SlideShare a Scribd company logo
Cloud Computing and Security:
Assessing the Risks


                                                  Kevin L. Jackson
                                                  Vice President &
                                                  General Manager
                                                 NJVC Cloud Services
                                                   March 21, 2012
             NJVC Proprietary - Do Not Release
NJVC Proprietary - Do Not Release
NJVC Proprietary - Do Not Release
NJVC Proprietary - Do Not Release
The New IT Era




 IDC September 2008

                      NJVC Proprietary - Do Not Release
                           rev date 3/21/2012
Data Processing Explosion




              NJVC Proprietary - Do Not Release
Cloud Computing
 Not a new technology but a new approach in the provisioning and consumption of
  information technology
 A services oriented architecture (SOA) implemented typically on a virtualized infrastructure
  (compute, storage, networks) using commodity components coupled with highly automated
  controls enable the five essential characteristics of cloud computing.


                   Key Benefits                                       Key Concerns
           Significant cost reductions                           Standards
           Reduced time to capability                            Portability
           Increased flexibility                                 Control/Availability
           Elastic scalability                                   Security
           Increase service quality                              IT Policy
           Increased security                                    Management / Monitoring
           Ease of technology refresh                            Ecosystem
           Ease of collaboration
           Increased efficiency

                                      NJVC Proprietary - Do Not Release
Cloud Computing: Value and
Capabilities
 Time
    Reduce time to deliver/execute mission
    Increased responsiveness/flexibility/availability
 Cost
    Optimizing cost to deliver/execute mission
    Optimizing cost of ownership (lifecycle cost)
    Increased efficiencies in capital/operational expenditures
 Quality
    Environmental improvements
    Experiential improvements



                            NJVC Proprietary - Do Not Release
Relational Databases and the Cloud
                                                                                        German, BMW,
                                                                                            Truck
                                   Truck       The economics of data
                                               storage led to the use of                German, BMW,
                      BMW          Car
                                               content addressable storage,                 Car

                                   SUV         flat storage architectures and           German, BMW,
          Germany                   …          internet scaling.                            SUV


                    Volkswagen      …                                                       German
                                                                                       Volkswagen, Truck
                      Audi          …

                                                                         Search               …
                      Toyota
Country
           Japan      Honda
                                                                                              …
                      Mazda
                                                 Database design,
                       Ford                                                                   …
                                                 database tuning no
            US       Chrysler                    longer required with
                       GM           …
                                                 infinite scalability and                     …

                                                 consistent
                                                 responsiveness                          US, GM, SUV




                              3t                                                  1t                       9
                                           NJVC Proprietary - Do Not Release
Traditional Analytics
                                          Traditionally, lexical searches, filtering or

•••••••••••                               Boolean search attributes are used to
                                          reduce data to a “working set”. Analytical
                                          tools are then applied to this “working
•••••••••••                               set”.

•••••••••••
•••••••••••
•••••••••••                                      Tools/Analysis              Reports/Conclusions
•••••••••••
  All Data Sources / Types




                                                                                            1
                             NJVC Proprietary - Do Not Release
Cloud Enables Searching All the Data,
All the Time
•••••••••••
•••••••••••
•••••••••••
•••••••••••
•••••••••••                                        Reports/Conclusions

•••••••••••


                                                                    1
               NJVC Proprietary - Do Not Release
Survey




         NJVC Proprietary - Do Not Release
Security Concerns




              NJVC Proprietary - Do Not Release
Computing


                                                                                                                                            Malicious Insiders


                                                                                          Data Loss or Leakage


                                    Unknown Risk Profile
                                                                                                                 Shared Technology Issues
                                                                                                                                                                 Insecure Interfaces and APIs




                                                           Account or Service Hijacking
                                                                                                                                                                                                Abuse and Nefarious Use of Cloud
                                                                                                                                                                                                                                           Top Threats to
                                                                                                                                                                                                                                          Cloud Computing
                                                                                                                                                                                                                                   Governance and
                                                                                                                                                                                                                                   Enterprise Risk
                                                                                                                                                                                                                                   Management
                                                                                                                                                                                                                                   Legal and
                                                                                                                                                                                                                                   Electronic Discovery

