SlideShare a Scribd company logo
Cloud and Privacy regulations
Ran Adler, VP consulting services, 2Bsecure
Our Goal…
Lecture Agenda
• Is cloud is a real danger?
• If I was the regulator what would I do?
• Understanding regulations types
• GDPR and the new Israeli’s privacy rules
• BOI and the Insurance Supervision regulations in Israel
• ISO and PCI DSS
Is cloud is a real danger?
• Yes!!
• Someone else can see your staff…
• Subpoenas…
• Who run’s the encryption keys?
• Multi tenancy risks
• Lack of transparency
• And many more…
So why bother?
Or why should regulators even consider of
allowing the usage of cloud services?
- Because cloud can be cheaper
- Because by allowing cloud - encourages competition
- Because allowing cloud is allowing progress
- Because cloud can be much more secure
Why?
Examples for cloud security advantages:
• If you need a stable and redundant application for your
customers.
• IfYou want to make sure that all patches and updates are
well implemented (SAAS and PAAS)
• If you want an advanced monitoring capabilities.
• If you need a fast and effective implementation of security
tools into your (cloud) environment.
AWS- build in security features/ capabilities
• AmazonVPC+ security groups and ACL’s
• DDOS- CloudFront and Route 53
• Multi Factor Authentication- AWS- MFA
• IAM and Federation services-AWS IAM and AWS directory
services
• Built in Encryption capabilities- EBS, S3, Glacier and more
• Keys management-AWS KMS and Cloud HSM
• APIVisibility-AWS CloudTrail
• Security Alerts- AWS CloudWatch
Regulation types
• Standards
• Laws/ Regulations
• Framework
Laws- Regulations
Privacy Protection Authority- FKA- Ramot
• The Privacy authority in Israel. From now on – PPA…
• It has the authority under the “Protection of Privacy” Law
• One of the most prominent issues from the privacy law Perspective is:
“are we allowed to store/ process private information:
• Outside our organization- Outsourcing
• Outside of the country?”
The common practice of using one of the international cloud providers
services contains it both…
PPA- Outsourcing rules
• PPA has published, few years ago, the following directive:
“‫בשירותי‬ ‫שימוש‬OutSourcing‫אישי‬ ‫מידע‬ ‫לעיבוד‬"
• In a footnote they wrote that they are about to publish a
dedicated cloud regulation. We are still waiting…
• The principles of the rule are based on risk
management approach, such as:
• Check the cloud service provider background,
experience
• Take into consideration the ability of the cloud
service provider to access the information
• The legal agreement should contain the follows:
• Information security and privacy issues
• The ability to fully erase the content of data
• The ability to carry out audits
PPA- Outsourcing rules
http://ec.europa.eu/justice/data-
protection/international-
transfers/adequacy/index_en.htm
SO – who are these countries?
Who is missing?Why?
Safe harbor
• Safe Harbour Privacy Principles were developed between
1998 and 2000 in order to prevent private organizations
within the United States which store customer data from
accidentally disclosing or losing personal information.
• However, after a customer complained that
his Facebook data were insufficiently protected, the ECJ
declared in October 2015 that the Safe Harbour Decision
was invalid,
• The European Commission and the United States agreed to
establish a new framework for transatlantic data flows on
2nd February 2016, known as the Privacy Shield".
Indeed – PPA response came right after
Privacy shield
• The Privacy Shield Frameworks were designed by the U.S. Department of
Commerce, and the European Commission, to provide companies on
both sides of the Atlantic with a mechanism to comply with data
protection requirements when transferring personal data from the
European Union to the United States.
• The Privacy Shield program, is administered by the InternationalTrade
Administration (ITA) within the U.S. Department of Commerce
• To join either Privacy Shield Framework, a U.S.-based organization will
be required to self-certify to the Department of Commerce and publicly
commit to comply with the Framework’s requirements.
• While joining the Privacy Shield is voluntary, once an eligible
organization makes the public commitment to comply with the
Framework’s requirements, the commitment will become enforceable
under U.S. law
Privacy shield
What about Proxy services?
http://www.justice.gov.il/Units/ilita/subjects/HaganatHapratiyut
/MeidaMerasham/Pages/DataTranfer.aspx
Israeli privacy new rules
• Announced earlier this year
• Going to be mandatory from the beginning of 2018
• There is no direct reference to cloud, but, like many other
regulations – it refers cloud as an outsourcing case:
GDPR- General
• IncreasedTerritorial Scope- extra-territorial applicability
• Penalties- organizations in breach of GDPR can be fined up to 4% of annual global turnover or €20 Million
(whichever is greater)
• Breach Notification- 72-hour notification for personal data breaches
• Right to Access-whether or not personal data concerning an individual is being processed, where and for
what purpose
• Right to be Forgotten -Data Erasure
• Privacy by Design
• Data Protection Officers (DPO)
• Data processing agreement (DPA) – an organization may need a DPA that will meet the requirements of
the GDPR, particularly if personal data is transferred outside the European EconomicArea.
GDPR- some steps towards compliance
• Know the location where cloud apps are processing or storing data.
• Take adequate security measures to protect personal data from
loss, alteration, or unauthorized processing..
• Close a data processing agreement (DPA) with the cloud apps
you’re using.
• Collect only “necessary” data and limit the processing of “special”
data.
• Don’t allow cloud apps to use personal data for other purposes.
• Ensure that you can erase the data when you stop using the app. .
GDPR- AWS
• General declaration:
• https://aws.amazon.com/compliance/eu-data-protection/
BOI- regulations
BOI- regulations
Insurance supervision regulation
YAHAV
YAHAV
Standards
ISO- 27017, 27018
• 27017-This standard provides guidance on the information
security aspects of cloud computing, recommending and
assisting with the implementation of cloud-specific
information security controls .
• 27018-This standard provides guidance aimed at ensuring
that cloud service providers (such as Amazon and Google)
offer suitable information security controls to protect the
privacy of their customers’ clients by securing PII (Personally
Identifiable Information) entrusted to them.
PCI DSS and Cloud
• PCI Council has published a unique manual to assist
merchants who uses cloud services to comply with PCI DSS
• “PCI DSS Cloud Computing Guidelines”
PCI DSS and Cloud
TOHAG
• TOHAG is the new Israeli Cyber Authority Cyber seucity
framework
• I refers to cloud in section 11.
• We think it is going to take a central place in future
assessments by entities
Thank you!

