SlideShare a Scribd company logo
Issue Identification
 Cloud Computing

  Girish Subramaniam
Cloud Computing
•Emerging opportunity in IT- Service delivery

•Helps firms reduce costs


                         • Compelling Scale
        Public           • Cost reduction

                         • Costly
        Private          • Greater adoption


     One has to be living under a rock to not have heard of Cloud Computing
Issues in Cloud Computing
•Control
     Availability
     Integrity
     Confidentiality
•Visibility
     Compliance
     Governance
     Risk Management




                        Lack of Visibility = Lack of Security
Cloud- Financial Services
•Need for Cost Reduction - Recession
    Firms need to reduce costs to make


•Tremendous focus on Data Security
      Tougher regulatory norms
      Compliance- SOX, PCI etc
      Anti-Money Laundering
      Fraud Prevention


•Slowest adoption compared to other industries


       A “not good” Data Security would have Financial and Reputational Loss
Fundamentally Difficult Issue
•Cloud is controlled by CSP (Cloud Service Provider) –External
Vendors
      High Dependency on Financial Health of CSP
      Site inspection and audit very difficult
      Constant connectivity required
      Loss of data due to improper back-up
      High Difficulty in migrating to another CSP


•Access to Data is difficult given the network of databases
    Especially for public clouds

        CSP’s and Enterprises are still figuring out a way to solve the above
                                      problems
Understanding the Issue
•High Vulnerability
      Cost of Entry is Low
      Little or no due- diligence


•CIO’s of Banks/ Insurance firms need to ask:
•   Who can see my clients’ data?
•   What regulatory and compliance audits has the firm completed?
•   If the firm doesn’t keep data in its own systems, how can we ensure it is safe?
•   What safeguards are in place to ensure data is never viewed by someone who
    shouldn’t see it?
•   If the system is compromised, what’s the emergency action plan, and how will that
    be communicated to our clients?

               Not Understanding the issue can have dire consequences

More Related Content

What's hot

Fincluziv Bank Presentation
Fincluziv Bank Presentation Fincluziv Bank Presentation
Fincluziv Bank Presentation Bruno Gremez
 
Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management NirvanaSeema Jethani
 
TEM for Healthcare: The Cure for IT Budgets
TEM for Healthcare: The Cure for IT BudgetsTEM for Healthcare: The Cure for IT Budgets
TEM for Healthcare: The Cure for IT BudgetsValicom
 
Innov8ion in enterprise content management
Innov8ion in enterprise content managementInnov8ion in enterprise content management
Innov8ion in enterprise content managementJill Nehrybecki
 
The impact of accelerated Cash Flow Visibility
The impact of accelerated Cash Flow VisibilityThe impact of accelerated Cash Flow Visibility
The impact of accelerated Cash Flow VisibilityCanon Belgium
 
Everything You Need To Know About IT Service Management
Everything You Need To Know About IT Service ManagementEverything You Need To Know About IT Service Management
Everything You Need To Know About IT Service ManagementCentextech
 
From Paper to Power Player
From Paper to Power PlayerFrom Paper to Power Player
From Paper to Power Playerbenefitexpress
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Managementguest64c5c
 
How Technology Can Reduce the Burden of Gift Processing
How Technology Can Reduce the Burden of Gift ProcessingHow Technology Can Reduce the Burden of Gift Processing
How Technology Can Reduce the Burden of Gift ProcessingVirtuous Software
 
From Paper to Power Player
From Paper to Power PlayerFrom Paper to Power Player
From Paper to Power Playerbenefitexpress
 
Coffee on Kaseya - Houston
Coffee on Kaseya - HoustonCoffee on Kaseya - Houston
Coffee on Kaseya - HoustonKaseya
 
How to Best Prepare for a Software Audit
How to Best Prepare for a Software AuditHow to Best Prepare for a Software Audit
How to Best Prepare for a Software AuditIvanti
 
The Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern BusinessThe Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern BusinessTechvera
 

What's hot (18)

Fincluziv Bank Presentation
Fincluziv Bank Presentation Fincluziv Bank Presentation
Fincluziv Bank Presentation
 
Access governance en
Access governance enAccess governance en
Access governance en
 
Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management Nirvana
 
TEM for Healthcare: The Cure for IT Budgets
TEM for Healthcare: The Cure for IT BudgetsTEM for Healthcare: The Cure for IT Budgets
TEM for Healthcare: The Cure for IT Budgets
 
Biz models
Biz modelsBiz models
Biz models
 
Innov8ion in enterprise content management
Innov8ion in enterprise content managementInnov8ion in enterprise content management
Innov8ion in enterprise content management
 
