SlideShare a Scribd company logo
1 of 43
BESTT	Group	Meeting
Best-practice:	protecting	security	&	privacy	on	the	cloud
Public release
Security
Privacy
AuditCloud	Security	&	Privacy
+	Security	Landscape	of	2017
©	ACinfotec	2017	|	www.acinfotec.com Page	2
Security	landscape	of	2017	and	beyond
Best	practice	for	securing	the	cloud
Best	practice	for	for	Protecting	Privacy	in	the	Cloud
Cloud	assurance	&	audit
Agenda
Key	takeaway
Source: The Global Risk Landscape 2016,
World Economic Forum
Cyber	attacks	are	among	Top	10	Risks
WEFORUM:	Global	Risk	Landscape	2016
Summary	of	2017	Cyber	Threat	Landscape
§ Advanced	Threats	Targeting	the	Cloud
§ Evolution	of	Ransomware:	Changing	Data	and	Destroying	Backups
§ GDPR	Compliance	Approaching
§ Increased	Demand	for	Cyber	Insurance
§ Shadow	IT
§ Cyber	Espionage	and	Warfare
§ Dronejacking
§ IoT Malware
§ Hacktivists	exposing	privacy	issues
2017	Cyber	Security	Trends	in	Thailand
§ Cyber	security	regulations	improvement
§ More	demand	for	cyber	security	skills
§ Attackers	will	target	consumers
§ Attackers	will	become	more	bolder,	more	commercial	
and	less	traceable
§ Breaches	will	get	more	complicated	and	harder	to	beat
RISKS
CLOUD	COMPUTING
©	ACinfotec	2017	|	www.acinfotec.com Page	7
Sensitive	Data	in	the	Cloud
Source:	Cloud	Adoption	&	Risk	Report	Q4/2015	by	Skyhigh
©	ACinfotec	2017	|	www.acinfotec.com Page	8
Cloud	Services	Lack	of	Basic	Security	Features
Source:	Cloud	Adoption	&	Risk	Report	Q1/2014	by	Skyhigh
©	ACinfotec	2017	|	www.acinfotec.com Page	9
CSA	Top	Threats:	Notorious	Nine
1. Data	Breaches
2. Data	Loss
3. Account	Hijacking
4. Insecure	APIs
5. Denial	of	Service
6. Malicious	Insiders
7. Abuse	of	Cloud	Services
8. Insufficient	Due	Diligence
9. Shared	Technology	Issues
Source:	https://cloudsecurityalliance.org/group/top-threats/
Best Practice
for Securing the Cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	11
Guideline	for	Implementing	Security	Controls	in	the	Cloud
• Controls	derived	from	
guidance
• Mapped	to	familiar	
frameworks:	ISO	27001,	
PCI,	COBIT
• Applicable	to	IaaS,	PaaS,	
SaaS
• Customer	vs Provider	
roles
• Help	bridges	the	gap	for	
IT	and	IT	Auditor
©	ACinfotec	2017	|	www.acinfotec.com Page	12
CCM	v3.0.1	Details
©	ACinfotec	2017	|	www.acinfotec.com Page	13
Consensus	Assessment	Initiatives
§ Self-assessment	questionnaire,	which	can	be	used	to	assess	cloud	security
§ Latest	version	is	v3.0.1	covering	16	governing	&	operating	domains	aligned	with	CCM	
https://cloudsecurityalliance.org/group/consensus-assessments/
§ Main	mechanism	to	be	listed	in	CSA	STAR	registry	(see	later	slide)
©	ACinfotec	2017	|	www.acinfotec.com Page	14
Security	Guidance	for	Critical	Areas	of	Focus	in	Cloud	Computing	V3.0
Source:	https://cloudsecurityalliance.org/download/security-
guidance-for-critical-areas-of-focus-in-cloud-computing-v3/
Controls
CLOUD	COMPUTING
//	Other	Potential	Standards	//
©	ACinfotec	2017	|	www.acinfotec.com Page	16
NIST	SP	800-144
Guidelines	on	Security	and	Privacy	in	Public	Cloud	Computing
Source:	
http://csrc.nist.gov/publications/nistpubs/800-
144/SP800-144.pdf
©	ACinfotec	2017	|	www.acinfotec.com Page	17
NIST	SP	800-144
Security	and	Privacy	Issues	and	Recommendations
©	ACinfotec	2017	|	www.acinfotec.com Page	18
NIST	SP	800-144
9	Domains
80+	pages
©	ACinfotec	2017	|	www.acinfotec.com Page	19
ISO	27017	Cloud	Security
Code	of	practice	for	security	controls	based	on	ISO/	IEC	27002	for	cloud	services
• Cloud-specific,	ISO	standard
• provide	the	necessary	guidance	
on	information	security	controls	
for	the	cloud
• Supplemental	to	ISO	27001,	
ISO	27002	and	ISO	27018
• Can	be	used	by	both	Cloud	users	
and	Cloud	providers
©	ACinfotec	2017	|	www.acinfotec.com Page	20
ISO	27017	Cloud	Security
Introducing	ISO	27017
§ The objectives of this International Standard are to provide a security control framework and
implementation guidance for both cloud service customers and cloud service providers.
§ The guidelines of this International Standard include identification of risks and associated
controls for the use of cloud services..
ISO	27017
Controls	based	on	ISO	27002
ISO	27002	
controls
ISO	27017
Annex	A
Provided	specific	guidance
for	cloud	service	customers	
and	cloud	service	providers	
base	on	ISO	27002	controls
Provided	extended	control	
set	for	securing	the	cloud
Specific	guidance	
for	cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	21
ISO	27017	Cloud	Security
Specific	Guidance	based	on	ISO	27002	Controls
ISO	27017
Controls	based	on	ISO	27002
ISO	27002	
controls
Specific	guidance	
for	cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	22
ISO	27017	Cloud	Security
Extended	control	set	for	securing	the	cloud
ISO	27017
Annex	A
