Submit Search
Upload
CSA Argentina - Jornada CXO Cloud
•
0 likes
•
416 views
CSA Argentina
Follow
26 de septiembre de 2012
Read less
Read more
Technology
Report
Share
Report
Share
1 of 26
Download now
Download to read offline
Recommended
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
Netskope
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
Netskope
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Netskope
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
Netskope
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
Seclore
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Netskope
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Netskope
Recommended
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
Netskope
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
Netskope
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Netskope
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
Netskope
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
Seclore
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Netskope
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Netskope
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Netskope
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Netskope
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
Netskope
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
JoAnna Cheshire
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
David Terrar
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Netskope
Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
Cloud Security
Cloud Security
The TNS Group
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
CipherCloud
Tufin SecureCloud
Tufin SecureCloud
Matt Kerr
Identity as the Perimeter
Identity as the Perimeter
scoopnewsgroup
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
OpenStack Cloud Learning
OpenStack Cloud Learning
Michael Mullins
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
NetCraftsmen
Security In The Cloud Timed
Security In The Cloud Timed
Frederick James Rathweg
Accelerating Information with Identity
Accelerating Information with Identity
scoopnewsgroup
3245224.ppt
3245224.ppt
ahmad21315
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
More Related Content
What's hot
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Netskope
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Netskope
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
Netskope
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
JoAnna Cheshire
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
David Terrar
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Netskope
Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
Cloud Security
Cloud Security
The TNS Group
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
CipherCloud
Tufin SecureCloud
Tufin SecureCloud
Matt Kerr
Identity as the Perimeter
Identity as the Perimeter
scoopnewsgroup
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
OpenStack Cloud Learning
OpenStack Cloud Learning
Michael Mullins
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
NetCraftsmen
Security In The Cloud Timed
Security In The Cloud Timed
Frederick James Rathweg
Accelerating Information with Identity
Accelerating Information with Identity
scoopnewsgroup
What's hot
(20)
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Scot-Cloud 2015
Scot-Cloud 2015
Cloud Security
Cloud Security
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
Tufin SecureCloud
Tufin SecureCloud
Identity as the Perimeter
Identity as the Perimeter
C-Level tools for Cloud security
C-Level tools for Cloud security
OpenStack Cloud Learning
OpenStack Cloud Learning
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
Security In The Cloud Timed
Security In The Cloud Timed
Accelerating Information with Identity
Accelerating Information with Identity
Similar to CSA Argentina - Jornada CXO Cloud
3245224.ppt
3245224.ppt
ahmad21315
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
CSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO Cloud
cloudsa_arg
CSA & GRC Stack
CSA & GRC Stack
CloudSecurityAllianceAustralia
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Oracle here. now. your choice.
Oracle here. now. your choice.
CIOEastAfrica
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Phil Agcaoili
Alfresco digital assetmanagement-042111-final
Alfresco digital assetmanagement-042111-final
Emil Loreto
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
HarshitParkar6677
Presentation big data
Presentation big data
xKinAnx
Let's Talk Mobile
Let's Talk Mobile
Chris Muir
Cloud Native Empowered Culture
Cloud Native Empowered Culture
VMware Tanzu
Cloud Native Infrastructure Automation
Cloud Native Infrastructure Automation
VMware Tanzu
Blockchain and Apache NiFi
Blockchain and Apache NiFi
Timothy Spann
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
RightScale
CSA Standards Development Summary
CSA Standards Development Summary
CloudSecurityAllianceAustralia
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Research
guestba832ad
Isaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) print
Marc Vael
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure
Similar to CSA Argentina - Jornada CXO Cloud
(20)
3245224.ppt
3245224.ppt
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
CSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO Cloud
CSA & GRC Stack
CSA & GRC Stack
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
Oracle here. now. your choice.
Oracle here. now. your choice.