                                                                                                                                                                                                                                   Compliance and Audit
                                                                                                                                                                                                                                                            Governance




                                                                                                                                                                                                                                   Information
                                                                                                                                                                                                                                   Lifecycle Management

                                                                                                                                                                                                                                   Portability and
                                                                                                                                                                                                                                   Interoperability

                                                                                                                                                                                                                                   Traditional
                                                                                                                                                                                                                                   Security, Business
                                                                                                                                                                                                                                   Continuity,
                                                                                                                                                                                                                                   Data Center
                                                                                                                                                                                                                                   and Disaster Recovery




NJVC Proprietary - Do Not Release
                                                                                                                                                                                                                                   Operations

                                                                                                                                                                                                                                   Incident Response,
                                                                                                                                                                                                                                   Notification and
                                                                                                                                                                                                                                   Remediation
                                                                                                                                                                                                                                   Application
                                                                                                                                                                                                                                   Security
                                                                                                                                                                                                                                                            Operational




                                                                                                                                                                                                                                   Encryption and
                                                                                                                                                                                                                                   Key Management

                                                                                                                                                                                                                                   Identity and
                                                                                                                                                                                                                                   Access Management

                                                                                                                                                                                                                                   Virtualization
Sli
                                    de
NJVC Proprietary - Do Not Release   15
Sli
                                    de
NJVC Proprietary - Do Not Release   16
Sli
                                    de
NJVC Proprietary - Do Not Release   17
Sli
                                    de
NJVC Proprietary - Do Not Release   18
Overview




                                               Sli
                                               de
           NJVC Proprietary - Do Not Release   19
C&A vs FedRAMP
Standard Certification & Authorization
      100% of required agency controls
      60-90 days to complete
      $80k-$300K
      Repeat with each new agency: 5 agency cost $400K-$1.5M
 FedRAMP (290 Controls)
      80% of required agency controls
      60 days to complete
      $65-$240K
      Agency specific controls for new implementations: 5 agency cost
       $65K-$365K

                                                                     Slide 20
                            NJVC Proprietary - Do Not Release
Sli
                                    de
NJVC Proprietary - Do Not Release   21
Sli
                                    de
NJVC Proprietary - Do Not Release   22
Sli
                                    de
NJVC Proprietary - Do Not Release   23
Sli
                                    de
NJVC Proprietary - Do Not Release   24
Sli
                                    de
NJVC Proprietary - Do Not Release   25
Continuous Monitoring Deliverables
Vulnerability/Patch Management Scanning and
 Reporting
Configuration Scanning and Reporting
Incident Response Planning and Response
POA&M Mitigation and Remediation
Change Management and Control
Penetration Testing
A&A Documentation Maintenance
Contingency Plan Testing

                  NJVC Proprietary - Do Not Release
NIST Cloud Computing
http://collaborate.nist.gov/twiki-cloud-computing




                                   NJVC Proprietary - Do Not Release
My Advice
 Remember – Cloud computing is an emerging discipline
Learn about it. Don’t run away
This is not a new technology but extensive
 automation of what you’re already used to
Same threat vectors. Same attacks but faster,
 broader and automated using “resource
 concentration”
Cloud will save you, not hurt you.
Be careful out there !!
                         NJVC Proprietary - Do Not Release
Thank You !
Kevin L. Jackson
Vice President
General Manger
NJVC Cloud Services
(703) 335-0830
Kevin.jackson@NJVC.com
http://www.NJVC.com
http://kevinljackson.blogspot.com
http://govcloud.ulitzer.com

                                    NJVC Proprietary - Do Not Release

More Related Content

What's hot

High Availability MySQL with DRBD and Heartbeat: MTV Japan ...
High Availability MySQL with DRBD and Heartbeat: MTV Japan ...High Availability MySQL with DRBD and Heartbeat: MTV Japan ...
High Availability MySQL with DRBD and Heartbeat: MTV Japan ...webhostingguy
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Vincent Kwon
 
Dataplex VMWare Event
Dataplex VMWare EventDataplex VMWare Event
Dataplex VMWare Event
dataplex systems limited
 
