SlideShare a Scribd company logo
Building Trust and Confidence
in the Cloud
Sujata Ramamoorthy | Chief Security Officer | Cisco Cloud Platform
Jeff Wicks | Chief Security Officer | Cisco Cloud Offerings
July 13, 2016
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Director, Enterprise Security
• Corporate security policies & Practices
• Security Risk Governance
• IT and Business Partnerships
• Security Services
CSO, Cloud Offerings
• Cloud Security Policies and Standards
• Security Operations
(governance, compliance and monitoring)
• Engineering and Business Partnerships
• Visibility and Trust
3
Complimentary Functions
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Business Landscape
Industry and Cisco
Changing Role of IT
Technology Transitions
Internet of Things
Data and
Analytics
CloudMobile
Business Implications
Security and
Privacy
Experience
Expectations
Globalizations
Growth and
Innovation
New Business
Models
New Breed
of Apps
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
The Cloud is Driving Business Transformation
eWeek
Increased
Productivity
+69%
Markets & Markets
Hybrid Cloud Growth
$33B -> $92B
2016 -> 2021
Gartner
Public Cloud Growth
+16% in 2016 to
$204B
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Cisco Enterprise Journey to Cloud
140
182
237
308
400
0
100
200
300
400
500
2011 2012 2013 2014 2015
NumberofProviders
CAGR
= 30%
Cloud Providers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Product As a Service
Meeting Place On-Prem
Router/Firewall
Virtual Managed Services
CSR, ASAv, WSAv
Call Manager On-Prem
Team Collaboration IWE
(WebEx Social)
Documentation In-House
Cisco Spark
Call
in the cloud
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Business Imperatives
New Revenue
Streams
Accelerated
Deployment
Dynamic,
Efficient, Agile
Security Assured
Experience
ITaaS
Private
SaaS
Hybrid
Public
7
We Now Live in a World of Many Clouds
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cloud Infrastructure Challenges
Application
and Service
Migration
Operational
Excellence
Configuration
and Policy
Implementation
Security
Total Cost of
Ownership
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
41%
35%
32%
26%
18%
15%
11% 10%
4%
Data Privacy
and
Security
Auditing
and
Compliance
Control of
Data
Contractual /
Legal Issues
Network
Connection
Security
Geographical
Coverage
Access
and
Control
Security
Models /
Toolsets
Internal
Issues
Source: Cloud – Wave 6 | ©2014-451 Research, LLC. www.451research.com
Top Security Concerns with Cloud Computing
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Enabler (New)
Ultimate Simplicity
• Easy to consume requirements
• Pre-hardened foundations
• Self guided SDL workflows
• Automated security validation
10
Cloud Security: Old vs. New World
Inhibitor (Old)
Wrong Security Model
• Overly technical requirements
• Lacked security operations guidance
• Not aligned to risk of the offering
• Resource intensive gap analysis
Security not aligned
with business delivery
Security at the speed
and risk of the business
Deliberate shift to transform
cloud security to enable
business speed and reduce risk
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Security Responsibilities
Cloud Providers vs. Consumers
HardwareApplication Platform
Architecture
Virtualized
Infrastructure
Facility
Consumer Provider
IaaS IaaS
PaaS PaaS
SaaS SaaS
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
What is the Providers Role?
Cloud Security Models will Leverage…
Cloud
Architectures
Strong
Authentication
Segmentation
Encryption
and Key
Management
Event
Monitoring
Automation
Transparency
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Your Role as a Consumer of Cloud
Engagement MonitoringPolicy Processes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Case Studies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
A Holistic Approach to Security
15
• Transparency from
provider
• Ability to configure
settings for Terms of Use
• Integration for Identity,
Data and Service/
Security Management
• Continuous Assurance
• Security Posture and
Practices
• Pen-test
• Audit
• Awareness
• Accountability
• Governance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Build
• Security Standards
and Architectures
• Threat Analysis and Protection
• Quality Management
• Common Secure Services
• Data Encryption
and Protection
• Assessment Activities
• Intrusion Detection and
Prevention Systems
• Security Governance
Operate
• Policy and Compliance
• Transparency to
Enable Customers
• Secure Cloud Supply Chain
• Application Layer Data and
Event Monitoring
Monitor
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cloud Security Model to Drive Trust
Cloud Security Lifecycle
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Security in the Cloud will Continue to Evolve
17
Internet of Things
(IoT)
Hybrid Cloud
(Public – Hybrid – Private)
Cloud
Interdependencies
Cloud A Cloud B
Developer Friendly
Clouds
Big Data
Growth
Will be enabled by
Security Automation
• Transparency
• Chef/Puppet (Hardening)
• Continuous Security
• Security Validation Scripts
Software Defined Security
• ACI/SDN
• Embed Security Policies
• Virtual Security
Appliance
Context Driven Security
• Data Driven Real time
Analysis
• Behavioral Analytics
Data Sovereignty
• Local Laws and
Regulations
• Data Loss Prevention
• Audits/Certifications
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Cisco Cloud Strategy
Business
Metrics
Cisco
Applications
Infrastructure
and
Intercloud
End-to-End
Security
Interoperability
and
Open
Standards
Choice of
Consumption
Models
Provide SaaS in
select categories
Enable Cloud Providers
to deliver differentiated
cloud services
Enable enterprises to
build private and hybrid clouds
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
What Should Customers Demand?
Threat
Analysis
Transparency
Compliance
Governance
Trust
Value Chain
Continuous
Assessments
Event
Monitoring
Quality
Agility
Security
Performance
Open
Standards
Flexibility
Mobility
Interoperability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Take-Aways
RelationshipsOngoing
Engagement
TransparencyAsk the Right
Questions
Mutual
Responsibility
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
• Cloud and Business Landscape
• Cisco’s Cloud Journey
• Cloud Challenges and Concerns:
• What prevents adoption?
• How has the security approach changed?
• Shared responsibilities between Cloud Consumers and Providers
• Cisco’s approach to Cloud security: Consumer and Provider view
• What should customers demand of their cloud providers
• Take a ways
Building Trust and Confidence in the Cloud:
1 Slide Outline
22

