SlideShare a Scribd company logo
Is the cloud secure?
Ed Zedlewski, CIO, Eduserv




                             www.eduserv.org.uk
Cloud defined…
Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and
released with minimal management effort or service
provider interaction.

                  [National Institute of Standards and Technology]
                                                             www.eduserv.org.uk
Cloud defined…
On-demand self-service   SaaS
Broad network access     PaaS
Resource pooling         Private Cloud
Rapid elasticity         Community Cloud
Measured service         Public Cloud
consumption              Hybrid Cloud
IaaS


                                       www.eduserv.org.uk
Cloud defined…


I want to buy only the computing I need, when I need it




                                                     www.eduserv.org.uk
What is Cloud Security?

     I want my information and my services
protected from the bad guys and from accidents




                                           www.eduserv.org.uk
What could possibly go wrong?




                           www.eduserv.org.uk
Cloud scepticism
• 37% of businesses cite security concerns
• 13% (and rapidly rising) complexity of IT systems
  integration
• 13% resistance to change




                                                      www.eduserv.org.uk
… yet growth in cloud services is
rising faster than ever
•   71% of local government organisations are using
    cloud computing
•   37% of local government are currently using
    cloud applications
•   UK adults accessing the internet through a mobile
    device doubled between 2010 and 2012: source:
    Ofcom
Who is looking after your
service at 03:00 hours?




                            www.eduserv.org.uk
Is the security model fit for purpose?




                                www.eduserv.org.uk
Do you have effective MI
and understand your risks?




                             www.eduserv.org.uk
Where is your data?




                      www.eduserv.org.uk
How do you access your cloud service
•   8bn people
•   12bn MID
•   2bn houses
•   2bn TV’s
•   1.5bn bicycles
•   1bn cars


                                   www.eduserv.org.uk
How secure is your own IT shop?
• You will be subject to the same security challenges
• Do you have all the necessary skills
• Are you prepared to pay the cost of providing
  service elasticity




                                                    www.eduserv.org.uk
Increase in cyber-attacks

 (twice the level seen in 2010)
On average 54 significant attacks by an unauthorised
outsider were made on each large organisation in the
last year




                                                  www.eduserv.org.uk
Security breaches by staff
Computer fraud; data loss; regulatory breaches; lack of
education about security

• 19% of organisations suffered staff IT fraud
• 20% of small businesses lost confidential data




                                                   www.eduserv.org.uk
Security Investment?
67% of large organisations expect more security
breaches next year

50% of large organisations expect to spend more on
security next year

The challenge is getting value from the investment


                                                     www.eduserv.org.uk
MYTH: An in-house (xxx) server is more
secure than a hosted solution
TRUTH: for a business without dedicated, in-
house IT Professionals to monitor the security of
its network, in-house server solutions have less
physical security, digital security and backup
security than hosted solutions
MYTH: An in-house solution offers
more control than a Cloud solution
• Maybe, but is this good or bad?
• Who is counting the cost of change?
• Heavy customisation increases cost and
  reduces reliability
• Application servers are very
  complex, requiring high levels of skill 24x7
• Often cloud services abstract complexity
So what’s the difference?
• Robust authentication & authorisation
• Applications need to be architected for cloud
  deployment
      - Never trust user input
      - Encode all output
• Consider data encryption
• Effective service and contract management
Professionally built cloud services
•   Offer flexible levels of performance & security
•   Security designed in (not bolted on)
•   High availability designed in
•   Are monitored 7x24x365
•   Expertly managed
        - Delivering appropriate CIA


                                                      www.eduserv.org.uk
Questions?


Ed Zedlewski, CIO, Eduserv
Ed.Zedlewski@eduserv.org.uk
01225 470431
Or visit the Eduserv stand


                              www.eduserv.org.uk

More Related Content

What's hot

Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 myths
Dot Net IT
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
Bessie Wang
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
Netmagic Solutions Pvt. Ltd.
 