The impact of accelerated Cash Flow Visibility
The impact of accelerated Cash Flow VisibilityThe impact of accelerated Cash Flow Visibility
The impact of accelerated Cash Flow Visibility
 
Everything You Need To Know About IT Service Management
Everything You Need To Know About IT Service ManagementEverything You Need To Know About IT Service Management
Everything You Need To Know About IT Service Management
 
Maintaining productivity in a remote working environment
Maintaining productivity in a remote working environmentMaintaining productivity in a remote working environment
Maintaining productivity in a remote working environment
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
From Paper to Power Player
From Paper to Power PlayerFrom Paper to Power Player
From Paper to Power Player
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Management
 
How Technology Can Reduce the Burden of Gift Processing
How Technology Can Reduce the Burden of Gift ProcessingHow Technology Can Reduce the Burden of Gift Processing
How Technology Can Reduce the Burden of Gift Processing
 
From Paper to Power Player
From Paper to Power PlayerFrom Paper to Power Player
From Paper to Power Player
 
Coffee on Kaseya - Houston
Coffee on Kaseya - HoustonCoffee on Kaseya - Houston
Coffee on Kaseya - Houston
 
How to Best Prepare for a Software Audit
How to Best Prepare for a Software AuditHow to Best Prepare for a Software Audit
How to Best Prepare for a Software Audit
 
The Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern BusinessThe Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern Business
 
New Release IT Management Suite
New Release IT Management SuiteNew Release IT Management Suite
New Release IT Management Suite
 

Similar to Issue identification cloud computing

Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computinggirish0984
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Andy Milsark
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014SLVA Information Security
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir FancySaskSummit
 
Cloud big data - business landscape
Cloud   big data - business landscapeCloud   big data - business landscape
Cloud big data - business landscapeanuvip
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudPrecisely
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Leave the HIT Stoneage
Leave the HIT StoneageLeave the HIT Stoneage
Leave the HIT StoneageDizzion, Inc.
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataPrecisely
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataPrecisely
 
IT Series: Cloud Computing Done Right @One 2011
IT Series: Cloud Computing Done Right @One 2011IT Series: Cloud Computing Done Right @One 2011
IT Series: Cloud Computing Done Right @One 2011Donald E. Hester
 

Similar to Issue identification cloud computing (20)

Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computing
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
 
Cloud big data - business landscape
Cloud   big data - business landscapeCloud   big data - business landscape
Cloud big data - business landscape
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Isa 2
Isa 2 Isa 2
Isa 2
 
Leave the HIT Stoneage
Leave the HIT StoneageLeave the HIT Stoneage
Leave the HIT Stoneage
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
IT Series: Cloud Computing Done Right @One 2011
IT Series: Cloud Computing Done Right @One 2011IT Series: Cloud Computing Done Right @One 2011
IT Series: Cloud Computing Done Right @One 2011
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 

Recently uploaded

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 

Recently uploaded (20)

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Issue identification cloud computing

  • 1. Issue Identification Cloud Computing Girish Subramaniam
  • 2. Cloud Computing •Emerging opportunity in IT- Service delivery •Helps firms reduce costs • Compelling Scale Public • Cost reduction • Costly Private • Greater adoption One has to be living under a rock to not have heard of Cloud Computing
  • 3. Issues in Cloud Computing •Control  Availability  Integrity  Confidentiality •Visibility  Compliance  Governance  Risk Management Lack of Visibility = Lack of Security
  • 4. Cloud- Financial Services •Need for Cost Reduction - Recession  Firms need to reduce costs to make •Tremendous focus on Data Security  Tougher regulatory norms  Compliance- SOX, PCI etc  Anti-Money Laundering  Fraud Prevention •Slowest adoption compared to other industries A “not good” Data Security would have Financial and Reputational Loss
  • 5. Fundamentally Difficult Issue •Cloud is controlled by CSP (Cloud Service Provider) –External Vendors  High Dependency on Financial Health of CSP  Site inspection and audit very difficult  Constant connectivity required  Loss of data due to improper back-up  High Difficulty in migrating to another CSP •Access to Data is difficult given the network of databases  Especially for public clouds CSP’s and Enterprises are still figuring out a way to solve the above problems
  • 6. Understanding the Issue •High Vulnerability  Cost of Entry is Low  Little or no due- diligence •CIO’s of Banks/ Insurance firms need to ask: • Who can see my clients’ data? • What regulatory and compliance audits has the firm completed? • If the firm doesn’t keep data in its own systems, how can we ensure it is safe? • What safeguards are in place to ensure data is never viewed by someone who shouldn’t see it? • If the system is compromised, what’s the emergency action plan, and how will that be communicated to our clients? Not Understanding the issue can have dire consequences