SlideShare a Scribd company logo
http://www.bcsprosoft.com
• Cloud Recap
• What’s keeping you up at night (aka – “The
Notorious Nine”)
• How Cloud publishers are securing your data
• With security in mind, why would you move to
the cloud?
• Questions to ask Cloud publishers
• Q&A
http://www.bcsprosoft.com
• 27+ Years Experience
• 1,500 Clients across all 50 States, Canada, and
Mexico
• Offices in San Antonio, Houston, Denver,
Honolulu
• Award winning partners with
http://www.bcsprosoft.com
• Cloud computing…
– The word "cloud" is used as a metaphor for "the Internet"
– Cloud computing is the process of outsourcing IT services – such
as servers, storage and applications – to a shared platform
accessed via the Internet.
– End users access cloud based applications through a web
browser or a light weight desktop or mobile apps while business
software and data are stored on servers at a remote location.
– Services are provided as a utility, most often on a subscription
basis
– Saves money and energy, as a vendor maintains the
infrastructure and applications that run in the cloud
environment instead of the organization.
http://www.bcsprosoft.com
http://www.bcsprosoft.com
On Premise IaaS PaaS
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Youmanage
Managedbyvendor
Managedbyvendor
Youmanage
Youmanage
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
SaaS
Managedbyvendor
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
http://www.bcsprosoft.com
• All resources managed by the
end-user organization.
• Everything is private and
controlled.
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Youmanage
http://www.bcsprosoft.com
On Premise IaaS
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Youmanage
Managedbyvendor
Youmanage
• Virtual infrastructure
• Virtual desktop
• Backup and recovery
• Managed cloud
security
http://www.bcsprosoft.com
On Premise IaaS PaaS
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Youmanage
Managedbyvendor
Managedbyvendor
Youmanage
Youmanage
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
http://www.bcsprosoft.com
On Premise IaaS PaaS
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Youmanage
Managedbyvendor
Managedbyvendor
Youmanage
Youmanage
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
SaaS
Managedbyvendor
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
http://www.bcsprosoft.com
• Multi-Tenant – Single instance of software
runs on a server, serving multiple client
organizations (tenants).
• Single Tenant – Physical or virtual machine is
exclusively dedicated to a single client, i.e.
software is not shared with multiple
customers. This is more expensive for a
vendor to setup and maintain.
http://www.bcsprosoft.com
http://www.bcsprosoft.com
Cloud Computing Threats in 2013
Cloud Security Alliance
Cloud Computing Top Threats in 2013
http://www.bcsprosoft.com
1. Data Breaches
2. Data Loss
3. Account Hijacking
4. Insecure APIs
5. Denial of Service
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Issues
http://www.bcsprosoft.com
1. Organizations sensitive internal data falls into
the hands of competitors
http://www.bcsprosoft.com
2. The Problem: Permanent loss of data due to
malicious attack or accidental deletion
http://www.bcsprosoft.com
3. Unauthorized access gained through phishing,
fraud, and exploitation of software
vulnerabilities
http://www.bcsprosoft.com
4. Cloud computing providers expose a set of
software interfaces (APIs) that customers use to
manage and interact with cloud services. Lack of
(or inadequate) security opens the possibility of
unauthorized access.
http://www.bcsprosoft.com
5. Denial-of-Service attacks are meant to
prevent users of cloud service from being able
to access their data and/or applications by
forcing the victim cloud service to consume
inordinate amounts of finite system resources.
http://www.bcsprosoft.com
6. A current or former employee, contractor, etc.
with authorized access misuses that access in a
manner that negatively affects the
confidentiality, integrity, or availability of
company data.
http://www.bcsprosoft.com
7. Use of the power of distributed cloud services
to perform power intensive tasks, formerly not
feasible/possible from a single computer
http://www.bcsprosoft.com
8. Organizations are adopting cloud applications
without understanding the risks and/or
readiness of the cloud vendor to provide
adequate security.
http://www.bcsprosoft.com
9. Poorly designed cloud applications can
introduce cross entity vulnerabilities.
http://www.bcsprosoft.com
• Perhaps not!
– Is your staff properly trained?
– Are your servers really secure?
– Do you have adequate backups?
– What about natural disasters?
• Your data security is only as good as your
system manager and your weakest user!
http://www.bcsprosoft.com
http://www.bcsprosoft.com
• American Institute of Certified Public Accountants
(AICPA)
– SSAE 16 (supersedes SAS 70)
• International Federation of Accountants (IFAC)
– ISAE 3402 (Type 1 or Type 2)
• PCI Security Standards Council
– PCI DSS
• US Department of Commerce
– US-EU Safe Harbor
http://www.bcsprosoft.com
• 24/7-365 Monitoring
• Continuous Monitoring with Intrusion
Detection Systems (IDS)
• Separation of Duties
• Strong Management of Physical Access
• Fully Guarded Premises
• Continuous Data Center Performance Audits
http://www.bcsprosoft.com
Tier 1 Tier 2 Tier 3 Tier 4
Non-redundant capacity
components
X X X
Redundant capacity
components
X X
Dual-powered equipment
and multiple uplinks
X
All components are fully
fault-tolerant including
uplinks, storage, chillers,
HVAC systems, servers,
etc.
Everything is dual-
powered
http://www.bcsprosoft.com
• Tier 1: Guaranteeing 99.671% availability
• Tier 2: Guaranteeing 99.741% availability
• Tier 3: Guaranteeing 99.982% availability
• Tier 4: Guaranteeing 99.995% availability
http://www.bcsprosoft.com
http://www.bcsprosoft.com
• Reduced internal IT infrastructure
• Backup & redundancy in the Cloud
• Predictable monthly costs
• Low/no cost upgrades – always running the latest
version
• Anywhere, anytime access, on ANY device, i.e.
everything through a browser
• No/limited install of local files & programs
http://www.bcsprosoft.com
• Apply Fixes, Patches,
Upgrade
• Downtime
• Performance tuning
• Rewrite customizations
• Rewrite integrations
• Upgrade dependent
applications
• Subscription fee
• Training
• Configuration
• Ongoing burden on IT
• Maintain/upgrade
hardware
• Maintain/upgrade network
• Maintain/upgrade security
• Maintain/upgrade
database
• Training
Ongoing Costs Ongoing Costs
On-Premises Software Cloud Computing
http://www.bcsprosoft.com
Typical IT Budget Allocation
91%
Maintenance
Current
66%
on old
versions
9% Innovation
The Result?
VERSION-LOCK
http://www.bcsprosoft.com
1. Improved Business Agility
2. Generate an Attractive ROI
3. Accelerate Time to Value
4. Jump Start Innovation
Programs
5. Elasticity and Scale
http://www.bcsprosoft.com
http://www.bcsprosoft.com
• What encryption mechanisms do you use for
customers’ data?
• In how many locations do you store customer data?
• What safeguards do you employ to ensure that
different customers’ data in a multitenant cloud is kept
separate?
• How is your data center physically protected?
• Which of your employees have access to customers’
data?
• How do you authenticate users?
• How precisely can you specify the degree of access that
individual users have to data?
http://www.bcsprosoft.com
• How many and what types of security breaches have
you experienced in the last 12 months? If you had any,
what were they? What new protections have you put
into place?
• What disaster recovery protections do you have in
place?
• What are your security scenarios? Why should I trust
you?
• What tracking, reporting, and auditing capabilities do
you offer?
• Do you comply with all relevant government and
industry laws and regulations?
http://www.bcsprosoft.com
• What Security Certifications do you hold? Can
you provide me with copies?
• What happens to data when you “delete” it? Is
it actually wiped out?
• What happens if we decide we want to
discontinue using your services?
• Who owns the rights to the data?
http://www.bcsprosoft.com
• Complete the Questionnaire
• I’ll send you more detail:
– The Notorious Nine from the Cloud Security
Alliance
– What to Look for in a Service Level Agreement
(SLA)
http://www.bcsprosoft.com
Contact Information
Email: Clark.Haley@bcsprosoft.com
Phone: (800) 882-6705
LinkedIn: www.linkedin.com/in/clarkhaley