Smac
SmacSmac
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
Areej Qasrawi
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computing
lavanyamohan45
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
Chetan Kumar S
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
Jenny Jenish kyzy
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
Mphasis
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
Shawn Nutley
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
Atkins
 
Fog computing
Fog computingFog computing
Fog computing
Valarmathi Srinivasan
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
PiTechnologies in cloud computing
PiTechnologies in cloud computingPiTechnologies in cloud computing
PiTechnologies in cloud computing
PiTechnologies
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
Ahmed Banafa
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
IndSightsResearchSG
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
Syam Madanapalli
 

What's hot (20)

Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 myths
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 
Smac
SmacSmac
Smac
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computing
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
PiTechnologies in cloud computing
PiTechnologies in cloud computingPiTechnologies in cloud computing
PiTechnologies in cloud computing
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 

Viewers also liked

Social Impact Reporting, Pesh Framjee
Social Impact Reporting, Pesh FramjeeSocial Impact Reporting, Pesh Framjee
Social Impact Reporting, Pesh Framjee
CFG
 
3A - Pensions valuation - Kevin Barnes and Richard Soldan
3A - Pensions valuation - Kevin Barnes and Richard Soldan3A - Pensions valuation - Kevin Barnes and Richard Soldan
3A - Pensions valuation - Kevin Barnes and Richard Soldan
CFG
 
4D - Mentoring - Judith Jewell
4D - Mentoring - Judith Jewell4D - Mentoring - Judith Jewell
4D - Mentoring - Judith Jewell
CFG
 
3C - HR & volunteers - Hira Choudhury & Stephen Peck
3C - HR & volunteers - Hira Choudhury & Stephen Peck3C - HR & volunteers - Hira Choudhury & Stephen Peck
3C - HR & volunteers - Hira Choudhury & Stephen Peck
CFG
 
2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger
2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger
2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger
CFG
 
TimbaLabs Introduction
TimbaLabs IntroductionTimbaLabs Introduction
TimbaLabs Introduction
Wouter Mertens
 
Fantastic photography
Fantastic photographyFantastic photography
Fantastic photography
Iván Anero Terradillos
 
2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure
CFG
 
ГОСТ Р ИСО/МЭК 15408-2-2008
ГОСТ Р ИСО/МЭК 15408-2-2008ГОСТ Р ИСО/МЭК 15408-2-2008
ГОСТ Р ИСО/МЭК 15408-2-2008Sergey Erohin
 
1 a tina and philip
1 a tina and philip1 a tina and philip
1 a tina and philip
CFG
 
The Future of Financial Reporting for Charities, Don Bawtree, BDO
The Future of Financial Reporting for Charities, Don Bawtree, BDOThe Future of Financial Reporting for Charities, Don Bawtree, BDO
The Future of Financial Reporting for Charities, Don Bawtree, BDO
CFG
 
Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...
Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...
Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...
CFG
 
Technology in the Classroom 2012
Technology in the Classroom 2012Technology in the Classroom 2012
Technology in the Classroom 2012
Elizabeth Techman
 
Redescobrindo o tesouro perdido do culto familiar
Redescobrindo o tesouro perdido do culto familiarRedescobrindo o tesouro perdido do culto familiar
Redescobrindo o tesouro perdido do culto familiar
Katiúscia Alves
 
Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?
Rachna Sharma
 
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
CFG
 
25 years & the future - Andrew Hind
25 years & the future - Andrew Hind25 years & the future - Andrew Hind
25 years & the future - Andrew Hind
CFG
 
1C - Pensions 2012 - Melanie Cusack
1C - Pensions 2012 - Melanie Cusack1C - Pensions 2012 - Melanie Cusack
1C - Pensions 2012 - Melanie Cusack
CFG
 
Day 1 CLASS START UP ALL LEVELS SPANISH
Day 1 CLASS START UP ALL LEVELS SPANISHDay 1 CLASS START UP ALL LEVELS SPANISH
Day 1 CLASS START UP ALL LEVELS SPANISH
Elizabeth Techman
 