More Related Content

What's hot

cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
Dr.Neeraj Kumar Pandey
 
Multi cloud strategy
Multi cloud strategyMulti cloud strategy
Multi cloud strategy
Ajay Koomar
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
Amazon Web Services
 
How hybrid/multi-cloud governance platform benefits your cloud strategy
How hybrid/multi-cloud governance platform benefits your cloud strategy How hybrid/multi-cloud governance platform benefits your cloud strategy
How hybrid/multi-cloud governance platform benefits your cloud strategy
CoreStack
 
Impact of gdpr on cloud computing
Impact of gdpr on cloud computingImpact of gdpr on cloud computing
Impact of gdpr on cloud computing
JackRichard17
 
Multi-cloud strategies and services
Multi-cloud strategies and servicesMulti-cloud strategies and services
Multi-cloud strategies and services
Tatiana Lavrentieva
 
Teodor's Accreditation
Teodor's AccreditationTeodor's Accreditation
Teodor's Accreditation
TTAN IT Solutions Designer Ltd. UK
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
Lew Tucker
 
#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing
UNICORNS IN TECH
 
Hashicorp Corporate Pitch Deck Stenio_v2
Hashicorp Corporate Pitch Deck Stenio_v2 Hashicorp Corporate Pitch Deck Stenio_v2
Hashicorp Corporate Pitch Deck Stenio_v2
Stenio Ferreira
 
 5 security risks of cloud computing
 5 security risks of cloud computing 5 security risks of cloud computing
 5 security risks of cloud computing
Tyrone Systems
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
Amazon Web Services
 
Providing Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud EnvironmentsProviding Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud Environments
Veritas Technologies LLC
 
Adopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with ConfidenceAdopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with Confidence
Kevin Hakanson
 
IBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
IBM Cloud Pak for Data Improves Cataloging Technologies for EnterpriseIBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
IBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
Timothy Valihora
 
Corestack Multi-Cloud Management
Corestack Multi-Cloud ManagementCorestack Multi-Cloud Management
Corestack Multi-Cloud Management
CoreStack
 