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Alfresco digital assetmanagement-042111-final
Alfresco digital assetmanagement-042111-final
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Presentation big data
Presentation big data
Let's Talk Mobile
Let's Talk Mobile
Cloud Native Empowered Culture
Cloud Native Empowered Culture
Cloud Native Infrastructure Automation
Cloud Native Infrastructure Automation
Blockchain and Apache NiFi
Blockchain and Apache NiFi
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
CSA Standards Development Summary
CSA Standards Development Summary
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Research
Isaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) print
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
More from CSA Argentina
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
CSA Argentina
Cloud native y donde esta el piloto
Cloud native y donde esta el piloto
CSA Argentina
Iam dev secops the infinity loop saga
Iam dev secops the infinity loop saga
CSA Argentina
Presentacion DevSecOps Argentina
Presentacion DevSecOps Argentina
CSA Argentina
Revista CSA LATAM FORUM 2019
Revista CSA LATAM FORUM 2019
CSA Argentina
Cloud security adoption sophos
Cloud security adoption sophos
CSA Argentina
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
CSA Argentina
Hardening usuarios smartfense
Hardening usuarios smartfense
CSA Argentina
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
CSA Argentina
Automated security analysis of aws clouds v1.0
Automated security analysis of aws clouds v1.0
CSA Argentina
2018 cyberark evento cloud
2018 cyberark evento cloud
CSA Argentina
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
Csa Summit 2017 - Managing multicloud environments
Csa Summit 2017 - Managing multicloud environments
CSA Argentina
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
CSA Argentina
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
CSA Argentina
Csa Summit 2017 - Csa Star for dummies
Csa Summit 2017 - Csa Star for dummies
CSA Argentina
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
CSA Argentina
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
CSA Argentina
SECURITY AS A WAR - Infosecurity 2015
SECURITY AS A WAR - Infosecurity 2015
CSA Argentina
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
CSA Argentina
More from CSA Argentina
(20)
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
Cloud native y donde esta el piloto
Cloud native y donde esta el piloto
Iam dev secops the infinity loop saga
Iam dev secops the infinity loop saga
Presentacion DevSecOps Argentina
Presentacion DevSecOps Argentina
Revista CSA LATAM FORUM 2019
Revista CSA LATAM FORUM 2019
Cloud security adoption sophos
Cloud security adoption sophos
CSA LATAM FORUM - NETSKOPE
CSA LATAM FORUM - NETSKOPE
Hardening usuarios smartfense
Hardening usuarios smartfense
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
Automated security analysis of aws clouds v1.0
Automated security analysis of aws clouds v1.0
2018 cyberark evento cloud
2018 cyberark evento cloud
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Managing multicloud environments
Csa Summit 2017 - Managing multicloud environments
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
Csa Summit 2017 - Csa Star for dummies
Csa Summit 2017 - Csa Star for dummies
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
SECURITY AS A WAR - Infosecurity 2015
SECURITY AS A WAR - Infosecurity 2015
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
Recently uploaded
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Precisely
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Recently uploaded
(20)
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
CSA Argentina - Jornada CXO Cloud
1.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance Haciendo Sinergia Lic. Diego San Esteban, CRISC Board Member CSA Argentina
2.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Promover el uso de las mejores prácticas para ofrecer garantías de seguridad en Cloud Computing, y proporcionar educación sobre los usos de la computación en la nube para ayudar a asegurar todas las otras formas de computación.
3.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
4.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance 2012 – Capitulo Oficial 2 años trabajando + 20 miembros + 6 reuniones anuales Proyectos Locales en Idioma local
5.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Afiliación Capítulos Corporativos Patrocinante s
6.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://chapters.cloudsecurityalliance.org/argentina/ @Cloudsa_arg
7.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance http://cloudsecurityalliance.org/research/
8.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Consensus Assessments Initiative + 200 Cloud Controls Matrix + 90
9.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance La versión 3 amplía el contenido que se incluye en las versiones anteriores con recomendaciones prácticas y requisitos que se pueden medir y auditar.
10.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance SLA Chapters group Effective SLAs and their Management is a key factor in the successful adoption of the Cloud
11.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Initiative 1 - Top Mobile Threats) Initiative 6 - Mobile Device Management Mobile Device Management Key Components www.cloudsecurityalliance.org/mobile
12.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Identify Threats unique to, or magnified by Cloud Development of V2.1 Top Threats Submission and Review https://cloudsecurityalliance.org/research/top-threats/#_submit For more information on the Top Threats Working Group https://cloudsecurityalliance.org/topthreats/
13.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://cloudsecurityalliance.org/research/big-data/ Initiatives Data Analytics for Security Privacy Preserving/Enhancing Technologies Big Data-Scale Crypto Cloud Infrastructures’ Attack Surface Analysis and Reduction Policy and Governance Big Data Framework
14.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance 5 Telecom Initiatives Telecom and the GRC Stack ISO 27017 Compliance Monitoring Cloud Forensics and Legal https://cloudsecurityalliance.org/research/telecom/
15.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance New Working Group Co-chairs Introducing Sean Cordero, Evelyn de Souza, Thomas Kenyon CCM 1.3 peer review released in July More updates scheduled in 2012 (AICPA, NIST, and more) CCM 2.0 release 2013 CSA Interact coming soon
16.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance CSA, Trusted Cloud Initiative Interactive Site https://research.cloudsecurityalliance.org/tci/ TCI Roadmap for Q2 Architecture Maintenance Site – on CSA Interact soon Architecture Feedback Forum Interactive Site: Phase II - Heatmapping Interactive Site: Phase III – Input/Output Questionnaire Get Involved https://cloudsecurityalliance.org/research/tci/#_get-involved
17.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Health Initiatives HIPAA and HiTech Best Practices https://cloudsecurityalliance.org/research/him/
18.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Implementation Guidance for Categories
19.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance SLA + Pricacy = PLA
20.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Cloud Data Governance Initiatives Key Concerns of Cloud Data Stakeholders Data Lifecycle Model and Taxonomy Emerging Technologies
21.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Learn how you can participate in Cloud Security Alliance's goals to promote the use of best practices for providing security assurance within Cloud Computing http://www.linkedin.com/groups?gid=1864210 https://cloudsecurityalliance.org/get-involved/
22.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://cloudsecurityalliance.org/research/, the Submit Ideas tab Submit Your Research Ideas
23.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance https://cloudsecurityalliance.org/education/white-papers-and- educational-material/ Contribute to the CSA library
24.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
25.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Help Us Secure Cloud Computing https://chapters.cloudsecurityalliance.org/argentina/ press@ar.chapters.cloudsecurityalliance.org LinkedIn: www.linkedin.com/groups?gid=1864210 Twitter: @cloudsa_ar
26.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Download now