IBM’s zEnterprise Really Stretches Its Boundaries — New Windows Are Opened
IBM’s zEnterprise Really Stretches Its Boundaries  — New Windows Are OpenedIBM’s zEnterprise Really Stretches Its Boundaries  — New Windows Are Opened
IBM’s zEnterprise Really Stretches Its Boundaries — New Windows Are Opened
IBM India Smarter Computing
 
Cast Iron Overview Webinar 6.13.12 Final(Jb)
Cast Iron Overview Webinar 6.13.12 Final(Jb)Cast Iron Overview Webinar 6.13.12 Final(Jb)
Cast Iron Overview Webinar 6.13.12 Final(Jb)
Carolyn Crowe
 
Tutorial 4 john r. savageau
Tutorial 4 john r. savageauTutorial 4 john r. savageau
Tutorial 4 john r. savageauegovernment
 
Novell Support Revealed! An Insider's Peek and Feedback Opportunity
Novell Support Revealed! An Insider's Peek and Feedback OpportunityNovell Support Revealed! An Insider's Peek and Feedback Opportunity
Novell Support Revealed! An Insider's Peek and Feedback Opportunity
Novell
 
Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk guptaEMC Forum India
 
Embedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero TechnologiesEmbedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero Technologies
Michael Findling
 
Amsterdam 2008 S O A 3 Difficult Pieces For Publication
Amsterdam 2008  S O A 3 Difficult Pieces For  PublicationAmsterdam 2008  S O A 3 Difficult Pieces For  Publication
Amsterdam 2008 S O A 3 Difficult Pieces For PublicationSOA Symposium
 
Linked In Lessons Learned And Growth And Scalability
Linked In Lessons Learned And Growth And ScalabilityLinked In Lessons Learned And Growth And Scalability
Linked In Lessons Learned And Growth And ScalabilityConSanFrancisco123
 

What's hot (11)

High Availability MySQL with DRBD and Heartbeat: MTV Japan ...
High Availability MySQL with DRBD and Heartbeat: MTV Japan ...High Availability MySQL with DRBD and Heartbeat: MTV Japan ...
High Availability MySQL with DRBD and Heartbeat: MTV Japan ...
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...
 
Dataplex VMWare Event
Dataplex VMWare EventDataplex VMWare Event
Dataplex VMWare Event
 
IBM’s zEnterprise Really Stretches Its Boundaries — New Windows Are Opened
IBM’s zEnterprise Really Stretches Its Boundaries  — New Windows Are OpenedIBM’s zEnterprise Really Stretches Its Boundaries  — New Windows Are Opened
IBM’s zEnterprise Really Stretches Its Boundaries — New Windows Are Opened
 
Cast Iron Overview Webinar 6.13.12 Final(Jb)
Cast Iron Overview Webinar 6.13.12 Final(Jb)Cast Iron Overview Webinar 6.13.12 Final(Jb)
Cast Iron Overview Webinar 6.13.12 Final(Jb)
 
Tutorial 4 john r. savageau
Tutorial 4 john r. savageauTutorial 4 john r. savageau
Tutorial 4 john r. savageau
 
Novell Support Revealed! An Insider's Peek and Feedback Opportunity
Novell Support Revealed! An Insider's Peek and Feedback OpportunityNovell Support Revealed! An Insider's Peek and Feedback Opportunity
Novell Support Revealed! An Insider's Peek and Feedback Opportunity
 
Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
 
Embedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero TechnologiesEmbedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero Technologies
 
Amsterdam 2008 S O A 3 Difficult Pieces For Publication
Amsterdam 2008  S O A 3 Difficult Pieces For  PublicationAmsterdam 2008  S O A 3 Difficult Pieces For  Publication
Amsterdam 2008 S O A 3 Difficult Pieces For Publication
 
Linked In Lessons Learned And Growth And Scalability
Linked In Lessons Learned And Growth And ScalabilityLinked In Lessons Learned And Growth And Scalability
Linked In Lessons Learned And Growth And Scalability
 

Viewers also liked

Army G6 Cloud Roadshow Brief
Army G6 Cloud Roadshow BriefArmy G6 Cloud Roadshow Brief
Army G6 Cloud Roadshow Brief
GovCloud Network
 
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
GovCloud Network
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
GovCloud Network
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
GovCloud Network
 
Cryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud ComputingCryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud Computing
GovCloud Network
 
Nist Cloud Computing Program Overview Nov 2010
Nist Cloud Computing Program Overview Nov 2010Nist Cloud Computing Program Overview Nov 2010
Nist Cloud Computing Program Overview Nov 2010
GovCloud Network
 
Yongsan presentation 4
Yongsan presentation 4Yongsan presentation 4
Yongsan presentation 4
GovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
GovCloud Network
 
Kevin Jackson - DoDIIS Worldwide 2010
Kevin Jackson - DoDIIS Worldwide 2010Kevin Jackson - DoDIIS Worldwide 2010
Kevin Jackson - DoDIIS Worldwide 2010
GovCloud Network
 
Cloud Computing For Intelligence And Defense V6
Cloud Computing For Intelligence And Defense V6Cloud Computing For Intelligence And Defense V6
Cloud Computing For Intelligence And Defense V6
GovCloud Network
 

Viewers also liked (13)

Army G6 Cloud Roadshow Brief
Army G6 Cloud Roadshow BriefArmy G6 Cloud Roadshow Brief
Army G6 Cloud Roadshow Brief
 
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1USAREUR Cloud Computing Training Class Presentation Heidelberg 1
USAREUR Cloud Computing Training Class Presentation Heidelberg 1
 
The East West Connection
The East West ConnectionThe East West Connection
The East West Connection
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
Cryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud ComputingCryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud Computing
 
Nist Cloud Computing Program Overview Nov 2010
Nist Cloud Computing Program Overview Nov 2010Nist Cloud Computing Program Overview Nov 2010
Nist Cloud Computing Program Overview Nov 2010
 
Yongsan presentation 4
Yongsan presentation 4Yongsan presentation 4
Yongsan presentation 4
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Kevin Jackson - DoDIIS Worldwide 2010
Kevin Jackson - DoDIIS Worldwide 2010Kevin Jackson - DoDIIS Worldwide 2010
Kevin Jackson - DoDIIS Worldwide 2010
 
Cloud Computing For Intelligence And Defense V6
Cloud Computing For Intelligence And Defense V6Cloud Computing For Intelligence And Defense V6
Cloud Computing For Intelligence And Defense V6
 

Similar to FBI Symposium on Cloud Computing and Security v2

Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...
GovCloud Network
 
Why Should the Financial Community Care About Cloud - Cobis2020
Why Should the Financial Community Care About Cloud - Cobis2020 Why Should the Financial Community Care About Cloud - Cobis2020
Why Should the Financial Community Care About Cloud - Cobis2020
GovCloud Network
 
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Samy Fodil
 
Cloud native defined
Cloud native definedCloud native defined
Cloud native defined
Kim Clark
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
IRJET Journal
 
Dell EMC Ready Solutions for Big Data
Dell EMC Ready Solutions for Big DataDell EMC Ready Solutions for Big Data
Dell EMC Ready Solutions for Big Data
BlueData, Inc.
 
Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)
ippei_suzuki
 
Good Data: Collaborative Analytics On Demand
Good Data: Collaborative Analytics On DemandGood Data: Collaborative Analytics On Demand
Good Data: Collaborative Analytics On Demand
zsvoboda
 
Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach
Open Data Center Alliance
 
Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018
Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018
Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018
Amazon Web Services
 
X.DAYS Service Provider Pitch Interlaken Swiss
X.DAYS Service Provider Pitch Interlaken SwissX.DAYS Service Provider Pitch Interlaken Swiss
X.DAYS Service Provider Pitch Interlaken SwissRuud van Zutphen ⛅️
 
How To Deliver High Performing Highly Available Cloud Applications
How To Deliver High Performing Highly Available Cloud ApplicationsHow To Deliver High Performing Highly Available Cloud Applications
How To Deliver High Performing Highly Available Cloud Applications
Ben Rushlo
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
Canturk Isci
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
SAP on Cloud - An Innovation from Wharfedale Technologies
SAP on Cloud - An Innovation from Wharfedale TechnologiesSAP on Cloud - An Innovation from Wharfedale Technologies
SAP on Cloud - An Innovation from Wharfedale Technologies
WFT Cloud - Wharfedale Technologies
 
Measure Data Quality
Measure Data QualityMeasure Data Quality
Measure Data Quality
ZavalaJV
 
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...Jyothi Satyanathan
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud Computing
Martin Hingley
 
Introduction to Machine Learning on IBM Power Systems
Introduction to Machine Learning on IBM Power SystemsIntroduction to Machine Learning on IBM Power Systems
Introduction to Machine Learning on IBM Power Systems
David Spurway
 

Similar to FBI Symposium on Cloud Computing and Security v2 (20)

Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...
 
