should Use Cloud Computing
 
The 4 Things You Need To Know Before Migrating Your Business To The Cloud
The 4 Things You Need To Know Before Migrating Your Business To The CloudThe 4 Things You Need To Know Before Migrating Your Business To The Cloud
The 4 Things You Need To Know Before Migrating Your Business To The Cloud
 
FOUNDATION for ROM - Petrobras Event
FOUNDATION for ROM - Petrobras EventFOUNDATION for ROM - Petrobras Event
FOUNDATION for ROM - Petrobras Event
 
IFRS 15 - The state of progress in Europe
IFRS 15 - The state of progress in EuropeIFRS 15 - The state of progress in Europe
IFRS 15 - The state of progress in Europe
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Fast Data Overview
Fast Data OverviewFast Data Overview
Fast Data Overview
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)
ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)
ERP 2.0 (Cloud, New Functionality, FAH, Integration and M&A Focus)
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w Cradlepoint
 
Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014Sierra Wireless Corporate Overview - November 2014
Sierra Wireless Corporate Overview - November 2014
 
Cloudonomics in Advanced Cloud Computing
Cloudonomics in Advanced Cloud ComputingCloudonomics in Advanced Cloud Computing
Cloudonomics in Advanced Cloud Computing
 
Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014Sierra Wireless Corporate Overview - August 2014
Sierra Wireless Corporate Overview - August 2014
 
Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?
 
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businessesUnderstanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
 

More from Parag Deodhar

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
Parag Deodhar
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Parag Deodhar
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC Framework
Parag Deodhar
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & Assessment
Parag Deodhar
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
Parag Deodhar
 
Scouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharScouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag Deodhar
Parag Deodhar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
Parag Deodhar
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
Parag Deodhar
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaboration
Parag Deodhar
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodhar
Parag Deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodhar
Parag Deodhar
 

More from Parag Deodhar (11)

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC Framework
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & Assessment
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
 
Scouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharScouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag Deodhar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaboration
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodhar
 

Recently uploaded

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Cloud computing risk & challenges