More Related Content

What's hot

What's hot (20)

Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Cisco connect winnipeg 2018   accelerating the secure digital business throug...Cisco connect winnipeg 2018   accelerating the secure digital business throug...
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
 
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 

Similar to Itmgen 4317 security

Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Cisco & red hat open stack solutions
Cisco & red hat open stack solutionsCisco & red hat open stack solutions
Cisco & red hat open stack solutions
Lora O'Haver
 

Similar to Itmgen 4317 security (20)

CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium) CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Thin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud SecurityThin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud Security
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Cisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered Presentation - For Customers
Cisco Powered Presentation - For Customers
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Cisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed ServicesCisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed Services
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Cisco & red hat open stack solutions
Cisco & red hat open stack solutionsCisco & red hat open stack solutions
Cisco & red hat open stack solutions
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Cisco at v mword 2015
Cisco at v mword 2015Cisco at v mword 2015
Cisco at v mword 2015
 

Recently uploaded

How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 

Recently uploaded (20)

How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 

Itmgen 4317 security

  • 1.
  • 2. Building Trust and Confidence in the Cloud Sujata Ramamoorthy | Chief Security Officer | Cisco Cloud Platform Jeff Wicks | Chief Security Officer | Cisco Cloud Offerings July 13, 2016
  • 3. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Director, Enterprise Security • Corporate security policies & Practices • Security Risk Governance • IT and Business Partnerships • Security Services CSO, Cloud Offerings • Cloud Security Policies and Standards • Security Operations (governance, compliance and monitoring) • Engineering and Business Partnerships • Visibility and Trust 3 Complimentary Functions
  • 4. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Business Landscape Industry and Cisco Changing Role of IT Technology Transitions Internet of Things Data and Analytics CloudMobile Business Implications Security and Privacy Experience Expectations Globalizations Growth and Innovation New Business Models New Breed of Apps
  • 5. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 The Cloud is Driving Business Transformation eWeek Increased Productivity +69% Markets & Markets Hybrid Cloud Growth $33B -> $92B 2016 -> 2021 Gartner Public Cloud Growth +16% in 2016 to $204B © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 6. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Cisco Enterprise Journey to Cloud 140 182 237 308 400 0 100 200 300 400 500 2011 2012 2013 2014 2015 NumberofProviders CAGR = 30% Cloud Providers © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Product As a Service Meeting Place On-Prem Router/Firewall Virtual Managed Services CSR, ASAv, WSAv Call Manager On-Prem Team Collaboration IWE (WebEx Social) Documentation In-House Cisco Spark Call in the cloud
  • 7. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Business Imperatives New Revenue Streams Accelerated Deployment Dynamic, Efficient, Agile Security Assured Experience ITaaS Private SaaS Hybrid Public 7 We Now Live in a World of Many Clouds © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 8. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Cloud Infrastructure Challenges Application and Service Migration Operational Excellence Configuration and Policy Implementation Security Total Cost of Ownership 8
  • 9. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 41% 35% 32% 26% 18% 15% 11% 10% 4% Data Privacy and Security Auditing and Compliance Control of Data Contractual / Legal Issues Network Connection Security Geographical Coverage Access and Control Security Models / Toolsets Internal Issues Source: Cloud – Wave 6 | ©2014-451 Research, LLC. www.451research.com Top Security Concerns with Cloud Computing 9