Why Should the Financial Community Care About Cloud - Cobis2020
Why Should the Financial Community Care About Cloud - Cobis2020 Why Should the Financial Community Care About Cloud - Cobis2020
Why Should the Financial Community Care About Cloud - Cobis2020
 
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
 
Cloud native defined
Cloud native definedCloud native defined
Cloud native defined
 
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNINGCAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
 
Dell EMC Ready Solutions for Big Data
Dell EMC Ready Solutions for Big DataDell EMC Ready Solutions for Big Data
Dell EMC Ready Solutions for Big Data
 
Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)
 
Good Data: Collaborative Analytics On Demand
Good Data: Collaborative Analytics On DemandGood Data: Collaborative Analytics On Demand
Good Data: Collaborative Analytics On Demand
 
Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach
 
Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018
Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018
Amazon on Amazon: How Amazon Designs Chips on AWS (MFG305) - AWS re:Invent 2018
 
X.DAYS Service Provider Pitch Interlaken Swiss
X.DAYS Service Provider Pitch Interlaken SwissX.DAYS Service Provider Pitch Interlaken Swiss
X.DAYS Service Provider Pitch Interlaken Swiss
 
How To Deliver High Performing Highly Available Cloud Applications
How To Deliver High Performing Highly Available Cloud ApplicationsHow To Deliver High Performing Highly Available Cloud Applications
How To Deliver High Performing Highly Available Cloud Applications
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
SAP on Cloud - An Innovation from Wharfedale Technologies
SAP on Cloud - An Innovation from Wharfedale TechnologiesSAP on Cloud - An Innovation from Wharfedale Technologies
SAP on Cloud - An Innovation from Wharfedale Technologies
 
Measure Data Quality
Measure Data QualityMeasure Data Quality
Measure Data Quality
 
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud Computing
 
Introduction to Machine Learning on IBM Power Systems
Introduction to Machine Learning on IBM Power SystemsIntroduction to Machine Learning on IBM Power Systems
Introduction to Machine Learning on IBM Power Systems
 

More from GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
GovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
GovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
GovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
GovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
GovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
GovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
GovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
GovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013GovCloud Network
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...GovCloud Network
 

More from GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easy
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