More Related Content

What's hot

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Threat Modeling and OWASP Top 10 (2017 rc1)
Threat Modeling and OWASP Top 10 (2017 rc1)Threat Modeling and OWASP Top 10 (2017 rc1)
Threat Modeling and OWASP Top 10 (2017 rc1)
Mike Tetreault
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
GLC Networks
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewallsEnclaveSecurity
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloud
Peter Wood
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
ibrahimumer2
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Quick Heal Technologies Ltd.
 
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Private Cloud
 
Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)
Mike Tetreault
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
Alibaba Cloud
 
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
NCCOMMS
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
lior mazor
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
Gokul Alex
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
Terrance Medina
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10
iphonepentest
 
Cm2 secure code_training_1day_data_protection
Cm2 secure code_training_1day_data_protectionCm2 secure code_training_1day_data_protection
Cm2 secure code_training_1day_data_protection
dcervigni
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
OWASP Delhi
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
Ahmad Khan
 
Why You Need A Web Application Firewall
Why You Need A Web Application FirewallWhy You Need A Web Application Firewall
Why You Need A Web Application Firewall
Port80 Software
 
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security RisksOWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
Andre Van Klaveren
 

What's hot (20)

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Threat Modeling and OWASP Top 10 (2017 rc1)
Threat Modeling and OWASP Top 10 (2017 rc1)Threat Modeling and OWASP Top 10 (2017 rc1)
Threat Modeling and OWASP Top 10 (2017 rc1)
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloud
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
 
Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)Threat Modeling for Web Applications (and other duties as assigned)
Threat Modeling for Web Applications (and other duties as assigned)
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
 
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10
 
Cm2 secure code_training_1day_data_protection
Cm2 secure code_training_1day_data_protectionCm2 secure code_training_1day_data_protection
Cm2 secure code_training_1day_data_protection
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
 
Why You Need A Web Application Firewall
Why You Need A Web Application FirewallWhy You Need A Web Application Firewall
Why You Need A Web Application Firewall
 
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security RisksOWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
 

Similar to The Notorious 9: Is Your Data Secure in the Cloud?

Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
Amazon Web Services
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014
CloudCamp Chicago
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
Nuno Godinho
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
Priyanka Aash
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
Amazon Web Services
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arcrajramab
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
Hentsū
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
apponix123
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
CSO_Presentations
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
Chinatu Uzuegbu
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
Tomppa Järvinen
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
CASCouncil
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
sdevillers
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 

Similar to The Notorious 9: Is Your Data Secure in the Cloud? (20)

Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 

More from BCS ProSoft

Sage 100 User Group Meeting | October 2018
Sage 100 User Group Meeting | October 2018Sage 100 User Group Meeting | October 2018
Sage 100 User Group Meeting | October 2018
BCS ProSoft
 
External Roadmap – Sage 100 and 100cloud
External Roadmap – Sage 100 and 100cloudExternal Roadmap – Sage 100 and 100cloud
External Roadmap – Sage 100 and 100cloud
BCS ProSoft
 
Deltek Vision User Group – Nv 2017
Deltek Vision User Group – Nv 2017Deltek Vision User Group – Nv 2017
Deltek Vision User Group – Nv 2017
BCS ProSoft
 
Sage 100 User Group – Nov 2017
Sage 100 User Group – Nov 2017Sage 100 User Group – Nov 2017
Sage 100 User Group – Nov 2017
BCS ProSoft
 
Sage 100 User Group | October 2016
Sage 100 User Group | October 2016Sage 100 User Group | October 2016
Sage 100 User Group | October 2016
BCS ProSoft
 
Deltek Vision User Group | October 2016
Deltek Vision User Group | October 2016Deltek Vision User Group | October 2016
Deltek Vision User Group | October 2016
BCS ProSoft
 
Deltek Vision Year-End Processing Procedures
Deltek Vision Year-End Processing ProceduresDeltek Vision Year-End Processing Procedures
Deltek Vision Year-End Processing Procedures
BCS ProSoft
 
Deltek Clarity A&E Industry Study - Houston, TX
Deltek Clarity A&E Industry Study - Houston, TXDeltek Clarity A&E Industry Study - Houston, TX
Deltek Clarity A&E Industry Study - Houston, TX
BCS ProSoft
 
Deltek iAccess and Vision v7.5 | Deltek Vision User Group Meeting
Deltek iAccess and Vision v7.5 | Deltek Vision User Group MeetingDeltek iAccess and Vision v7.5 | Deltek Vision User Group Meeting
Deltek iAccess and Vision v7.5 | Deltek Vision User Group Meeting
BCS ProSoft
 
Business Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User Group
Business Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User GroupBusiness Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User Group
Business Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User Group
BCS ProSoft
 
Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...
Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...
Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...BCS ProSoft
 
Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...
Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...
Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...
BCS ProSoft
 
Year-End Processing with Deltek Vision | Q4 2014 Vision User Group
Year-End Processing with Deltek Vision | Q4 2014 Vision User GroupYear-End Processing with Deltek Vision | Q4 2014 Vision User Group
Year-End Processing with Deltek Vision | Q4 2014 Vision User Group
BCS ProSoft
 
What's New in Deltek Vision 7.3 | Deltek Vision User Group Meeting
What's New in Deltek Vision 7.3 | Deltek Vision User Group MeetingWhat's New in Deltek Vision 7.3 | Deltek Vision User Group Meeting
What's New in Deltek Vision 7.3 | Deltek Vision User Group Meeting
BCS ProSoft
 
Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...
Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...
Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...
BCS ProSoft
 
Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)
Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)
Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)
BCS ProSoft
 
Improve Billing Process and Performance with Deltek Vision
Improve Billing Process and Performance with Deltek VisionImprove Billing Process and Performance with Deltek Vision
Improve Billing Process and Performance with Deltek Vision
BCS ProSoft
 
What's New in Deltek Vision 7.1
What's New in Deltek Vision 7.1What's New in Deltek Vision 7.1
What's New in Deltek Vision 7.1
BCS ProSoft
 
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
BCS ProSoft
 
What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...
What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...
What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...
BCS ProSoft
 

More from BCS ProSoft (20)

