SlideShare a Scribd company logo
The	New	Best	Practices:
Cloud	Computing,	Hybrid	Architecture	and	Agile	IT	Delivery
Sami	Laine
Principal	Technologist
CloudPassage
Introducing	CloudPassage
On-demand,	automated	security	platform	that	works	anywhere,	at any	scale
Mature	startup	– $91M	funding	from	leading	VCs
100+	enterprise	customers
7X growth	in	protected workloads in	last	2	years
3 |				©	2016	CloudPassage	Confidential	
How	long	do	your
most	transient	
workloads	live?
4 |				©	2016	CloudPassage	Confidential	
Weeks MinutesHours
Transformation	of	Infrastructure	Delivery
Driven	by	business
Agility,	Speed,	Efficiency
Software-defined	DC IT-as-a-Service Public,	Hybrid	&	Multicloud
Transformation	of	Infrastructure	Delivery
Traditional	(Mode	1) Modern	(Mode	2)
Data	Center
Data	Center,	SDDC
or	Private	Cloud	
Public,	Hybrid
or	Multi-Cloud
• Data	center	&	perimeter	oriented
• Applications	on	dedicated	hardware
• Total	ownership,	visibility	&	control
• Low	rate	of	change
• Cloud	oriented,	degraded	perimeter
• Shared	resources,	distributed	workloads
• Shared	ownership,	low	visibility	&	control
• High	rate	of	change
7 |				©	2016	CloudPassage	Confidential	
How	many	
more	servers	
will	you	have?
Performance	Data	Source:	Geekbench (Primate	Labs)
AWS	EC2	c4.large
Score:	3,911
36	nodes
Azure	Standard	A3
Score:	3,594
39	nodes
Dell	PowerEdge	R930
Score:	141,129
1	node
Infrastructure	Scale
Performance	Data	Source:	Geekbench (Primate	Labs)
AWS	EC2	c4.large
Score:	3,911
36	nodes
Azure	Standard	A3
Score:	3,594
39	nodes
Dell	PowerEdge	R930
Score:	141,129
1	node
30-40x	more	
systems	to	secure
Infrastructure	Scale
10 |				©	2016	CloudPassage	Confidential	
How	often
will	your	
servers	change?
Transformation	of	Application	Delivery
Jan DecFeb Mar Apr May Jun Jul Aug Sep Oct Nov
Q1 Q2 Q3 Q4
Mon Tue Wed Thu Fri Sat Sun
November
Plan Code DeployTest/QA
Waterfall	(Mode	1) DevOps	(Mode	2)
• 9-12	month	cycle	time
• Very	large	release	size
• Manual	deployment
• 1-day	cycle	time
• Frequent,	small	changes
• Automated	deployment
Transformation	of	Application	Delivery
Source:	Puppet	Labs	2016	State	of	DevOps	Report
Speed
200x
200x	more	
frequent
deployments
Resilience
24x
24x	faster
recovery	from
failures
Quality
3x
3x	lower
change	failure
rate
Efficiency
2,555x
2,555x	shorter
lead	times
Security
2x	less	time	
on	security	
remediation	
2x
Source:	Puppet	Labs	2016	State	of	DevOps	Report
Speed Resilience Quality Efficiency
200x 24x 3x 2,555x
200x	more	
frequent
deployments
24x	faster
recovery	from
failures
3x	lower
change	failure
rate
2,555x	shorter
lead	times
Security
2x	less	time	
on	security	
remediation	
2x
Transformation	of	Application	Delivery
200x	more	
frequent	deployments
14 |				©	2016	CloudPassage	Confidential	
So	what?
Speed	and	Automation	Breaks	Traditional	Security
Sorry	about	that.
Data	Center,	SDDC
or	Private	Cloud	
Public,	Hybrid
or	Multi-Cloud
Speed	and	Automation	Breaks	Traditional	Security
• Perimeter	and	network	focused
• Heavy	footprints	on	systems
• Built	for	static	IP	addresses
• Not	designed	for	automation
• Lacks	comprehensive	APIs
• Relies	on	dedicated	appliances
17 |				©	2016	CloudPassage	Confidential	
Agile	IT
requires
agile	security!
Release	Process
Plan Code Build Test Release Deploy Operate
Agile Development
Continuous Integration
Continuous Delivery
DevOps
Value
Continuous Deployment
OpsDev
Collaboration
Traditional	Security
Plan Code Build Test Release Deploy Operate
Achtung!
Security
Gate!
Yay! Security Guardrails!
Re-align	Security	To	Modern	IT	Delivery
Plan Code Build Test Release Deploy Operate
Yay! Security Guardrails!
Re-align	Security	To	Modern	IT	Delivery
Plan Code Build Test Release Deploy Operate
• Plan	– Define	security	policy	and	benchmarks	for	each	type	of	workload
• Build		&	Test	– Catch	vulnerability	&	configuration	issues,	generate	baselines
• Deploy	– Apply	production	policies	to	systems	automatically
• Operate	– Continuously	feed	SecOps and	Audit	&	Compliance	systems
Re-align	Security	To	Modern	IT	Delivery
• On-demand,	self-service
• Automated,	rapid	expansion
• Measured	or	metered	service
• Ubiquitous,	convenient	access
• Resource	pooled	grid
• Highly	scalable
• Design-pattern	based
• On-demand,	Security-as-a-Service
• Automated,	rapid	expansion
• Metered	licensing	
• Ubiquitous,	convenient	access
• Resource	pooled	grid
• Highly	scalable
• Design-pattern	based
Agile	IT	Delivery Agile	Security	Delivery
23 |				©	2016	CloudPassage	Confidential	
What	is	the
new	role
of	security?
New	Role	of	Security
vs.
Culture
• collaboration
• education
Automation
• integration	to	toolchain	
• policy	development
Measurement
• outcomes
• feedback
The Eight Imperatives for Agile & Scalable
Cloud Security
1. Deeply automated & API-driven
2. Ready for orchestration
3. Built into workloads
4. Runs anywhere
5. Context-aware & policy-based
6. Broad set of controls
7. Instant & long-term scalability
8. Aligned with DevOps principles
26 |				©	2016	CloudPassage	Confidential	
OK,	so…
what	do	you	guys	
do	about	it?
CloudPassage	Halo
Reduce	Software
Attack	Surface
• Vulnerabilities
• Configuration	
• Accounts
Monitor	for
Compromise
• Integrity
• Intrusion	
Reduce	Network	
Attack	Surface
• Connections
• Firewall
• Authentication
VMs
Servers
VMs
Public	Clouds Data	Centers	&	Private	Clouds
VMs
Infrastructure	Orchestration
SOC	&	GRC	Systems
CSA colorado 2016 presentation CloudPassage

