SlideShare a Scribd company logo
S e r i o u s a b o u t S u c c e s s ®
Everyone is doing it . . .
But is it safe?
4 December 2014
© Moore Stephens Melbourne 2014 www.moorestephens.com.au
How to enjoy the benefits of the Cloud while
minimising your risk?
Jean-Marie Abi-Ghanem, Lead Partner Cyber Risk Services
Agenda
• Why organisations move and what they move to the
Cloud
• What is the Cloud? The different types of Cloud models
and services
• How to move to the Cloud securely
• Top 10 considerations when moving to the Cloud
Why organisations
move & what they
move to the Cloud
Why organisations move to the
Cloud?
• Improve service delivery
• Increase IT agility
• Reduce costs
• Enhance business resiliency
• Increase security
What organisations move to the
Cloud?
Based on industry trends and our experience the following
are some of the potential applications organisations tend
to move first to the Cloud:
• Educational and training systems
• Public website
• Email
• Supply chain management (SCM)
• Customer Relationship Management system
• Project Planning and Management
• Testing environments
• Help Desk
• Data Analytics
But the landscape is changing.
What is the Cloud?
The different types of
Cloud models and
services
What is the Cloud?
The different types of Cloud models and services
Visual Model of National Institute of Standards and Technology
Working Definition of Cloud Computing
Resource Pooling
On-Demand
Self-Service Essential
Characteristics
Service
Models
Deployment
models
Rapid
Elasticity
Measured
Service
Broad Network
Access
Software as a
Service (SaaS)
Platform as a
Service (PaaS)
Infrastructure as a
Service (IaaS)
Public CommunityHybridPrivate
Source: http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.html
How to move to the
Cloud securely
How to move to the Cloud
securely
Evaluate application / workloads for Cloud readiness and suitability for moving to the Cloud along
with tool and process maturity required to enable moving to the Cloud
Define and document the Business drivers and requirements
Develop a Cloud strategy, with guiding principles for your organisation
Develop a target Cloud deployment architecture, security policies, standards, processes and
guidelines
Identify key opportunities for Cloud adoption by reviewing organisational maturity, infrastructure,
application workloads and process and governance structures
Initiatives to enable deployment to the Cloud
Current State
Assessment
Business
Requirements
Strategy
Architecture
Future State
and Roadmap
Readiness &
Migration Plan
Top 10
considerations
when moving to
the Cloud
Top 10 considerations when
moving to the Cloud
1. Architecture and IT Strategy aligned to Business
Drivers
2. The right partner – Not all partners are equal
3. Right access at the right time
4. Shared security responsibility
5. Data insurance
Top 10 considerations when
moving to the Cloud
6. User Privacy and Secondary Usage of Data
7. Compliance with Regulatory requirements –
i.e. Privacy, PCI-DSS
8. Data security and sovereignty
9. Right to audit
10. Locked in to specific cloud technology,
services and providers
Questions?
FAQ’s
1. How can sensitive information and documents best be protected from
unintended access or loss?
2. Who owns the data we store in the cloud providers service?
3. Do we have a choice as to where our data is going to reside
geographically?
4. What are some of the critical issues from a data sovereignty perspective?
5. What reporting options and audit support are available and does the
provider give us access to real-time performance monitoring and
statistics?
6. Are the cloud providers compliant with PCI DSS, SOX, ISM or other
regulations that are relevant to my industry?
Jean-Marie Abi-Ghanem
Partner, Cyber Risk Services
T. 03 8635 1963
M. 0433 118 551
jabighanem@moorestephens.com.au
Contact
Disclaimer
Our comments and information contain in this presentation are generic in nature and
are not purported to represent advice that can be relied upon. You should seek your
own advice for your own circumstances.
The author or any other persons involved in the preparation or distribution of this
presentation expressly disclaim all and any contractual, tortious or other form of liability
to any person in respect of this presentation and any consequences arising from its use
by any person in reliance in whole or any part of the contents of this presentation.
The comments contained in the presentation shall not in any way constitute a
recommendation as to whether you should invest in any product discussed in the
presentation.