  • 10. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Enabler (New) Ultimate Simplicity • Easy to consume requirements • Pre-hardened foundations • Self guided SDL workflows • Automated security validation 10 Cloud Security: Old vs. New World Inhibitor (Old) Wrong Security Model • Overly technical requirements • Lacked security operations guidance • Not aligned to risk of the offering • Resource intensive gap analysis Security not aligned with business delivery Security at the speed and risk of the business Deliberate shift to transform cloud security to enable business speed and reduce risk © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 11. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Security Responsibilities Cloud Providers vs. Consumers HardwareApplication Platform Architecture Virtualized Infrastructure Facility Consumer Provider IaaS IaaS PaaS PaaS SaaS SaaS 11
  • 12. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 What is the Providers Role? Cloud Security Models will Leverage… Cloud Architectures Strong Authentication Segmentation Encryption and Key Management Event Monitoring Automation Transparency
  • 13. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 Your Role as a Consumer of Cloud Engagement MonitoringPolicy Processes © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 14. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Case Studies
  • 15. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public A Holistic Approach to Security 15 • Transparency from provider • Ability to configure settings for Terms of Use • Integration for Identity, Data and Service/ Security Management • Continuous Assurance • Security Posture and Practices • Pen-test • Audit • Awareness • Accountability • Governance
  • 16. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Build • Security Standards and Architectures • Threat Analysis and Protection • Quality Management • Common Secure Services • Data Encryption and Protection • Assessment Activities • Intrusion Detection and Prevention Systems • Security Governance Operate • Policy and Compliance • Transparency to Enable Customers • Secure Cloud Supply Chain • Application Layer Data and Event Monitoring Monitor © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Cloud Security Model to Drive Trust Cloud Security Lifecycle 16
  • 17. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public Security in the Cloud will Continue to Evolve 17 Internet of Things (IoT) Hybrid Cloud (Public – Hybrid – Private) Cloud Interdependencies Cloud A Cloud B Developer Friendly Clouds Big Data Growth Will be enabled by Security Automation • Transparency • Chef/Puppet (Hardening) • Continuous Security • Security Validation Scripts Software Defined Security • ACI/SDN • Embed Security Policies • Virtual Security Appliance Context Driven Security • Data Driven Real time Analysis • Behavioral Analytics Data Sovereignty • Local Laws and Regulations • Data Loss Prevention • Audits/Certifications
  • 18. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 Cisco Cloud Strategy Business Metrics Cisco Applications Infrastructure and Intercloud End-to-End Security Interoperability and Open Standards Choice of Consumption Models Provide SaaS in select categories Enable Cloud Providers to deliver differentiated cloud services Enable enterprises to build private and hybrid clouds
  • 19. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 What Should Customers Demand? Threat Analysis Transparency Compliance Governance Trust Value Chain Continuous Assessments Event Monitoring Quality Agility Security Performance Open Standards Flexibility Mobility Interoperability
  • 20. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 Take-Aways RelationshipsOngoing Engagement TransparencyAsk the Right Questions Mutual Responsibility © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 21.
  • 22. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public • Cloud and Business Landscape • Cisco’s Cloud Journey • Cloud Challenges and Concerns: • What prevents adoption? • How has the security approach changed? • Shared responsibilities between Cloud Consumers and Providers • Cisco’s approach to Cloud security: Consumer and Provider view • What should customers demand of their cloud providers • Take a ways Building Trust and Confidence in the Cloud: 1 Slide Outline 22