Sage 100 User Group Meeting | October 2018
Sage 100 User Group Meeting | October 2018Sage 100 User Group Meeting | October 2018
Sage 100 User Group Meeting | October 2018
 
External Roadmap – Sage 100 and 100cloud
External Roadmap – Sage 100 and 100cloudExternal Roadmap – Sage 100 and 100cloud
External Roadmap – Sage 100 and 100cloud
 
Deltek Vision User Group – Nv 2017
Deltek Vision User Group – Nv 2017Deltek Vision User Group – Nv 2017
Deltek Vision User Group – Nv 2017
 
Sage 100 User Group – Nov 2017
Sage 100 User Group – Nov 2017Sage 100 User Group – Nov 2017
Sage 100 User Group – Nov 2017
 
Sage 100 User Group | October 2016
Sage 100 User Group | October 2016Sage 100 User Group | October 2016
Sage 100 User Group | October 2016
 
Deltek Vision User Group | October 2016
Deltek Vision User Group | October 2016Deltek Vision User Group | October 2016
Deltek Vision User Group | October 2016
 
Deltek Vision Year-End Processing Procedures
Deltek Vision Year-End Processing ProceduresDeltek Vision Year-End Processing Procedures
Deltek Vision Year-End Processing Procedures
 
Deltek Clarity A&E Industry Study - Houston, TX
Deltek Clarity A&E Industry Study - Houston, TXDeltek Clarity A&E Industry Study - Houston, TX
Deltek Clarity A&E Industry Study - Houston, TX
 
Deltek iAccess and Vision v7.5 | Deltek Vision User Group Meeting
Deltek iAccess and Vision v7.5 | Deltek Vision User Group MeetingDeltek iAccess and Vision v7.5 | Deltek Vision User Group Meeting
Deltek iAccess and Vision v7.5 | Deltek Vision User Group Meeting
 
Business Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User Group
Business Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User GroupBusiness Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User Group
Business Insights Explorer Tips & Tricks | Q1 2015 Sage 100 ERP User Group
 
Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...
Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...
Tools Accounting Can Provide for Project Managers | Q1 2015 Deltek Vision Use...
 
Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...
Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...
Year-End Processing with Sage 100 ERP (MAS 90 and MAS 200) | Q4 2014 Sage 100...
 
Year-End Processing with Deltek Vision | Q4 2014 Vision User Group
Year-End Processing with Deltek Vision | Q4 2014 Vision User GroupYear-End Processing with Deltek Vision | Q4 2014 Vision User Group
Year-End Processing with Deltek Vision | Q4 2014 Vision User Group
 
What's New in Deltek Vision 7.3 | Deltek Vision User Group Meeting
What's New in Deltek Vision 7.3 | Deltek Vision User Group MeetingWhat's New in Deltek Vision 7.3 | Deltek Vision User Group Meeting
What's New in Deltek Vision 7.3 | Deltek Vision User Group Meeting
 
Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...
Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...
Consultant Accruals in Deltek Vision | Deltek Vision User Group Meeting | Q2 ...
 
Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)
Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)
Custom Office A to Z in Sage 100 ERP (MAS 90 & MAS 200)
 
Improve Billing Process and Performance with Deltek Vision
Improve Billing Process and Performance with Deltek VisionImprove Billing Process and Performance with Deltek Vision
Improve Billing Process and Performance with Deltek Vision
 
What's New in Deltek Vision 7.1
What's New in Deltek Vision 7.1What's New in Deltek Vision 7.1
What's New in Deltek Vision 7.1
 
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
Straight Talk About the Cloud: Why Some Company's Are Leveraing Modern Techno...
 
What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...
What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...
What's New in Deltek Vision 7.1, Invoice Approvals, Overhead Allocation and 5...
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

The Notorious 9: Is Your Data Secure in the Cloud?