Viewers also liked (20)

Social Impact Reporting, Pesh Framjee
Social Impact Reporting, Pesh FramjeeSocial Impact Reporting, Pesh Framjee
Social Impact Reporting, Pesh Framjee
 
3A - Pensions valuation - Kevin Barnes and Richard Soldan
3A - Pensions valuation - Kevin Barnes and Richard Soldan3A - Pensions valuation - Kevin Barnes and Richard Soldan
3A - Pensions valuation - Kevin Barnes and Richard Soldan
 
4D - Mentoring - Judith Jewell
4D - Mentoring - Judith Jewell4D - Mentoring - Judith Jewell
4D - Mentoring - Judith Jewell
 
3C - HR & volunteers - Hira Choudhury & Stephen Peck
3C - HR & volunteers - Hira Choudhury & Stephen Peck3C - HR & volunteers - Hira Choudhury & Stephen Peck
3C - HR & volunteers - Hira Choudhury & Stephen Peck
 
2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger
2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger
2B - Social media – Does it actually work? - Anne Mccrossan & Steve Bridger
 
TimbaLabs Introduction
TimbaLabs IntroductionTimbaLabs Introduction
TimbaLabs Introduction
 
Fantastic photography
Fantastic photographyFantastic photography
Fantastic photography
 
2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure
 
ГОСТ Р ИСО/МЭК 15408-2-2008
ГОСТ Р ИСО/МЭК 15408-2-2008ГОСТ Р ИСО/МЭК 15408-2-2008
ГОСТ Р ИСО/МЭК 15408-2-2008
 
1 a tina and philip
1 a tina and philip1 a tina and philip
1 a tina and philip
 
The Future of Financial Reporting for Charities, Don Bawtree, BDO
The Future of Financial Reporting for Charities, Don Bawtree, BDOThe Future of Financial Reporting for Charities, Don Bawtree, BDO
The Future of Financial Reporting for Charities, Don Bawtree, BDO
 
Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...
Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...
Mergers and Collaborations, Philip Kirkpatrick, Bates Wells and Braithwaite a...
 
Technology in the Classroom 2012
Technology in the Classroom 2012Technology in the Classroom 2012
Technology in the Classroom 2012
 
Redescobrindo o tesouro perdido do culto familiar
Redescobrindo o tesouro perdido do culto familiarRedescobrindo o tesouro perdido do culto familiar
Redescobrindo o tesouro perdido do culto familiar
 
Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?
 
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
 
25 years & the future - Andrew Hind
25 years & the future - Andrew Hind25 years & the future - Andrew Hind
25 years & the future - Andrew Hind
 
Paz es...
Paz es...Paz es...
Paz es...
 
1C - Pensions 2012 - Melanie Cusack
1C - Pensions 2012 - Melanie Cusack1C - Pensions 2012 - Melanie Cusack
1C - Pensions 2012 - Melanie Cusack
 
Day 1 CLASS START UP ALL LEVELS SPANISH
Day 1 CLASS START UP ALL LEVELS SPANISHDay 1 CLASS START UP ALL LEVELS SPANISH
Day 1 CLASS START UP ALL LEVELS SPANISH
 

Similar to 4B - Is the cloud safe - Ed Zedlewski

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
sampleid978
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
Insights success media and technology pvt ltd
 
Cloud Computing - True Vision Technologies
Cloud Computing  - True Vision TechnologiesCloud Computing  - True Vision Technologies
Cloud Computing - True Vision Technologies
Scottperrone
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
United States Cybersecurity Institute (USCSI®)
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
United States Cybersecurity Institute (USCSI®)
 
Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...
Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...
Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...
poojalate59
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
infosec train
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
Saeed Al Dhaheri
 
Cloud Training
Cloud TrainingCloud Training
Cloud Training
softcrayons3
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
Jody Keyser
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Henrique Centieiro
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
Infosectrain3
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
Vikas Sahni
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
Ciente
 