More Related Content

What's hot

Multi cloud migration decision framework
Multi cloud migration decision frameworkMulti cloud migration decision framework
Multi cloud migration decision framework
Josh Petla
 
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStoreBring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
NEXTtour
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale
 
2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack
PT Datacomm Diangraha
 
Track technologique multi-cloud adoption
Track technologique multi-cloud adoptionTrack technologique multi-cloud adoption
Track technologique multi-cloud adoption
Veritas Technologies LLC
 
The promise of multi cloud
The promise of multi cloudThe promise of multi cloud
The promise of multi cloud
Rishidot Research
 
Predictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web ServicesPredictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web Services
Veritas Technologies LLC
 
Dell EMC Transform for the Future; The 6 Rules for Disruption
Dell EMC Transform for the Future; The 6 Rules for DisruptionDell EMC Transform for the Future; The 6 Rules for Disruption
Dell EMC Transform for the Future; The 6 Rules for Disruption
NEXTtour
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
Veritas Technologies LLC
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
MariaDB plc
 
Cloudera training secure your cloudera cluster 7.10.18
Cloudera training secure your cloudera cluster 7.10.18Cloudera training secure your cloudera cluster 7.10.18
Cloudera training secure your cloudera cluster 7.10.18
Cloudera, Inc.
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
Softchoice Corporation
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
Armor
 
O365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance ConundrumO365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
Veritas Technologies LLC
 
Seven Seas Technology
Seven Seas TechnologySeven Seas Technology
Seven Seas Technology
Unnikrishnan P
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPoint
Veritas Technologies LLC
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
Veritas Technologies LLC
 
IT Resilience Technical
IT Resilience TechnicalIT Resilience Technical
IT Resilience Technical
PT Datacomm Diangraha
 
SUSE OpenStack Cloud + Nutanix
SUSE OpenStack Cloud + NutanixSUSE OpenStack Cloud + Nutanix
SUSE OpenStack Cloud + Nutanix
NEXTtour
 
HIPAA and HITRUST on AWS
HIPAA and HITRUST on AWSHIPAA and HITRUST on AWS
HIPAA and HITRUST on AWS
LogicworksNY
 

What's hot (20)

Multi cloud migration decision framework
Multi cloud migration decision frameworkMulti cloud migration decision framework
Multi cloud migration decision framework
 