Editor's Notes

  1. Course Synopsis:
  2. In a moment, I’m going to ask you to introduce yourself and I’m going to ask you to tell me what you are hoping to get from attending this meeting. Before we get in to Security in the cloud, I thought it would be useful to do a little review of some of the terms associated with Cloud Computing today. Next we’ll talk about the “Notorious Nine” security issues and what you SHOULD be worried aboutDon’t panic! There is hope and once we understand the concerns, we’ll discuss how top publishers are addressing these security issuesOnce you understand the good and the bad of cloud computing, we’ll provide you with some tools to decide who you can trust to partner with in the cloudFinally, we’ll end this session with Q&ABefore we begin, let’s do a bit of housekeepingThis is a “No Spin Zone.” There isn’t any blue or red in the room which means that I’m going to present the facts without a slant one way or the other – and you’ll decide how you feel about the cloud. RestroomsTime CheckQuestions before we begin?
  3. Ha! I was doing this presentation a few days ago in San Antonio and one of the attendees stopped me and said, “What decade was THAT picture taken in!” And I had to admit, it wasn’t even taken in this CENTURY! We all have different visions of ourselves and the people around us. This is how my kids see meAnd this is how my wife sees meAnd this is how our staff sees meAnd, well, this is how I see me.
  4. As the founder of BCS ProSoft, I where many hats and fill different roles – and I always STRIVE to be the best at what I do, which is help businesses meet their potential through the intelligent use of technology. I’m here before you today because I believe the Cloud offers you as business owners and managers a set of tools that has the potential to revolutionize your business. My job today is to help you understand what is possible in the cloud and you to give you confidence that your business can be run securely and efficiently in the cloud. So enough about me….now it’s your turn…
  5. Please provide your name, company, and what you’re HOPING to get from your time here today.
  6. BCS ProSoft is a leading ERP software reseller with offices in Texas, Colorado, and Hawaii. We have well over 1,500 clients throughout the US and Canada and we’ve been successful through the last 27+ years because we work hard for our customers and while we may make a mistake or two along the way, we do what we say we’re going to do – we deliver as promised. Our customers are the reason for our success. We represent several different accounting/business management products – some are in the cloud and others are not. We believe there is no one single product that is perfect for all.
  7. So let’s take a few minutes to define some of the terms that are thrown around today with regard to the internet. Cloud Computing – Metaphor for “The Internet” , but it’s really more than that. Think of Cloud Computing as a process of outsourcing IT services on a subscription (rental) basis.
  8. When you move applications to the “Cloud,” they are technically available from any device that has access to the internet, via Wifi or Wireless – tablet, smart phone, PC, or Laptop. I say “Technically Available” because usability issues with some legacy products may preclude them from being accessible on today’s mobile devices. Applications have to be smart enough to understand what device is accessing it and tailor the output for that device.
  9. We really need to better define what is pushed to the Cloud and how that correlates to what you are currently doing today. We classify the outsourcing to the cloud three ways: IaaS – Infrastructure as a ServicePaaS – Platform as a ServiceSaaS – Software as a ServiceLet’s talk about each of these in a bit more detail
  10. Most likely, you are currently accessing your critical business systems in an “On Premise” model. In other words, you have a server(s) located at your office that store all your programs and data. This(these) servers are networked to your PC’s in the office so that everyone has access. You are totally responsible for the care & maintenance of the server(s) as well as securing and backing up your data. In most organizations, this is the most vulnerable method of business systems delivery.
  11. Infrastructure as a Service is the most basic of services. Think of this as having your server hosted by a 3rd party service. Vendors gain ECONOMIES OF SCALE by employing Virtualization to lower costs of maintaining multiple servers. In San Antonio, we have Rack Space
  12. Platform as a Service takes on more responsibility for the infrastructure in that the database is also managed by the vendor. Think of this as a set of building blocks provided by a 3rd party and you are responsible for building what you want IN THEIR SANDBOX. MS Ajure, Google App Engine, etc.
  13. So finally we come to Software as a Service, in which the vendor manages all aspects of your business management systems. Servers, data, backup, and applications are all managed by the vendor.
  14. This brings us to how the data is stored in the cloud. You have probably heard the term, “Multi-Tenant” when talking about SaaS software. Multi-Tenant is a single database that serves multiple organizations. Single Tenant is when a vendor sets up a Physical or Virtual machine for every client. The results are generally the same, but the Multi-Tenant solution is much less expensive for the vendor to maintain because: Updates only have to be performed once on the single databaseMaintenance is performed on a single databaseMulti-Tenant offers a potential security issue, however, because data from multiple companies reside in a single, large database. Database design and security are critical factors in providing highly secure systems.
  15. I’m going to spend the next 30 minutes or so scaring the cloud out of you – but don’t worry, I’ll bring you back off the ledge before we’re done today, I promise! Any time you expose your business or personal data via a cloud application, you are potentially opening yourself up to loss of data or loss of access to your data. It is wise for you to understand your areas of vulnerability so that you can plan to overcome them.
  16. According to the Cloud Security Alliance, a recent study (February 2013) indicates that the unprecedented pace of cloud computing adoption in business and government has created new security challenges. Recognizing both the promise of cloud computing and the risks associated with it is good business. Ultimately, you are still responsible for the security of your systems and data – whether on premise or in the cloud.