Cybersecurity - EvoortSolutions.pptx
Cybersecurity - EvoortSolutions.pptxCybersecurity - EvoortSolutions.pptx
Cybersecurity - EvoortSolutions.pptx
Evoort Solutions
 
Windsor AWS UG - Introduction
Windsor AWS UG - IntroductionWindsor AWS UG - Introduction
Windsor AWS UG - Introduction
Goran Karmisevic
 

Similar to 4B - Is the cloud safe - Ed Zedlewski (20)

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
Cloud Computing - True Vision Technologies
Cloud Computing  - True Vision TechnologiesCloud Computing  - True Vision Technologies
Cloud Computing - True Vision Technologies
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
 
Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...
Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...
Bridging the Digital Divide Cloud Connectivity Services & IT Infrastructure S...
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
Cloud Training
Cloud TrainingCloud Training
Cloud Training
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cybersecurity - EvoortSolutions.pptx
Cybersecurity - EvoortSolutions.pptxCybersecurity - EvoortSolutions.pptx
Cybersecurity - EvoortSolutions.pptx
 
Windsor AWS UG - Introduction
Windsor AWS UG - IntroductionWindsor AWS UG - Introduction
Windsor AWS UG - Introduction
 

More from CFG

WORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENTWORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENT
CFG
 
4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS
CFG
 
3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS
CFG
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
CFG
 
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
CFG
 
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCEWORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
CFG
 
2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT
CFG
 
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
CFG
 
2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT
CFG
 
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
CFG
 
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
CFG
 
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
CFG
 
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
CFG
 
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
CFG
 
Opening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan CorryOpening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan Corry
CFG
 
Session 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin BelcherSession 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin Belcher
CFG
 
2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds
CFG
 
4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig
CFG
 
3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...
CFG
 
1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman
CFG
 

More from CFG (20)

WORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENTWORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENT
 
4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS
 
3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
 
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCEWORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
 
2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT
 
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
 
2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT
 
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
 
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
 
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
 
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
 
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
 
Opening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan CorryOpening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan Corry
 
Session 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin BelcherSession 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin Belcher
 
2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds
 
4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig
 
3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...
 
1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman
 

Recently uploaded

一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
Who Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdfWho Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdf
Price Vision
 
Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...
Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...
Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...
AntoniaOwensDetwiler
 
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
Falcon Invoice Discounting
 
快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样
快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样
快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样
5spllj1l
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
Colin R. Turner
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
Commonwealth
 
1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
Neal Brewster
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
egoetzinger
 
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla FincorpWho Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
beulahfernandes8
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
FinTech Belgium
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
Colin R. Turner
 
Using Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trendsUsing Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trends
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...
Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...
Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...
Donc Test
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
falcon-invoice-discounting-a-strategic-approach-to-optimize-investments
falcon-invoice-discounting-a-strategic-approach-to-optimize-investmentsfalcon-invoice-discounting-a-strategic-approach-to-optimize-investments
falcon-invoice-discounting-a-strategic-approach-to-optimize-investments
Falcon Invoice Discounting
 
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
sameer shah
 
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
qntjwn68
 

Recently uploaded (20)

一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
Who Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdfWho Is the Largest Producer of Soybean in India Now.pdf
Who Is the Largest Producer of Soybean in India Now.pdf
 
Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...
Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...
Independent Study - College of Wooster Research (2023-2024) FDI, Culture, Glo...
 
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
 
快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样
快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样
快速办理(SMU毕业证书)南卫理公会大学毕业证毕业完成信一模一样
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
 
1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf1. Elemental Economics - Introduction to mining.pdf
1. Elemental Economics - Introduction to mining.pdf
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
 
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla FincorpWho Is Abhay Bhutada, MD of Poonawalla Fincorp
Who Is Abhay Bhutada, MD of Poonawalla Fincorp
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
 
Using Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trendsUsing Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trends
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 
Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...
Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...
Solution Manual For Financial Accounting, 8th Canadian Edition 2024, by Libby...
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
 
falcon-invoice-discounting-a-strategic-approach-to-optimize-investments
falcon-invoice-discounting-a-strategic-approach-to-optimize-investmentsfalcon-invoice-discounting-a-strategic-approach-to-optimize-investments
falcon-invoice-discounting-a-strategic-approach-to-optimize-investments
 
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...
 