More Related Content

What's hot

Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
accenture
 
Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...
Axway
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
SteveAtHPE
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of security
Olivier Schmitt
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
The TNS Group
 
Cloud security
Cloud securityCloud security
Cloud security
Brian Honan
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
Ravinder Reddy Amanaganti
 
Cisco at v mword 2015
Cisco at v mword 2015Cisco at v mword 2015
Cisco at v mword 2015
ldangelo0772
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix
 
Mobility Brief
Mobility BriefMobility Brief
Mobility Brief
Bettie Hu
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
XEventsHospitality
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centers
kanew396
 
IT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USAIT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USA
Unified11
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
Accenture Operations
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdf
Sun Technologies
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
ITpreneurs
 
How is QOREX different?
How is QOREX different?How is QOREX different?
How is QOREX different?
Phil Trickey
 

What's hot (20)

Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...Enable collaboration and productivity without sacrificing security or user ex...
Enable collaboration and productivity without sacrificing security or user ex...
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
CSA & GRC Stack
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud security
Cloud securityCloud security
Cloud security
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
 
Cisco at v mword 2015
Cisco at v mword 2015Cisco at v mword 2015
Cisco at v mword 2015
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
Mobility Brief
Mobility BriefMobility Brief
Mobility Brief
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centers
 
IT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USAIT Consulting Services and Technology Solutions | Ampcus -USA
IT Consulting Services and Technology Solutions | Ampcus -USA
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdf
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
How is QOREX different?
How is QOREX different?How is QOREX different?
How is QOREX different?
 

Viewers also liked

Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project
Jaseel Abdul Rafeek
 
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Viacheslav Maiakin
 
ROBÓTICA 2014
ROBÓTICA 2014ROBÓTICA 2014
ROBÓTICA 2014
Thaly Liz
 
E.Hussein Hamdy_CV
E.Hussein Hamdy_CVE.Hussein Hamdy_CV
E.Hussein Hamdy_CV
Hussein Hamdy
 
WOW | Cup Moscow by Changellenge | First round
WOW | Cup Moscow by Changellenge | First roundWOW | Cup Moscow by Changellenge | First round
WOW | Cup Moscow by Changellenge | First round
Александр Баландин
 
SEO
SEOSEO
Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?
Vinicius Espinolla
 
Инновационные методы лечения
Инновационные методы леченияИнновационные методы лечения
Инновационные методы лечения
Ирина Головач
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
Erik Peris
 
Agama 4 tarekat
Agama 4 tarekatAgama 4 tarekat
Agama 4 tarekat
Alvie Mencarie Cahaya
 

Viewers also liked (10)

Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project Livares Labs Biodiversity monitoring project
Livares Labs Biodiversity monitoring project
 
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
Triangle 2016 - Boosting it ecosystems with zero budgets role and impact of i...
 
ROBÓTICA 2014
ROBÓTICA 2014ROBÓTICA 2014
ROBÓTICA 2014
 
E.Hussein Hamdy_CV
E.Hussein Hamdy_CVE.Hussein Hamdy_CV
E.Hussein Hamdy_CV
 
WOW | Cup Moscow by Changellenge | First round
WOW | Cup Moscow by Changellenge | First roundWOW | Cup Moscow by Changellenge | First round
WOW | Cup Moscow by Changellenge | First round
 
SEO
SEOSEO
SEO
 
Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?Como se vingar das pessoas que nos fazem mal?
Como se vingar das pessoas que nos fazem mal?
 
Инновационные методы лечения
Инновационные методы леченияИнновационные методы лечения
Инновационные методы лечения
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Agama 4 tarekat
Agama 4 tarekatAgama 4 tarekat
Agama 4 tarekat
 

Similar to Cloud - Everyone is doing it, But is it safe?

The Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesThe Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial Services
Amazon Web Services
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses.
Triaxil
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Ezhilarasan Natarajan
 
Mitigate Risks of Cloud Computing
Mitigate Risks of Cloud ComputingMitigate Risks of Cloud Computing
Mitigate Risks of Cloud Computing
DarienYamin
 
SCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEOSCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEO
WebXpress.IN
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
Amazon Web Services
 
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdfThe Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
Polyxer Systems
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
Amazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
Amazon Web Services
 
The Essential Roadmap For Effective Cloud Migration.pdf
The Essential Roadmap For Effective Cloud Migration.pdfThe Essential Roadmap For Effective Cloud Migration.pdf
The Essential Roadmap For Effective Cloud Migration.pdf
Forgeahead Solutions
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
Amazon Web Services
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
Matt Mandich
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
Capgemini
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
Precisely
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
Cloud Standards Customer Council
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
SilverlineCRM
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
 
Cloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to SuccessCloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to Success
nvpradhan
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Google
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 

Similar to Cloud - Everyone is doing it, But is it safe? (20)

The Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesThe Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial Services
 
Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses. Understanding The Cloud For Enterprise Businesses.
Understanding The Cloud For Enterprise Businesses.
 
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!
 