  17. To identify top threats, the Cloud Security Alliance has conducted a survey of industry experts to compile professional opinion on the greatest vulnerabilities within cloud computing. According to the survey, the top security threats are: Data Breaches, Data Loss, Account Hijacking, Insecure APIs, Denial of Service, Malicious Insiders, Abuse of Cloud Services, Insufficient Due Diligence, and Shared Technology Issues. It is important to remember that this list is compiled from the responses to a 2013 CSA survey and does not represent every possible vulnerability. (Lawyer disclaimer…)
  18. Data falling in to the wrong hands has been an executive nightmare since the beginning of commerce. The advent of networked computers has amplified the danger. There are multiple ways for data breaches to occur, including the extraction of private cryptographic keys and in a poorly designed multitenant cloud service database, if one account is breached, all accounts are vulnerable. Today, data breaches are achieved through sophisticated operations and depending on the nature of the data, certain organizations may be targeted directly by foreign governments and/or nefarious organizations. Sound familiar????
  19. For both consumers and businesses, the prospect of permanently losing one’s data is terrifying. Malicious attack is a real threat in which someone gains access to your data and performs a data wipe. Malicious attackers are not the only cause of data loss. Accidental deletion by your cloud service provider or catastrophic loss by tornado, flood, etc. are real possibilities.
  20. Account or Service hijacking is not new. Attack methods such as phishing, fraud, and exploitation of software vulnerabilities still achieve results. The most common causes of hijacking: (1) using the same password across multiple systems, (2) using too simple of passwords (eg: 1234 or password), and responding to phishing emails that look like “official” requests for information. Cloud solutions add a new threat to the landscape. If an attacker gains access to your credentials, they can eavesdrop on your activities/transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites.
  21. In order to provide good integration between multiple, disparate systems, cloud developers provide access to their data using a set of software interfaces, generally called APIs. From authentication and access control to encryption and activity monitoring, these interfaces must be designed to protect against both accidental and malicious attempts to circumvent policy. But it gets worse. Many cloud publishers rely heavily on multiple third party vendors to fill the gaps in the base software by providing add-on applications that interface via these APIs. This policy introduces a new level of complexity in a layered API. As more vendors become involved, risk increases because the cloud publisher must relinquish control of their credentials to multiple third party vendors.
  22. Denial of Service is like being caught in rush-hour traffic with no way to get to your destination and nothing you can do about except sit and wait. Most of us have dealt with slow network connections from time to time but, Denial of Service (DOS) is caused by malicious programs that force the victim cloud service to consume system resources beyond the bandwidth of the services.
  23. A malicious insider, such as a system administrator, in an improperly designed cloud scenario can have access to potentially sensitive data and a disgruntled employee with mal intent can wreak havoc on a companies business system before anyone even realizes it. In the old Unix days, we used to kid about performing a command line function, “rm –r” which, if executed, wipes the disk of all files and folders, including the boot sector of the drive. 5 key strokes and you’re down for the count!!BTW, this is an even greater risk in an on-premise implementation because the system is more easily accessed and most firms don’t have multi-day backups.
  24. It might take an attacker years to crack an encryption key using his own limited hardware, but using an array of cloud servers, he might be able to crack it in minutes. Alternately, he might use that array of cloud servers to stage a DDOS (distributed denial of services) attack, serve malware, or distribute pirated software. This is really more of an issue for cloud service providers than cloud consumers, but it does raise a number of serious implications for those providers. How will you detect people abusing your service? How will you define abuse? How will you prevent them from doing it again?
  25. An organization that rushes to adopt cloud technologies subjects itself to a number of issues. Contractual issues arise over obligations of liability, response, or transparency by creating mismatched expectations between the cloud provider and the customer. In addition, pushing applications that are dependent on “internal” network level security controls to the cloud is dangerous when those controls disappear or do not match the customer’s expectation. Finally, unknown operational and architectural issues arise when designers and architects unfamiliar with cloud technologies are designing applications being pushed to the cloud.
  26. Improperly designed applications (whether in IaaS, PaaS, or SaaS models) can expose customers to possible data loss or data breaches. This vulnerability is dangerous because it potentially can affect an entire cloud at once, taking everyone down with it.
  27. - Some organizations probably have the resources to build out and maintain a security plan that covers all contingencies, but I doubt most small businesses have the expertise or money to provide the level of security provided by the established cloud software providers. Your employees pose the largest threat to your data: Betty clicks on a Cat Video and brings your network to a crawl. Todd is a disgruntled employee and when he’s leaving he wipes out your ERP data. Samantha brings a thumb drive to the office with pictures of her grandbaby and you end up with a crippling virus that brings you down for days while a hired expert works to remove the virus from your servers and workstationsMost companies don’t have adequate backups of their programs and data. At least once each year we get a call from a customer that needs to restore data, only to discover that their backup software hasn’t been working for months. And what about natural disasters? Last year, we had a customer in NJ that lost their data, even though they thought they were being smart. They had multiple, off-site backups – but the office where the server was located AND the homes where the backup tapes were stored all flooded. They lost everything!
