SlideShare a Scribd company logo
Cybersecurity & Cloud Computing
Héctor Sánchez Montenegro (@hectorsm)
Chief Technology Officer
Microsoft Ibérica
Perfect Storm
Cloud Computing
TIC and Cloud democratize Research
• Address privacy, security and handling of Customer Data.
• Going above and beyond the EU Model Clauses to address additional
requirements from individual EU member states
• Enables customers to comply with their local regulations.
• Office 365 is the first major business productivity public cloud service
provider willing to sign EU Model Clauses with all customers.
• EU Model Clauses a set of stringent European Union wide data protection
requirements
Data Processing Agreement
EU Model Clauses
• ISO27001 is one of the best security benchmarks available across the world.
• Office 365 first major business productivity public cloud service to implement
rigorous ISO security controls on physical, logical, process and management
ISO27001
Ongoing dialogue with EU Article 29 Working Party
since the start
Gov Surveillance
Data in transit between
a user and the service
Protects user from
interception of their
communication and helps
ensure transaction integrity
Data in transit
between data centers
Protects from bulk
interception of data
Data at rest
Protects from removal of
physical media
End-to-end encryption
of communications
between users
Protects from interception
or loss of data in transit
between users
Trabajamos para proteger el dato en los diferentes estados de la comunicación
Aggressively roll out
encryption of customer
content between data
centers
Implement Perfect
Forward Secrecy with
2048-bit security for
users interacting with
our services to protect
their communications
from interception
Microsoft is enhancing encryption services for customers.
Gracias

More Related Content

What's hot

Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Tchelinux
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
 
iAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUPiAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUP
Istvan Balazs
 
Cisco security trainings
Cisco security trainingsCisco security trainings
Cisco security trainings
qosnetworking
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
automatskicorporation
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
Mercury Solutions Limited
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project Overview
PRISMACLOUD Project
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
PECB
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce Cyber
Jai Aenugu
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
Ulf Mattsson
 
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network SecurityCisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
qosnetworking
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
Conferencias FIST
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Ijisa
IjisaIjisa
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
Celine George
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modified
Keerthan Shetty
 
Security domains
Security domainsSecurity domains
Security domains
Adel J. Shtayyeh
 

What's hot (18)

Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
iAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUPiAgency-Cyber Manufactory GROUP
iAgency-Cyber Manufactory GROUP
 
Cisco security trainings
Cisco security trainingsCisco security trainings
Cisco security trainings
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project Overview
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce Cyber
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network SecurityCisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Ijisa
IjisaIjisa
Ijisa
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modified
 
Security domains
Security domainsSecurity domains
Security domains
 

Viewers also liked

Protecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed BugProtecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed Bug
David Sweigert
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikan
merysiswinda
 
Mind the Byte
Mind the ByteMind the Byte
Mind the Byte
Mind the Byte
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
Varunee Wongwichit
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
Joseph Pindar
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Moshe Ferber
 
Cloud 2.0: Containers, Microservices and Cloud Hybridization
Cloud 2.0: Containers, Microservices and Cloud HybridizationCloud 2.0: Containers, Microservices and Cloud Hybridization
Cloud 2.0: Containers, Microservices and Cloud Hybridization
Mark Hinkle
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
syrinxtech
 
Cloud Computing and Free Software: the eyeOS Project
Cloud Computing and Free Software: the eyeOS ProjectCloud Computing and Free Software: the eyeOS Project
Cloud Computing and Free Software: the eyeOS Project
Pau Garcia-Milà
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
Moshe Ferber
 
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
Mark Hinkle
 
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds CapacityCloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Avere Systems
 
Overcoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to CloudOvercoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to Cloud
Trustmarque
 
Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...
Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...
Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...
IBM Banking
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls
Dyan Cornacchio
 
6 trends that will shape Cloud computing in 2017 - An Infograph
6 trends that will shape Cloud computing in 2017 - An Infograph6 trends that will shape Cloud computing in 2017 - An Infograph
6 trends that will shape Cloud computing in 2017 - An Infograph
InApp
 

Viewers also liked (20)

Protecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed BugProtecting Yourself from the Heartbleed Bug
Protecting Yourself from the Heartbleed Bug
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Bahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikanBahasan 1 lingkup_alat_media_pendidikan
Bahasan 1 lingkup_alat_media_pendidikan
 
Mind the Byte
Mind the ByteMind the Byte
Mind the Byte
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Cloud 2.0: Containers, Microservices and Cloud Hybridization
Cloud 2.0: Containers, Microservices and Cloud HybridizationCloud 2.0: Containers, Microservices and Cloud Hybridization
Cloud 2.0: Containers, Microservices and Cloud Hybridization
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing and Free Software: the eyeOS Project
Cloud Computing and Free Software: the eyeOS ProjectCloud Computing and Free Software: the eyeOS Project
Cloud Computing and Free Software: the eyeOS Project
 
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
 
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
Cloud 2.0 - How Containers, Microservices and Open Source Software are Redefi...
 