Cloud computing a comparative study
Cloud computing   a comparative studyCloud computing   a comparative study
Cloud computing a comparative study
Laxmi8
 
A journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercializationA journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercialization
Institute of Contemporary Sciences
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
VMUG IT
 
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS ComplianceAWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
Amazon Web Services
 

What's hot (20)

cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
 
Multi cloud strategy
Multi cloud strategyMulti cloud strategy
Multi cloud strategy
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
 
How hybrid/multi-cloud governance platform benefits your cloud strategy
How hybrid/multi-cloud governance platform benefits your cloud strategy How hybrid/multi-cloud governance platform benefits your cloud strategy
How hybrid/multi-cloud governance platform benefits your cloud strategy
 
Impact of gdpr on cloud computing
Impact of gdpr on cloud computingImpact of gdpr on cloud computing
Impact of gdpr on cloud computing
 
Multi-cloud strategies and services
Multi-cloud strategies and servicesMulti-cloud strategies and services
Multi-cloud strategies and services
 
Teodor's Accreditation
Teodor's AccreditationTeodor's Accreditation
Teodor's Accreditation
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
 
#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing
 
Hashicorp Corporate Pitch Deck Stenio_v2
Hashicorp Corporate Pitch Deck Stenio_v2 Hashicorp Corporate Pitch Deck Stenio_v2
Hashicorp Corporate Pitch Deck Stenio_v2
 
 5 security risks of cloud computing
 5 security risks of cloud computing 5 security risks of cloud computing
 5 security risks of cloud computing
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
 
Providing Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud EnvironmentsProviding Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud Environments
 
Adopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with ConfidenceAdopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with Confidence
 
IBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
IBM Cloud Pak for Data Improves Cataloging Technologies for EnterpriseIBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
IBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
 
Corestack Multi-Cloud Management
Corestack Multi-Cloud ManagementCorestack Multi-Cloud Management
Corestack Multi-Cloud Management
 
Cloud computing a comparative study
Cloud computing   a comparative studyCloud computing   a comparative study
Cloud computing a comparative study
 
A journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercializationA journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercialization
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS ComplianceAWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
 

Similar to Introdction to Cloud Regulation for Enterprise by 2Bsecure

Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
Idan Tohami
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
IT Governance Ltd
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Amazon Web Services
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
Gurbir Singh
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
Amazon Web Services
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
Livingstone Advisory
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
NguyenNM
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
Ahmad Khan
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
automatskicorporation
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
This account is closed
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Ulf Mattsson
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
Amazon Web Services
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and Chains
Tim Swanson
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
automatskicorporation
 
AWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPRAWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPR
Amazon Web Services
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
CTE Solutions Inc.
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practices
lisaabe
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Gary Dodson
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Brian Miller, Solicitor
 

Similar to Introdction to Cloud Regulation for Enterprise by 2Bsecure (20)

Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and Chains
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
AWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPRAWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPR
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practices
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 

More from Idan Tohami

Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with Cybowall
Idan Tohami
 
AML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning WebinarAML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning Webinar
Idan Tohami
 
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFSRobotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
Idan Tohami
 
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
Idan Tohami
 
Robotic Automation Process (RPA) Webinar - By Matrix-IFS
Robotic Automation Process (RPA) Webinar - By Matrix-IFSRobotic Automation Process (RPA) Webinar - By Matrix-IFS
Robotic Automation Process (RPA) Webinar - By Matrix-IFS
Idan Tohami
 
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFSRobotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
Idan Tohami
 
Enterprise Journey to the Cloud - Opening Remarks
Enterprise Journey to the Cloud  - Opening RemarksEnterprise Journey to the Cloud  - Opening Remarks
Enterprise Journey to the Cloud - Opening Remarks
Idan Tohami
 
Vmware on aws
Vmware on awsVmware on aws
Vmware on aws
Idan Tohami
 
Ready.Set.Cloud - Enterprise Cloud Migration Framework
Ready.Set.Cloud - Enterprise Cloud Migration FrameworkReady.Set.Cloud - Enterprise Cloud Migration Framework
Ready.Set.Cloud - Enterprise Cloud Migration Framework
Idan Tohami
 
Google Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZoneGoogle Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZone
Idan Tohami
 
HDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite ActivityHDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite Activity
Idan Tohami
 
Azure Logic Apps by Gil Gross, CloudZone
Azure Logic Apps by Gil Gross, CloudZoneAzure Logic Apps by Gil Gross, CloudZone
Azure Logic Apps by Gil Gross, CloudZone
Idan Tohami
 
AWS Fundamentals @Back2School by CloudZone
AWS Fundamentals @Back2School by CloudZoneAWS Fundamentals @Back2School by CloudZone
AWS Fundamentals @Back2School by CloudZone
Idan Tohami
 
Cloud Accelerated Genomics
Cloud Accelerated GenomicsCloud Accelerated Genomics
Cloud Accelerated Genomics
Idan Tohami
 
Achieving HIPAA on GCP
Achieving HIPAA on GCPAchieving HIPAA on GCP
Achieving HIPAA on GCP
Idan Tohami
 
Couchbase Day
Couchbase DayCouchbase Day
Couchbase Day
Idan Tohami
 
Microsoft Azure and Couchbase
Microsoft Azure and CouchbaseMicrosoft Azure and Couchbase
Microsoft Azure and Couchbase
Idan Tohami
 
Sarine's Big Data Journey by Rostislav Aaronov
Sarine's Big Data Journey by Rostislav AaronovSarine's Big Data Journey by Rostislav Aaronov
Sarine's Big Data Journey by Rostislav Aaronov
Idan Tohami
 
About DataZone
About DataZoneAbout DataZone
About DataZone
Idan Tohami
 
What's new in Elasticsearch v5
What's new in Elasticsearch v5What's new in Elasticsearch v5
What's new in Elasticsearch v5
Idan Tohami
 

More from Idan Tohami (20)

Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with Cybowall
 
AML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning WebinarAML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning Webinar
 
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFSRobotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
 
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
 
Robotic Automation Process (RPA) Webinar - By Matrix-IFS
Robotic Automation Process (RPA) Webinar - By Matrix-IFSRobotic Automation Process (RPA) Webinar - By Matrix-IFS
Robotic Automation Process (RPA) Webinar - By Matrix-IFS
 
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFSRobotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
 
Enterprise Journey to the Cloud - Opening Remarks
Enterprise Journey to the Cloud  - Opening RemarksEnterprise Journey to the Cloud  - Opening Remarks
Enterprise Journey to the Cloud - Opening Remarks
 
Vmware on aws
Vmware on awsVmware on aws
Vmware on aws
 
Ready.Set.Cloud - Enterprise Cloud Migration Framework
Ready.Set.Cloud - Enterprise Cloud Migration FrameworkReady.Set.Cloud - Enterprise Cloud Migration Framework
Ready.Set.Cloud - Enterprise Cloud Migration Framework
 
Google Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZoneGoogle Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZone
 
HDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite ActivityHDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite Activity
 
Azure Logic Apps by Gil Gross, CloudZone
Azure Logic Apps by Gil Gross, CloudZoneAzure Logic Apps by Gil Gross, CloudZone
Azure Logic Apps by Gil Gross, CloudZone
 
AWS Fundamentals @Back2School by CloudZone
AWS Fundamentals @Back2School by CloudZoneAWS Fundamentals @Back2School by CloudZone
AWS Fundamentals @Back2School by CloudZone
 
Cloud Accelerated Genomics
Cloud Accelerated GenomicsCloud Accelerated Genomics
Cloud Accelerated Genomics
 
Achieving HIPAA on GCP
Achieving HIPAA on GCPAchieving HIPAA on GCP
Achieving HIPAA on GCP
 
Couchbase Day
Couchbase DayCouchbase Day
Couchbase Day
 
Microsoft Azure and Couchbase
Microsoft Azure and CouchbaseMicrosoft Azure and Couchbase
Microsoft Azure and Couchbase
 
Sarine's Big Data Journey by Rostislav Aaronov
Sarine's Big Data Journey by Rostislav AaronovSarine's Big Data Journey by Rostislav Aaronov
Sarine's Big Data Journey by Rostislav Aaronov
 
About DataZone
About DataZoneAbout DataZone
About DataZone
 
What's new in Elasticsearch v5
What's new in Elasticsearch v5What's new in Elasticsearch v5
What's new in Elasticsearch v5
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Introdction to Cloud Regulation for Enterprise by 2Bsecure