©	ACinfotec	2017	|	www.acinfotec.com Page	23
ISO	27017	Cloud	Security
Guidance	for	security	risk	related	to	cloud	computing
ISO	27017
Annex	B
Best Practice
for Protecting Privacy in the Cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	25
ISO	27018	Public	Cloud	Privacy
Code	of	practice	for	protection	of	PII	in	public	clouds	acting	as	PII	processors
• Published	on	August	2014
• Cloud-specific,	ISO	standard
• Based	on	privacy	principles	
defined	in	ISO	29100
• Govern	how	users’	personally	
identifiable	information	(PII)	
should	be	protected	by	cloud	
providers
• Supplemental	to	ISO	27001	and
ISO	27002
©	ACinfotec	2017	|	www.acinfotec.com Page	26
ISO	27018	Public	Cloud	Privacy
Introducing	ISO	27018
§ Typically an organization implementing ISO/IEC 27001 is protecting its own information
assets. However, in the context of PII protection requirements for a public cloud service
provider acting as a PII processor, the organization is protecting the information assets
entrusted to it by its customers.
ISO	27018
Annex	A
Provided specific
guidance for protecting
PII base on ISO 27001
controls
Provided additional
controls for protecting
PII base on ISO 29100
principle
ISO	27018
Controls	based	on	ISO	27002
ISO	27002	
controls
Specific	guidance	
for	privacy	in	the	
cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	27
ISO	27018	Public	Cloud	Privacy
Specific	Guidance	based	on	ISO	27001	Controls
ISO	27018
Controls	based	on	ISO	27002
ISO	27002	
controls
Specific	guidance	
for	privacy	in	the	
cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	28
ISO	27018	Public	Cloud	Privacy
Additional	controls	base	on	ISO	29100	principle
ISO	27018
Annex	A
Assurance	&	Audit
CLOUD	COMPUTING
©	ACinfotec	2017	|	www.acinfotec.com Page	30
CSA	STAR	(Security,	Trust	and	Assurance	Registry)
Source:	www.cloudsecurityalliance.org/star
©	ACinfotec	2017	|	www.acinfotec.com Page	31
What	is	CSA	STAR?
§ Public	and	free	registry	of	Cloud	Provider	self	assessments,	demonstrating	
adoption	of:
§ Cloud	Control	Matrix	(CCM)
§ Consensus	Assessments	Initiative	Questionnaire	(CAIQ)
§ Promoting	transparency
§ Free	market	competition	to	provide	quality	assessment
§ Available	on	October	2011
©	ACinfotec	2017	|	www.acinfotec.com Page	32
CSA	STAR	– What’s	On
©	ACinfotec	2017	|	www.acinfotec.com Page	33
CSA	STAR	– What’s	On
©	ACinfotec	2017	|	www.acinfotec.com Page	34
CSA	STAR	Listing	Process
Level	1	– Self-Assessment
§Cloud	Provider	fills	out	CAIQ	or	customizes	CCM
§Uploads	document	at	CSA	STAR	website
§CSA	performs	basic	verification
§CSA	digitally	signs	and	post	at	STAR
§Free	of	charge
§Listing	expire	within	1	year
©	ACinfotec	2017	|	www.acinfotec.com Page	35
CSA	STAR	Certification
Level	2	– Certification
§Base	on	ISO	27001:2013	with	CSA	CCM	as	additional	or	
compensating	controls
§Measures	the	capability	levels of	the	cloud	service	provider
§Evaluates	the	efficiency	of	an	organization’s	ISMS	and	ensure	the	
scope,	processes	and	objectives	are	“Fit	for	Purpose”
§Based	on	the	PDCA model
©	ACinfotec	2017	|	www.acinfotec.com Page	36
CSA	STAR	Certification
§A	STAR	Certification	Certificate	cannot	be	issued	unless	the	
organization	has	achieved	ISO	27001	certification
§The	scope	of	ISO	27001	certification must	not	be	less	than	the	
scope	of	STAR	certification
§The	assessment	cycle	is	the	same	as	ISO	27001	– initial	assessment	
followed	by	surveillance	audits	over	a	3-year	period
©	ACinfotec	2017	|	www.acinfotec.com Page	37
Certifications of Leading Cloud Service Providers
©	ACinfotec	2017	|	www.acinfotec.com Page	38
Certifications of Leading Cloud Service Providers
©	ACinfotec	2017	|	www.acinfotec.com Page	39
Certifications of Leading Cloud Service Providers
©	ACinfotec	2017	|	www.acinfotec.com Page	40
Can	you	Perform	Pentest for	the	Cloud?
©	ACinfotec	2017	|	www.acinfotec.com Page	41
How	Certified	Cloud	Services	will	Help	You?
Key	Takeaway	– Securing	the	Cloud
Operations
§ Encrypt	data	when	possible,	segregate	
key	management	from	cloud	provider
§ Adapt	secure	software	development	
lifecycle
§ Understand	provider’s	patching,	
provisioning,	protection
§ Logging,	data	exfiltration,	granular	
customer	segregation
§ Hardened	VM	images
§ Assess	provider	IDM	integration,	e.g.	
SAML,	OpenID
Governance
§ Secure	cloud	engagement	before	
procurement	– contracts,	SLAs,	
architecture
§ Know	provider’s	BCM/DR,	financial	
viability,	employee	screening
§ Identify	data	location	when	possible
§ Plan	for	provider	termination	&	return	
of	assets
§ Preserve	right	to	audit
§ Reinvest	provider	cost	savings	into	due	
diligence
For more information, contact: ACinfotec Consulting Services
02-670-8980-3 | services@acinfotec.com | www.acinfotec.com
THANK YOU
DRIVING BUSINESS EXCELLENCE