FBI Symposium on Cloud Computing and Security v2

  • 1. Cloud Computing and Security: Assessing the Risks Kevin L. Jackson Vice President & General Manager NJVC Cloud Services March 21, 2012 NJVC Proprietary - Do Not Release
  • 2. NJVC Proprietary - Do Not Release
  • 3. NJVC Proprietary - Do Not Release
  • 4. NJVC Proprietary - Do Not Release
  • 5. The New IT Era IDC September 2008 NJVC Proprietary - Do Not Release rev date 3/21/2012
  • 6. Data Processing Explosion NJVC Proprietary - Do Not Release
  • 7. Cloud Computing  Not a new technology but a new approach in the provisioning and consumption of information technology  A services oriented architecture (SOA) implemented typically on a virtualized infrastructure (compute, storage, networks) using commodity components coupled with highly automated controls enable the five essential characteristics of cloud computing. Key Benefits Key Concerns  Significant cost reductions  Standards  Reduced time to capability  Portability  Increased flexibility  Control/Availability  Elastic scalability  Security  Increase service quality  IT Policy  Increased security  Management / Monitoring  Ease of technology refresh  Ecosystem  Ease of collaboration  Increased efficiency NJVC Proprietary - Do Not Release
  • 8. Cloud Computing: Value and Capabilities  Time  Reduce time to deliver/execute mission  Increased responsiveness/flexibility/availability  Cost  Optimizing cost to deliver/execute mission  Optimizing cost of ownership (lifecycle cost)  Increased efficiencies in capital/operational expenditures  Quality  Environmental improvements  Experiential improvements NJVC Proprietary - Do Not Release
  • 9. Relational Databases and the Cloud German, BMW, Truck Truck The economics of data storage led to the use of German, BMW, BMW Car content addressable storage, Car SUV flat storage architectures and German, BMW, Germany … internet scaling. SUV Volkswagen … German Volkswagen, Truck Audi … Search … Toyota Country Japan Honda … Mazda Database design, Ford … database tuning no US Chrysler longer required with GM … infinite scalability and … consistent responsiveness US, GM, SUV 3t 1t 9 NJVC Proprietary - Do Not Release
  • 10. Traditional Analytics Traditionally, lexical searches, filtering or ••••••••••• Boolean search attributes are used to reduce data to a “working set”. Analytical tools are then applied to this “working ••••••••••• set”. ••••••••••• ••••••••••• ••••••••••• Tools/Analysis Reports/Conclusions ••••••••••• All Data Sources / Types 1 NJVC Proprietary - Do Not Release
  • 11. Cloud Enables Searching All the Data, All the Time ••••••••••• ••••••••••• ••••••••••• ••••••••••• ••••••••••• Reports/Conclusions ••••••••••• 1 NJVC Proprietary - Do Not Release
  • 12. Survey NJVC Proprietary - Do Not Release
  • 13. Security Concerns NJVC Proprietary - Do Not Release
  • 14. Computing Malicious Insiders Data Loss or Leakage Unknown Risk Profile Shared Technology Issues Insecure Interfaces and APIs Account or Service Hijacking Abuse and Nefarious Use of Cloud Top Threats to Cloud Computing Governance and Enterprise Risk Management Legal and Electronic Discovery Compliance and Audit Governance Information Lifecycle Management Portability and Interoperability Traditional Security, Business Continuity, Data Center and Disaster Recovery NJVC Proprietary - Do Not Release Operations Incident Response, Notification and Remediation Application Security Operational Encryption and Key Management Identity and Access Management Virtualization
  • 15. Sli de NJVC Proprietary - Do Not Release 15
  • 16. Sli de NJVC Proprietary - Do Not Release 16
  • 17. Sli de NJVC Proprietary - Do Not Release 17
  • 18. Sli de NJVC Proprietary - Do Not Release 18
  • 19. Overview Sli de NJVC Proprietary - Do Not Release 19
  • 20. C&A vs FedRAMP Standard Certification & Authorization  100% of required agency controls  60-90 days to complete  $80k-$300K  Repeat with each new agency: 5 agency cost $400K-$1.5M  FedRAMP (290 Controls)  80% of required agency controls  60 days to complete  $65-$240K  Agency specific controls for new implementations: 5 agency cost $65K-$365K Slide 20 NJVC Proprietary - Do Not Release
  • 21. Sli de NJVC Proprietary - Do Not Release 21
  • 22. Sli de NJVC Proprietary - Do Not Release 22
  • 23. Sli de NJVC Proprietary - Do Not Release 23
  • 24. Sli de NJVC Proprietary - Do Not Release 24
  • 25. Sli de NJVC Proprietary - Do Not Release 25
  • 26. Continuous Monitoring Deliverables Vulnerability/Patch Management Scanning and Reporting Configuration Scanning and Reporting Incident Response Planning and Response POA&M Mitigation and Remediation Change Management and Control Penetration Testing A&A Documentation Maintenance Contingency Plan Testing NJVC Proprietary - Do Not Release
  • 28. My Advice  Remember – Cloud computing is an emerging discipline Learn about it. Don’t run away This is not a new technology but extensive automation of what you’re already used to Same threat vectors. Same attacks but faster, broader and automated using “resource concentration” Cloud will save you, not hurt you. Be careful out there !! NJVC Proprietary - Do Not Release
  • 29. Thank You ! Kevin L. Jackson Vice President General Manger NJVC Cloud Services (703) 335-0830 Kevin.jackson@NJVC.com http://www.NJVC.com http://kevinljackson.blogspot.com http://govcloud.ulitzer.com NJVC Proprietary - Do Not Release