  • 1. Cloud and Privacy regulations Ran Adler, VP consulting services, 2Bsecure
  • 3. Lecture Agenda • Is cloud is a real danger? • If I was the regulator what would I do? • Understanding regulations types • GDPR and the new Israeli’s privacy rules • BOI and the Insurance Supervision regulations in Israel • ISO and PCI DSS
  • 4. Is cloud is a real danger? • Yes!! • Someone else can see your staff… • Subpoenas… • Who run’s the encryption keys? • Multi tenancy risks • Lack of transparency • And many more…
  • 5. So why bother? Or why should regulators even consider of allowing the usage of cloud services?
  • 6. - Because cloud can be cheaper - Because by allowing cloud - encourages competition - Because allowing cloud is allowing progress - Because cloud can be much more secure Why?
  • 7. Examples for cloud security advantages: • If you need a stable and redundant application for your customers. • IfYou want to make sure that all patches and updates are well implemented (SAAS and PAAS) • If you want an advanced monitoring capabilities. • If you need a fast and effective implementation of security tools into your (cloud) environment.
  • 8. AWS- build in security features/ capabilities • AmazonVPC+ security groups and ACL’s • DDOS- CloudFront and Route 53 • Multi Factor Authentication- AWS- MFA • IAM and Federation services-AWS IAM and AWS directory services • Built in Encryption capabilities- EBS, S3, Glacier and more • Keys management-AWS KMS and Cloud HSM • APIVisibility-AWS CloudTrail • Security Alerts- AWS CloudWatch
  • 9. Regulation types • Standards • Laws/ Regulations • Framework
  • 11. Privacy Protection Authority- FKA- Ramot • The Privacy authority in Israel. From now on – PPA… • It has the authority under the “Protection of Privacy” Law • One of the most prominent issues from the privacy law Perspective is: “are we allowed to store/ process private information: • Outside our organization- Outsourcing • Outside of the country?” The common practice of using one of the international cloud providers services contains it both…
  • 12. PPA- Outsourcing rules • PPA has published, few years ago, the following directive: “‫בשירותי‬ ‫שימוש‬OutSourcing‫אישי‬ ‫מידע‬ ‫לעיבוד‬" • In a footnote they wrote that they are about to publish a dedicated cloud regulation. We are still waiting…
  • 13. • The principles of the rule are based on risk management approach, such as: • Check the cloud service provider background, experience • Take into consideration the ability of the cloud service provider to access the information • The legal agreement should contain the follows: • Information security and privacy issues • The ability to fully erase the content of data • The ability to carry out audits PPA- Outsourcing rules
  • 14.
  • 17. Safe harbor • Safe Harbour Privacy Principles were developed between 1998 and 2000 in order to prevent private organizations within the United States which store customer data from accidentally disclosing or losing personal information. • However, after a customer complained that his Facebook data were insufficiently protected, the ECJ declared in October 2015 that the Safe Harbour Decision was invalid, • The European Commission and the United States agreed to establish a new framework for transatlantic data flows on 2nd February 2016, known as the Privacy Shield".
  • 18. Indeed – PPA response came right after
  • 19. Privacy shield • The Privacy Shield Frameworks were designed by the U.S. Department of Commerce, and the European Commission, to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union to the United States. • The Privacy Shield program, is administered by the InternationalTrade Administration (ITA) within the U.S. Department of Commerce • To join either Privacy Shield Framework, a U.S.-based organization will be required to self-certify to the Department of Commerce and publicly commit to comply with the Framework’s requirements. • While joining the Privacy Shield is voluntary, once an eligible organization makes the public commitment to comply with the Framework’s requirements, the commitment will become enforceable under U.S. law
  • 21. What about Proxy services? http://www.justice.gov.il/Units/ilita/subjects/HaganatHapratiyut /MeidaMerasham/Pages/DataTranfer.aspx
  • 22. Israeli privacy new rules • Announced earlier this year • Going to be mandatory from the beginning of 2018 • There is no direct reference to cloud, but, like many other regulations – it refers cloud as an outsourcing case:
  • 23. GDPR- General • IncreasedTerritorial Scope- extra-territorial applicability • Penalties- organizations in breach of GDPR can be fined up to 4% of annual global turnover or €20 Million (whichever is greater) • Breach Notification- 72-hour notification for personal data breaches • Right to Access-whether or not personal data concerning an individual is being processed, where and for what purpose • Right to be Forgotten -Data Erasure • Privacy by Design • Data Protection Officers (DPO) • Data processing agreement (DPA) – an organization may need a DPA that will meet the requirements of the GDPR, particularly if personal data is transferred outside the European EconomicArea.
  • 24. GDPR- some steps towards compliance • Know the location where cloud apps are processing or storing data. • Take adequate security measures to protect personal data from loss, alteration, or unauthorized processing.. • Close a data processing agreement (DPA) with the cloud apps you’re using. • Collect only “necessary” data and limit the processing of “special” data. • Don’t allow cloud apps to use personal data for other purposes. • Ensure that you can erase the data when you stop using the app. .
  • 25. GDPR- AWS • General declaration: • https://aws.amazon.com/compliance/eu-data-protection/
  • 29. YAHAV
  • 30. YAHAV
  • 32. ISO- 27017, 27018 • 27017-This standard provides guidance on the information security aspects of cloud computing, recommending and assisting with the implementation of cloud-specific information security controls . • 27018-This standard provides guidance aimed at ensuring that cloud service providers (such as Amazon and Google) offer suitable information security controls to protect the privacy of their customers’ clients by securing PII (Personally Identifiable Information) entrusted to them.
  • 33.
  • 34. PCI DSS and Cloud • PCI Council has published a unique manual to assist merchants who uses cloud services to comply with PCI DSS • “PCI DSS Cloud Computing Guidelines”
  • 35. PCI DSS and Cloud
  • 36. TOHAG • TOHAG is the new Israeli Cyber Authority Cyber seucity framework • I refers to cloud in section 11. • We think it is going to take a central place in future assessments by entities