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStoreBring Object Storage to your Nutanix Cluster with Cloudian HyperStore
Bring Object Storage to your Nutanix Cluster with Cloudian HyperStore
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
 
2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack
 
Track technologique multi-cloud adoption
Track technologique multi-cloud adoptionTrack technologique multi-cloud adoption
Track technologique multi-cloud adoption
 
The promise of multi cloud
The promise of multi cloudThe promise of multi cloud
The promise of multi cloud
 
Predictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web ServicesPredictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web Services
 
Dell EMC Transform for the Future; The 6 Rules for Disruption
Dell EMC Transform for the Future; The 6 Rules for DisruptionDell EMC Transform for the Future; The 6 Rules for Disruption
Dell EMC Transform for the Future; The 6 Rules for Disruption
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
 
Cloudera training secure your cloudera cluster 7.10.18
Cloudera training secure your cloudera cluster 7.10.18Cloudera training secure your cloudera cluster 7.10.18
Cloudera training secure your cloudera cluster 7.10.18
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
 
O365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance ConundrumO365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
O365 E3 + Veritas > O365 E5: Solve the Governance Conundrum
 
Seven Seas Technology
Seven Seas TechnologySeven Seas Technology
Seven Seas Technology
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPoint
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
 
IT Resilience Technical
IT Resilience TechnicalIT Resilience Technical
IT Resilience Technical
 
SUSE OpenStack Cloud + Nutanix
SUSE OpenStack Cloud + NutanixSUSE OpenStack Cloud + Nutanix
SUSE OpenStack Cloud + Nutanix
 
HIPAA and HITRUST on AWS
HIPAA and HITRUST on AWSHIPAA and HITRUST on AWS
HIPAA and HITRUST on AWS
 

Viewers also liked

Getting Started with DevOps
Getting Started with DevOpsGetting Started with DevOps
Getting Started with DevOps
Stefano Bellasio
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
 
Kush janë besimtarët e vërtetë
Kush janë besimtarët e vërtetëKush janë besimtarët e vërtetë
Kush janë besimtarët e vërtetë
Mondi Marku
 
Esx & ESXi server
Esx & ESXi serverEsx & ESXi server
Esx & ESXi serverMalfor Saja
 
Methodologie et outils d optimisation php mysql
Methodologie et outils d optimisation php mysqlMethodologie et outils d optimisation php mysql
Methodologie et outils d optimisation php mysql
Codizy
 
Dituria islame dhe ti
Dituria islame dhe ti Dituria islame dhe ti
Dituria islame dhe ti
Mondi Marku
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
CloudPassage
 
Quo vadis DevOps
Quo vadis DevOpsQuo vadis DevOps
Quo vadis DevOps
cusy GmbH
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (11)

Getting Started with DevOps
Getting Started with DevOpsGetting Started with DevOps
Getting Started with DevOps
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
Kush janë besimtarët e vërtetë
Kush janë besimtarët e vërtetëKush janë besimtarët e vërtetë
Kush janë besimtarët e vërtetë
 
Esx & ESXi server
Esx & ESXi serverEsx & ESXi server
Esx & ESXi server
 
Methodologie et outils d optimisation php mysql
Methodologie et outils d optimisation php mysqlMethodologie et outils d optimisation php mysql
Methodologie et outils d optimisation php mysql
 
Dituria islame dhe ti
Dituria islame dhe ti Dituria islame dhe ti
Dituria islame dhe ti
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
Quo vadis DevOps
Quo vadis DevOpsQuo vadis DevOps
Quo vadis DevOps
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to CSA colorado 2016 presentation CloudPassage

Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013
RightScale
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
CloudPassage
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
PT Datacomm Diangraha
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
Amazon Web Services
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
krisbliesner
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
Red Hat India Pvt. Ltd.
 
Advancing Cloud Initiatives and Removing Barriers to Adoption
Advancing Cloud Initiatives and Removing Barriers to AdoptionAdvancing Cloud Initiatives and Removing Barriers to Adoption
Advancing Cloud Initiatives and Removing Barriers to Adoption
RightScale
 
EVOLUTION San Francisco
EVOLUTION San Francisco EVOLUTION San Francisco
EVOLUTION San Francisco
Equinix
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
Neethu Kuruvilla
 
Evaluating the Cloud
Evaluating the CloudEvaluating the Cloud
Evaluating the Cloud
SociusPartner
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
Jade Global
 
Cloud managed services
Cloud managed servicesCloud managed services
Cloud managed services
Jade Global
 