More Related Content

What's hot

Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
 

What's hot (20)

Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
Introduction to Security in the Cloud - Mark Brooks, Alert LogicIntroduction to Security in the Cloud - Mark Brooks, Alert Logic
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 

Viewers also liked

Viewers also liked (6)

Multi – tenancy Challenges in Storage Cloud Byte
Multi – tenancy Challenges in Storage Cloud ByteMulti – tenancy Challenges in Storage Cloud Byte
Multi – tenancy Challenges in Storage Cloud Byte
 
Architecting Multi-Cloud Applications - Myth or Reality?
Architecting Multi-Cloud Applications - Myth or Reality?Architecting Multi-Cloud Applications - Myth or Reality?
Architecting Multi-Cloud Applications - Myth or Reality?
 
E newsletter promise_&_challenges_of_cloud storage-2
E newsletter promise_&_challenges_of_cloud storage-2E newsletter promise_&_challenges_of_cloud storage-2
E newsletter promise_&_challenges_of_cloud storage-2
 
A Federated Multi-Cloud PaaS Infrasctructure
A Federated Multi-Cloud PaaS InfrasctructureA Federated Multi-Cloud PaaS Infrasctructure
A Federated Multi-Cloud PaaS Infrasctructure
 
Not actually a DevOps Talk
Not actually a DevOps TalkNot actually a DevOps Talk
Not actually a DevOps Talk
 
How to Scale Operations for a Multi-Cloud Platform using PCF
How to Scale Operations for a Multi-Cloud Platform using PCFHow to Scale Operations for a Multi-Cloud Platform using PCF
How to Scale Operations for a Multi-Cloud Platform using PCF
 

Similar to Cloud Security & Privacy Standard Slide

The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Amazon Web Services
 

Similar to Cloud Security & Privacy Standard Slide (20)

Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
Growing need for cyber security
Growing need for cyber securityGrowing need for cyber security
Growing need for cyber security
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
The Future Of the Internet
The Future Of the Internet The Future Of the Internet
The Future Of the Internet
 
A world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsA world of connected object Designed to Serve Us
A world of connected object Designed to Serve Us
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Cloud Security & Privacy Standard Slide