Editor's Notes

  1. אני מעריך שיושבים כאן בקהל באופן גס שתי קבוצות: א. לקוחות שחושבים לעבור לענן. ממשלה, בנקים וכו' ב. חברות הייטק שנעזרות ביום יום בענן ורוצות לדעת מה כדאי להן לעשות כדי לעבוד נכון
  2. מה שבסוף מעניין את הרגולטור זה הנושא של ניהול סיכונים. הוא צריך לדאוג שהגופים עליהם מפקח נשארים יציבים
  3. הנה רצף של דוגמאות בהן אולי כדאי לעבור לענן. אני לא אומר שזה תמידי אבל בניהול הסיכונים אני מעריך שבמקרים רבים תיווצר עדיפות לענן
  4. הנה רצף של דוגמאות בהן אולי כדאי לעבור לענן. אני לא אומר שזה תמידי אבל בניהול הסיכונים אני מעריך שבמקרים רבים תיווצר עדיפות לענן
  5. הנה רצף של דוגמאות בהן אולי כדאי לעבור לענן. אני לא אומר שזה תמידי אבל בניהול הסיכונים אני מעריך שבמקרים רבים תיווצר עדיפות לענן
  6. השאלה הראשונה היא האם קיים חוק ייעודי בנושא ענן? התשובה היא לא. אלו דברים שיכולים להיגזר מתוך חוקים קיימים השימוש בשירותי ענן מכניס אותנו תחת שתי קטגוריות. הראשונה שבהן עיבוד או שמירת מידע על ידי גוף צד ג'. השניה היא שמירת המידע מחוץ לישראל
  7. וכאן נדבר על ההיבט השני- הוצאת המידע מחוץ לגבולות ישראל
  8. מי חסר לנו? ארה"ב!
  9. מי חסר לנו? ארה"ב!
  10. למעשה זה המצב החוקי שבו תקוע היום המשק הישראלי
  11. למעשה זה המצב החוקי שבו תקוע היום המשק הישראלי
  12. אין התייחסות ממוקדת לגבי ענן
  13. למעשה אלו דרישות שידרשו הרבה יותר תיעוד\ גיבוי\ יכולת התחקות לאחור\ מעקב אחר מידע וכו'
  14. הממשלה – באופן מפתיע יצאה בהכרזה כי יש לה מגמה לקדם שירותי ענן במגזרת הממשלתי