Cloud Migration Solution
Cloud Migration Solution Cloud Migration Solution
Cloud Migration Solution
Jade Global
 
Hybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptxHybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptx
zhunli4
 
Managed Cloud & Advanced Deployments | Goals & Solutions Version
Managed Cloud & Advanced Deployments | Goals & Solutions VersionManaged Cloud & Advanced Deployments | Goals & Solutions Version
Managed Cloud & Advanced Deployments | Goals & Solutions Version
Marco K
 
Accelerating the Path to Digital with a Cloud Data Strategy
Accelerating the Path to Digital with a Cloud Data StrategyAccelerating the Path to Digital with a Cloud Data Strategy
Accelerating the Path to Digital with a Cloud Data Strategy
MongoDB
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
RapidScale
 
Webinar | From Zero to 1 Million with Google Cloud Platform and DataStax
Webinar | From Zero to 1 Million with Google Cloud Platform and DataStaxWebinar | From Zero to 1 Million with Google Cloud Platform and DataStax
Webinar | From Zero to 1 Million with Google Cloud Platform and DataStax
DataStax
 
Managed Services Cloud Computing
Managed Services Cloud Computing Managed Services Cloud Computing
Managed Services Cloud Computing
dcVAST
 
Cloud Data Strategy event London
Cloud Data Strategy event LondonCloud Data Strategy event London
Cloud Data Strategy event London
MongoDB
 

Similar to CSA colorado 2016 presentation CloudPassage (20)

Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
Advancing Cloud Initiatives and Removing Barriers to Adoption
Advancing Cloud Initiatives and Removing Barriers to AdoptionAdvancing Cloud Initiatives and Removing Barriers to Adoption
Advancing Cloud Initiatives and Removing Barriers to Adoption
 
EVOLUTION San Francisco
EVOLUTION San Francisco EVOLUTION San Francisco
EVOLUTION San Francisco
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
Evaluating the Cloud
Evaluating the CloudEvaluating the Cloud
Evaluating the Cloud
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
 
Cloud managed services
Cloud managed servicesCloud managed services
Cloud managed services
 
Cloud Migration Solution
Cloud Migration Solution Cloud Migration Solution
Cloud Migration Solution
 
Hybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptxHybrid Cloud Transformation Fast Track.pptx
Hybrid Cloud Transformation Fast Track.pptx
 
Managed Cloud & Advanced Deployments | Goals & Solutions Version
Managed Cloud & Advanced Deployments | Goals & Solutions VersionManaged Cloud & Advanced Deployments | Goals & Solutions Version
Managed Cloud & Advanced Deployments | Goals & Solutions Version
 
Accelerating the Path to Digital with a Cloud Data Strategy
Accelerating the Path to Digital with a Cloud Data StrategyAccelerating the Path to Digital with a Cloud Data Strategy
Accelerating the Path to Digital with a Cloud Data Strategy
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
Webinar | From Zero to 1 Million with Google Cloud Platform and DataStax
Webinar | From Zero to 1 Million with Google Cloud Platform and DataStaxWebinar | From Zero to 1 Million with Google Cloud Platform and DataStax
Webinar | From Zero to 1 Million with Google Cloud Platform and DataStax
 
Managed Services Cloud Computing
Managed Services Cloud Computing Managed Services Cloud Computing
Managed Services Cloud Computing
 
Cloud Data Strategy event London
Cloud Data Strategy event LondonCloud Data Strategy event London
Cloud Data Strategy event London
 

More from Trish McGinity, CCSK

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
Trish McGinity, CCSK
 
Privacy 101
Privacy 101Privacy 101
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
Trish McGinity, CCSK
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
Trish McGinity, CCSK
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
Trish McGinity, CCSK
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
Trish McGinity, CCSK
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
Trish McGinity, CCSK
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
Trish McGinity, CCSK
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
Trish McGinity, CCSK
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
Trish McGinity, CCSK
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
Trish McGinity, CCSK
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Trish McGinity, CCSK
 
Ed Rios - New ncc brief
Ed Rios - New ncc briefEd Rios - New ncc brief
Ed Rios - New ncc brief
Trish McGinity, CCSK
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certs
Trish McGinity, CCSK
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
Trish McGinity, CCSK
 

More from Trish McGinity, CCSK (15)

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Ed Rios - New ncc brief
Ed Rios - New ncc briefEd Rios - New ncc brief
Ed Rios - New ncc brief
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certs
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 

Recently uploaded (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 

CSA colorado 2016 presentation CloudPassage