  28. The Notorious 9 is not a new concept. It is well known to the most prominent cloud publishers and they have designed their software, built server farms, and implemented security procedures to overcome these and dozens of other potential security risks. Does it mean that your data is secure in the cloud? Not really, but in almost all cases, your data would be more secure in the cloud than sitting on your servers in your office.
  29. There is no LAW that requires that a cloud publisher meet any specific standard when it comes to security and infrastructure, but the players want to make sure they are following the best practices set out by various independent organizations like the AICPA, IFAC, and the US Department of Commerce. These organizations provide auditing services and certification designed to help publishers insure they are doing everything they possibly can in order to secure your data. SSAE 16 insures that the service provider meets a set of standards that insures the ability to fully audit their capabilities – It DOES NOT set any standards of compliance for security – it just insures that they have the controls in place to perform a full audit. ISAE 3402 Type 1 – the auditor will express an opinion on whether the service organizations description of controls are suitably designed to achieve control objectivesISAE 3402 Type 2 – the auditor has performed tests and the controls were found to be operating with sufficient effectiveness to reasonably assure that control objectives were achieved. PCI DSS – Security related to credit card security via computer based information systems. Vendors that have passed PCI DSS scrutiny have allowed their software to be tested by a third party participant. US-EU Safe Harbor – Privacy standard set by EU for non-EU countries. Self regulation/enforcement with backing of rules/regulations provided by Dept. of Commerce.
  30. 24/7-365 – You would think this would go without saying, but we had a client recently that needed to restore a file and the cloud vendor didn’t have anyone available to assist. The employees were all at a company retreat (the bar?)!Intrusion Detection Monitoring is a science in to itself. A cloud provider must continuously monitor for malicious attempts to access data and/or inappropriately use system resources. The folks that are managing the servers shouldn’t be the same people that are monitoring the security systems. They must be independent of each other and answer to different authorities. This precludes any one person from having full access to the system. Management of the physical facilities is critical as well. A strong security policy includes a hardened facility with strict rules for entry to the facility. For example, using sophisticated bio-security systems, single-person portals, perimeter monitoring by armed guards and cameras, etc. Continuous performance auditing is imperative. A cloud vendor should be able to provide current industry certifications and describe how they continuously monitor for compliance.
  31. When someone tells you they are a tier 1 data center, it is important to understand what they’re talking about. The difference between a Tier 1 and Tier 4 data center is the amount of redundancy that is built in to the physical systems. Tier 1 may be adequate, but it’s certainly not the best! A tier 4 data center will be the most secure and provide the best up-time guarantee.
  32. You may think that anything over 99% is plenty good – and that may be true. Redundancy also means your data is less likely to be damaged or lost.
  33. There are some great reasons that business is moving to the cloud. Reliability, Security, Scalability
  34. But there’s another more sinister cost associated with On-Premise implementations. It’s called “Version Lock.”91% of all IT Budgets are focused on maintaining the status quo and only 9% is allocated towards innovation. The result? 66% of all customers running on-premise business management systems are on OLD VERSIONS of the software. Why is this important? Because companies that don’t stay current on their software will get locked in to the “OLD WAY” of doing business and won’t innovate. But it gets worse – After 4-6 years of being locked in to an old version of the software, the cost of upgrading is as much or more than the cost of changing systems entirely, so many business owners/managers opt to change entire systems. Businesses running on Cloud products are automatically updated as new version become available – it’s part of the fee. Plus, since vendors need to keep you on the current version, they have to make available training so that you’ll know what’s new in the software.
  35. Here are the top 5 reasons business owners are turning to the cloud to solve their business issuesImproved Business Agility – Create, deploy, and manage business critical applications – quickly. Let’s say, for example that you get a new contract that requires you to hire an additional 20 employees. If your business systems are deployed on premise, you will have to upgrade or possibly replace your current hardware/software systems. This is time consuming and expensive. If you are implemented in the cloud, it is a simple phone call to add the additional users. Plus, when the project is over the costs sunk in to upgrading the on premise systems are sunk costs that cannot be recovered or reduced.Generate an attractive ROI – When comparing the cost of on premise vs. cloud, you have to consider the cost of purchasing, maintaining, and upgrading hardware over time. You must also calculate the potential cost of down time due to various hardware failures (virus, drive failures, natural disasters, etc.). There are also various labor costs that must be included in the analysis, such as cost of managing upgrades, backups, etc. Accelerate Time to Value – Time is money and putting your business systems on the cloud is FAST. On premise implementations require the creation of infrastructure and that takes time and money. Jump Start Innovation Programs – Once your business systems are implemented in the cloud, it is easy to provision a “Sandbox” to test new processes before going live. Elasticity and Scale – One of the key promises of cloud computing is limitless capacity. This elasticity and scalability are key factors in allowing small businesses to compete against the big boys. As your business expands, you don’t have to rely on IT staff and DBA’s to give you the tools you need to grow.
