SlideShare a Scribd company logo
1 of 22
Is cloud secure or not?
Jānis Bērziņš, DPA Senior Infrastructure Solutions Consultant
Aigars Jaundalders, DPA Head of Business Start up Group
Is cloud secure
or not?
Facts and
numbers
Cloud security IdentityWhat is
information
security?
Microsoft Azure
What is information security?
3
Insufficient knowledge and
risk of a security breach are
the main factors
Small and medium enterprises:
Large enterprises:
Microsoft Azure
IT security statistics don’t change
SIMPLE ATTACKS
96%
VERY FEW
SECURITY
BREACHES IN THE
PUBLIC CLOUD
«TO DATE, THERE HAVE BEEN
Gartner Inc.
- MOST BREACHES
CONTINUE TO INVOLVE
ON-PREMISES DATA
CENTER ENVIRONMENTS.»
Customer Cloud provider
On-Premises
Infrastructure
as a Service
Platform
as a Service
Software
as a Service
Networking
Hardware
Physical Security
Operating System
Middleware
Virtualization
Data
Applications
Users
Shared responsibility
REDUCES SECURITY COSTS + MAINTAINS FLEXIBILITY, ACCESS, & CONTROL
Cameras
24X7 security staff
Barriers
Fencing
Alarms
Two-factor access control:
Biometric readers & card
readers
Security operations center
Days of backup power
Seismic bracing
BuildingPerimeter Computer room
Physical security
Infrastructure security
11
Systems
management
& monitoring
Threat
defense
Physical &
logical security
Network protection
Network
Security
Groups
Cloud to
on-premises
connections
Virtual
Networks
Data security
Securing
data at rest
Data
segregation
Encryption for
data in transit
Expanded ecosystem of partner solutions
Security partners
Where my data is located?
Where my data is located?
Note: Microsoft Azure data centers, Australia – Q2 FY15
AZURE:
• Creates three copies of data in each
datacenter
• Offers geo-replication in a datacenter
hundreds of miles away
• Does not transfer Customer Data
outside of a geo (ex: from US to
Europe or from Asia to US)
CUSTOMER:
• Chooses where data resides
• Configures data replication options
Does cloud provider access my data?
18
Does cloud provider access my data?
Pre-screened Admin
requests access
Leadership grants
temporary privilege
• No standing access to the Customer Data
• Grants least privilege required to complete task
• Multi-factor authentication required for all administration
• Access requests are audited, logged, and reviewed
Just in Time
&
Role-Based
Access
Microsoft Corporate
Network
Microsoft Azure
BLOBS
TABLES QUEUES
DRIVES
I have heard that cloud is not secure. Is it?
US FedRAMP/FISMA
US CJIS
UK G-Cloud
Australia IRAP
Singapore MCTS
EU Data Privacy
Approval
ISO 27001
ISO 27018
SOC 1 Type 2
SOC 2 Type 2
PCI DSS Level 1
HIPAA/HITECH
Life Sciences GxP
Information
security
standards
Government
certifications
Industry
certifications
Is the cloud secure or not?
CONCLUSION Cloudsecurity
Delegates
responsibility
Assess risks At least the same
as on-premises
Thank you!

More Related Content

What's hot

The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...Equinix
 
Predictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environmentPredictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environmentCapgemini
 
Software panel
Software panelSoftware panel
Software panelMassTLC
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraVistara
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
bbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericatbbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericatDavid Bericat
 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draftEquinix
 
Building the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformBuilding the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformCloudera, Inc.
 
Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A AnalysisNetscribes
 
Big trends, practical implications
Big trends, practical implicationsBig trends, practical implications
Big trends, practical implicationsSchneider Electric
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteEquinix
 
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready InfrastructureGartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready InfrastructureEquinix
 
Hannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital TwinHannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital TwinIBM Internet of Things
 
I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10Jeffrey Kaplan
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Antoine Chaya
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Rahul Neel Mani
 

What's hot (20)

The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
 
Predictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environmentPredictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environment
 
Software panel
Software panelSoftware panel
Software panel
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With Vistara
 
World of Watson IoT Journey Map
World of Watson IoT Journey MapWorld of Watson IoT Journey Map
World of Watson IoT Journey Map
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
bbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericatbbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericat
 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draft
 
Building the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformBuilding the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics Platform
 
Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A Analysis
 
Big trends, practical implications
Big trends, practical implicationsBig trends, practical implications
Big trends, practical implications
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance Infobite
 
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready InfrastructureGartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
 
Hannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital TwinHannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital Twin
 
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
 
Digital Transformation Seminar
Digital Transformation SeminarDigital Transformation Seminar
Digital Transformation Seminar
 
IoT13: Thingworx showcase
IoT13: Thingworx showcaseIoT13: Thingworx showcase
IoT13: Thingworx showcase
 
I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 

Similar to Is cloud secure or not

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Microsoft Österreich
 
Fortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFrancisco Ferreira
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachCloudPassage
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 

Similar to Is cloud secure or not (20)

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365
 
Fortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft Azure
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Dstca
DstcaDstca
Dstca
 

More from ebuc

Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends ebuc
 
Mobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlMobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlebuc
 
Launching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionLaunching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionebuc
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
CSDD case study
CSDD case studyCSDD case study
CSDD case studyebuc
 
Meistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamMeistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamebuc
 
Pieredzes stāsti
Pieredzes stāstiPieredzes stāsti
Pieredzes stāstiebuc
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
Smart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionSmart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionebuc
 
CITY UP iniciatīva
CITY UP iniciatīvaCITY UP iniciatīva
CITY UP iniciatīvaebuc
 
Programmatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaProgrammatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaebuc
 
Start up iniciatīva 2014
Start up iniciatīva 2014Start up iniciatīva 2014
Start up iniciatīva 2014ebuc
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365ebuc
 
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.ebuc
 
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAProgrammatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAebuc
 
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...ebuc
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...ebuc
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...ebuc
 
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.ebuc
 
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...ebuc
 

More from ebuc (20)

Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends
 
Mobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlMobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerl
 
Launching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionLaunching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competition
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
CSDD case study
CSDD case studyCSDD case study
CSDD case study
 
Meistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamMeistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbam
 
Pieredzes stāsti
Pieredzes stāstiPieredzes stāsti
Pieredzes stāsti
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Smart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionSmart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solution
 
CITY UP iniciatīva
CITY UP iniciatīvaCITY UP iniciatīva
CITY UP iniciatīva
 
Programmatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaProgrammatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācija
 
Start up iniciatīva 2014
Start up iniciatīva 2014Start up iniciatīva 2014
Start up iniciatīva 2014
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
 
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAProgrammatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
 
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
 
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
 
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
 

Recently uploaded

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 

Recently uploaded (20)

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 

Is cloud secure or not