Mitigate Risks of Cloud Computing
Mitigate Risks of Cloud ComputingMitigate Risks of Cloud Computing
Mitigate Risks of Cloud Computing
 
SCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEOSCP front page interview of Mr. Apurva Mankad, WebXpress CEO
SCP front page interview of Mr. Apurva Mankad, WebXpress CEO
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdfThe Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
The Roadmap to a Successful Cloud Strategy_ Steps to Implementation.pdf
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
The Essential Roadmap For Effective Cloud Migration.pdf
The Essential Roadmap For Effective Cloud Migration.pdfThe Essential Roadmap For Effective Cloud Migration.pdf
The Essential Roadmap For Effective Cloud Migration.pdf
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Cloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to SuccessCloud Centric Services - 10 Steps to Success
Cloud Centric Services - 10 Steps to Success
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 

Recently uploaded

存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 

Recently uploaded (20)

存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 

Cloud - Everyone is doing it, But is it safe?

  • 1. S e r i o u s a b o u t S u c c e s s ® Everyone is doing it . . . But is it safe? 4 December 2014 © Moore Stephens Melbourne 2014 www.moorestephens.com.au How to enjoy the benefits of the Cloud while minimising your risk? Jean-Marie Abi-Ghanem, Lead Partner Cyber Risk Services
  • 2. Agenda • Why organisations move and what they move to the Cloud • What is the Cloud? The different types of Cloud models and services • How to move to the Cloud securely • Top 10 considerations when moving to the Cloud
  • 3. Why organisations move & what they move to the Cloud
  • 4. Why organisations move to the Cloud? • Improve service delivery • Increase IT agility • Reduce costs • Enhance business resiliency • Increase security
  • 5. What organisations move to the Cloud? Based on industry trends and our experience the following are some of the potential applications organisations tend to move first to the Cloud: • Educational and training systems • Public website • Email • Supply chain management (SCM) • Customer Relationship Management system • Project Planning and Management • Testing environments • Help Desk • Data Analytics But the landscape is changing.
  • 6. What is the Cloud? The different types of Cloud models and services
  • 7. What is the Cloud? The different types of Cloud models and services Visual Model of National Institute of Standards and Technology Working Definition of Cloud Computing Resource Pooling On-Demand Self-Service Essential Characteristics Service Models Deployment models Rapid Elasticity Measured Service Broad Network Access Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Public CommunityHybridPrivate Source: http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.html
  • 8. How to move to the Cloud securely
  • 9. How to move to the Cloud securely Evaluate application / workloads for Cloud readiness and suitability for moving to the Cloud along with tool and process maturity required to enable moving to the Cloud Define and document the Business drivers and requirements Develop a Cloud strategy, with guiding principles for your organisation Develop a target Cloud deployment architecture, security policies, standards, processes and guidelines Identify key opportunities for Cloud adoption by reviewing organisational maturity, infrastructure, application workloads and process and governance structures Initiatives to enable deployment to the Cloud Current State Assessment Business Requirements Strategy Architecture Future State and Roadmap Readiness & Migration Plan
  • 11. Top 10 considerations when moving to the Cloud 1. Architecture and IT Strategy aligned to Business Drivers 2. The right partner – Not all partners are equal 3. Right access at the right time 4. Shared security responsibility 5. Data insurance
  • 12. Top 10 considerations when moving to the Cloud 6. User Privacy and Secondary Usage of Data 7. Compliance with Regulatory requirements – i.e. Privacy, PCI-DSS 8. Data security and sovereignty 9. Right to audit 10. Locked in to specific cloud technology, services and providers
  • 14. FAQ’s 1. How can sensitive information and documents best be protected from unintended access or loss? 2. Who owns the data we store in the cloud providers service? 3. Do we have a choice as to where our data is going to reside geographically? 4. What are some of the critical issues from a data sovereignty perspective? 5. What reporting options and audit support are available and does the provider give us access to real-time performance monitoring and statistics? 6. Are the cloud providers compliant with PCI DSS, SOX, ISM or other regulations that are relevant to my industry?
  • 15. Jean-Marie Abi-Ghanem Partner, Cyber Risk Services T. 03 8635 1963 M. 0433 118 551 jabighanem@moorestephens.com.au Contact Disclaimer Our comments and information contain in this presentation are generic in nature and are not purported to represent advice that can be relied upon. You should seek your own advice for your own circumstances. The author or any other persons involved in the preparation or distribution of this presentation expressly disclaim all and any contractual, tortious or other form of liability to any person in respect of this presentation and any consequences arising from its use by any person in reliance in whole or any part of the contents of this presentation. The comments contained in the presentation shall not in any way constitute a recommendation as to whether you should invest in any product discussed in the presentation.