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
1:1制作加拿大麦吉尔大学毕业证硕士学历证书原版一模一样
 

4B - Is the cloud safe - Ed Zedlewski

  • 1. Is the cloud secure? Ed Zedlewski, CIO, Eduserv www.eduserv.org.uk
  • 2. Cloud defined… Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. [National Institute of Standards and Technology] www.eduserv.org.uk
  • 3. Cloud defined… On-demand self-service SaaS Broad network access PaaS Resource pooling Private Cloud Rapid elasticity Community Cloud Measured service Public Cloud consumption Hybrid Cloud IaaS www.eduserv.org.uk
  • 4. Cloud defined… I want to buy only the computing I need, when I need it www.eduserv.org.uk
  • 5. What is Cloud Security? I want my information and my services protected from the bad guys and from accidents www.eduserv.org.uk
  • 6. What could possibly go wrong? www.eduserv.org.uk
  • 7. Cloud scepticism • 37% of businesses cite security concerns • 13% (and rapidly rising) complexity of IT systems integration • 13% resistance to change www.eduserv.org.uk
  • 8. … yet growth in cloud services is rising faster than ever • 71% of local government organisations are using cloud computing • 37% of local government are currently using cloud applications • UK adults accessing the internet through a mobile device doubled between 2010 and 2012: source: Ofcom
  • 9. Who is looking after your service at 03:00 hours? www.eduserv.org.uk
  • 10. Is the security model fit for purpose? www.eduserv.org.uk
  • 11. Do you have effective MI and understand your risks? www.eduserv.org.uk
  • 12. Where is your data? www.eduserv.org.uk
  • 13. How do you access your cloud service • 8bn people • 12bn MID • 2bn houses • 2bn TV’s • 1.5bn bicycles • 1bn cars www.eduserv.org.uk
  • 14. How secure is your own IT shop? • You will be subject to the same security challenges • Do you have all the necessary skills • Are you prepared to pay the cost of providing service elasticity www.eduserv.org.uk
  • 15. Increase in cyber-attacks (twice the level seen in 2010) On average 54 significant attacks by an unauthorised outsider were made on each large organisation in the last year www.eduserv.org.uk
  • 16. Security breaches by staff Computer fraud; data loss; regulatory breaches; lack of education about security • 19% of organisations suffered staff IT fraud • 20% of small businesses lost confidential data www.eduserv.org.uk
  • 17. Security Investment? 67% of large organisations expect more security breaches next year 50% of large organisations expect to spend more on security next year The challenge is getting value from the investment www.eduserv.org.uk
  • 18. MYTH: An in-house (xxx) server is more secure than a hosted solution TRUTH: for a business without dedicated, in- house IT Professionals to monitor the security of its network, in-house server solutions have less physical security, digital security and backup security than hosted solutions
  • 19. MYTH: An in-house solution offers more control than a Cloud solution • Maybe, but is this good or bad? • Who is counting the cost of change? • Heavy customisation increases cost and reduces reliability • Application servers are very complex, requiring high levels of skill 24x7 • Often cloud services abstract complexity
  • 20. So what’s the difference? • Robust authentication & authorisation • Applications need to be architected for cloud deployment - Never trust user input - Encode all output • Consider data encryption • Effective service and contract management
  • 21. Professionally built cloud services • Offer flexible levels of performance & security • Security designed in (not bolted on) • High availability designed in • Are monitored 7x24x365 • Expertly managed - Delivering appropriate CIA www.eduserv.org.uk
  • 22. Questions? Ed Zedlewski, CIO, Eduserv Ed.Zedlewski@eduserv.org.uk 01225 470431 Or visit the Eduserv stand www.eduserv.org.uk