  36. There are a host of security and licensing issues to think about when considering a partnership with a Cloud provider. As a lay user, you may not understand the significance of each of these questions and you may not be able to determine if the answer provided is totally adequate, but if they CAN’T answer these questions, or WON’T answer your questions, you know you have a problem.
  37. In most cases, a vendor should be willing/able to provide copies of Security Certifications – and those certs deal with most of the questions on the previous slide, however, you need to ask a couple of questions, specifically: What happens to data when you “Delete” it? Is it actually wiped out? – It should be gone and non-retrievable within a backup cycle. You don’t want your data living out there to be discovered and misused in the future. Who Owns the Rights to Your Data? – You own your data and should you choose to quit working with a cloud vendor, you should be allowed to take your data – in a form that can be imported elsewhere – with you. If they cannot provide you with that, then you shouldn’t be considering the vendor as a possible partner.
  38. Service Summary or DescriptionThe service summary section usually appears in the introductory section of the SLA. It should always state the name of the provider and the name of the customer. This summary will enumerate the obligations that you, the customer, must fulfill in order to satisfy the SLA. For example, you may be asked to provide up-to-date contacts, network topologies and customer escalation paths. This section will usually list the support level (e.g., gold or platinum) you have purchased. The support level determines how fast the service provider will respond to your service requests, how many service requests you’re allowed per week or month, how often you will be notified during emergencies, and most important, what your general service availability guarantee is. HardwareService providers host security services in a variety of ways. Some will install dedicated hardware at your site. Some will provide you with dedicated hardware, but it will sit in the provider’s own network operations center. And others will provide the security service through virtual domains that share, with other customers, the same physical hardware located (again) at the service provider's site. Regardless of the method used, the service provider should state clearly in the SLA how the service is to be provided. Once you’re sure of the hardware in use, you will be able to ask intelligent questions about hardware specification, performance, throughput, size, upgrades and so forth. SoftwareMost service providers use products from name-brand companies such as Check Point, ISS, Cisco, and others. Other service providers will use open-source software such as Snort for IDS. It’s important to know what software will be used for the service you have purchased. Your company may have specific requirements, such as avoiding unsupported open-source software on any of your IT infrastructure. In that case, software such as Snort may be out and the service provider must use vendor-supported products. Knowing what software is used also allows you to better understand the relationship between the service provider and the software vendor. For instance, if your service provider is using Cisco PIX as the firewall software but there’s no CCIE on staff, that would certainly be a cause for concern. Service AvailabilityThe service availability section may be the section you're most familiar with. This section describes exactly what service level guarantee you will receive. One of the most critical service-level guarantees is uptime percentage. For example, 99.5% uptime means that your site can potentially be down for 216 minutes per month without any penalty for the service provider. If the service is down more than the guaranteed level, the service provider will compensate you for that period of time. It is critical to understand what the service provider considers to be downtime. For example, most service providers will not consider upgrades to constitute service downtime; therefore, you will not be compensated for those periods of unavailability. Other service-level guarantees the agreement may specify include how fast the service provider will respond to your service requests, how long upgrades will take, how fast service providers will detect and report problems, and so forth. Another critical consideration is how the service provider will be penalized if the service-level guarantee is not met. In most cases it simply means the service provider won’t bill you for that period of time. Service RequestsSLAs generally provide for a number of standard service requests per month and a number of emergency service requests per month. Understanding when the service call will be considered an emergency request will allow you to properly plan for changes. For example, if the service provider considers any requests you want performed outside of standard business hours (8 a.m. to 5 p.m., Monday through Friday) to be emergency, and most of the changes you want fall outside of that time frame, you may have a problem. There are other things to consider when negotiating your service-request needs. Some service providers may limit the number of IT personnel from your company allowed to open service requests. Others may consider certain service requests to count as two requests. Some service providers may charge extra for certain service requests. Naturally, the list goes on. Monitoring and ReportingNetwork administrators can find it extremely frustrating if they’re unable to quickly perform troubleshooting when the network is unexpectedly down, or if they don't have the resources to quickly do forensic analysis when an incident is detected. These days, service providers are doing a much better job of providing reports to customers on bandwidth utilization, uptime analysis and log management. However, there’s still quite a bit of difference among service providers, and you'll need to ask a number of questions. For example, does your service provider offer the most up-to-date configuration online for your review? Will you receive daily, weekly or monthly reports based on your firewall, IDS or VPN logs? What about ad hoc or custom reports so you can perform troubleshooting or forensic analysis? And will you be assured of backups of all configurations? Availability, responsiveness, quality and communication are important elements to consider for any service provider SLA. In the next four articles in this series, we will discuss each of the above sections in detail, including the specific considerations for each topic, why it matters, what you should expect and the norms are among service providers.