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds CapacityCloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
 
Overcoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to CloudOvercoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to Cloud
 
Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...
Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...
Cloud Computing: Helping Financial Institutions Leverage the Cloud to Improve...
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls
 
6 trends that will shape Cloud computing in 2017 - An Infograph
6 trends that will shape Cloud computing in 2017 - An Infograph6 trends that will shape Cloud computing in 2017 - An Infograph
6 trends that will shape Cloud computing in 2017 - An Infograph
 

Similar to Progress towards security in the Cloud-Héctor Sánchez, Microsoft

It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
David Terrar
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
Dale Butler
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
Lionel Briand
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Ulf Mattsson
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
QuEST Forum
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
Mohan C. de SILVA
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
Igor Zboran
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
PROFIBUS and PROFINET InternationaI - PI UK
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
Martyn Taylor
 
130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06
Michael Burian
 
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
Paris Open Source Summit
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
Hernan Huwyler, MBA CPA
 
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
GlobalForum
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Uni Systems S.M.S.A.
 
Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing Initiative
TRUSTLESS.AI
 
Importance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdfImportance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdf
DeepakBsws
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
Peter de Haas
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
CloudWATCH Consortium
 
Master Class Cyber Compliance
Master Class Cyber Compliance Master Class Cyber Compliance
Master Class Cyber Compliance
Hernan Huwyler, MBA CPA
 

Similar to Progress towards security in the Cloud-Héctor Sánchez, Microsoft (20)

It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 
130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06130424 bitkom ucc_cloud_v06
130424 bitkom ucc_cloud_v06
 
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
OWF12/Open Standards for Cloud - Eu cloud strategy_sde_20121012
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 
Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing Initiative
 
Importance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdfImportance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdf
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
 
Master Class Cyber Compliance
Master Class Cyber Compliance Master Class Cyber Compliance
Master Class Cyber Compliance
 

More from Mind the Byte

Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...
Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...
Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...
Mind the Byte
 
Service and Support for Science IT -Peter Kunzst, University of Zurich
Service and Support for Science IT-Peter Kunzst, University of ZurichService and Support for Science IT-Peter Kunzst, University of Zurich
Service and Support for Science IT -Peter Kunzst, University of Zurich
Mind the Byte
 
IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...
IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...
IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...
Mind the Byte
 
Shared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalut
Shared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalutShared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalut
Shared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalut
Mind the Byte
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Mind the Byte
 
What can the cloud do for you?
What can the cloud do for you?What can the cloud do for you?
What can the cloud do for you?
Mind the Byte
 
Intorduction to AWS and Boto
Intorduction to AWS and BotoIntorduction to AWS and Boto
Intorduction to AWS and Boto
Mind the Byte
 

More from Mind the Byte (7)

Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...
Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...
Aleida Alcaide, European cloud partnership. Iniatives of the European Public ...
 
Service and Support for Science IT -Peter Kunzst, University of Zurich
Service and Support for Science IT-Peter Kunzst, University of ZurichService and Support for Science IT-Peter Kunzst, University of Zurich
Service and Support for Science IT -Peter Kunzst, University of Zurich
 
IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...
IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...
IP strategies to protect your cloud technology-Florian Michalek, Bardehele Pa...
 
Shared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalut
Shared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalutShared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalut
Shared Clinical History of Catalonia-Ignasi Garcia-Milà, Fundació TICSalut
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
What can the cloud do for you?
What can the cloud do for you?What can the cloud do for you?
What can the cloud do for you?
 
Intorduction to AWS and Boto
Intorduction to AWS and BotoIntorduction to AWS and Boto
Intorduction to AWS and Boto
 

Recently uploaded

Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 

Recently uploaded (20)

Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 

Progress towards security in the Cloud-Héctor Sánchez, Microsoft

  • 1. Cybersecurity & Cloud Computing Héctor Sánchez Montenegro (@hectorsm) Chief Technology Officer Microsoft Ibérica
  • 4.
  • 5. TIC and Cloud democratize Research
  • 6.
  • 7.
  • 8.
  • 9. • Address privacy, security and handling of Customer Data. • Going above and beyond the EU Model Clauses to address additional requirements from individual EU member states • Enables customers to comply with their local regulations. • Office 365 is the first major business productivity public cloud service provider willing to sign EU Model Clauses with all customers. • EU Model Clauses a set of stringent European Union wide data protection requirements Data Processing Agreement EU Model Clauses • ISO27001 is one of the best security benchmarks available across the world. • Office 365 first major business productivity public cloud service to implement rigorous ISO security controls on physical, logical, process and management ISO27001 Ongoing dialogue with EU Article 29 Working Party since the start
  • 11. Data in transit between a user and the service Protects user from interception of their communication and helps ensure transaction integrity Data in transit between data centers Protects from bulk interception of data Data at rest Protects from removal of physical media End-to-end encryption of communications between users Protects from interception or loss of data in transit between users Trabajamos para proteger el dato en los diferentes estados de la comunicación
  • 12. Aggressively roll out encryption of customer content between data centers Implement Perfect Forward Secrecy with 2048-bit security for users interacting with our services to protect their communications from interception Microsoft is enhancing encryption services for customers.