Enviar pesquisa
Carregar
Nils Puhlmann Ncoic Slides
•
2 gostaram
•
1,674 visualizações
GovCloud Network
Seguir
Nils Puhlmann, Cloud Security Alliance - Cloud Security
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 14
Baixar agora
Baixar para ler offline
Recomendados
HealthSPA Turku-Toni Perämäki Microsoft August 27
HealthSPA Turku-Toni Perämäki Microsoft August 27
Upgraded - Health Startup Association of Finland
Cloud Security - Reality or Illusion
Cloud Security - Reality or Illusion
Srinivas Thimmaiah
Netpluz Managed Cyber Security
Netpluz Managed Cyber Security
Netpluz Asia Pte Ltd
Cloud camp Ghent
Cloud camp Ghent
dgeens
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Advantages of privacy by design in IoE
Advantages of privacy by design in IoE
Marc Vael
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Recomendados
HealthSPA Turku-Toni Perämäki Microsoft August 27
HealthSPA Turku-Toni Perämäki Microsoft August 27
Upgraded - Health Startup Association of Finland
Cloud Security - Reality or Illusion
Cloud Security - Reality or Illusion
Srinivas Thimmaiah
Netpluz Managed Cyber Security
Netpluz Managed Cyber Security
Netpluz Asia Pte Ltd
Cloud camp Ghent
Cloud camp Ghent
dgeens
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Advantages of privacy by design in IoE
Advantages of privacy by design in IoE
Marc Vael
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Infosec Europe 2017 Highlights | Lastline, Inc.
Infosec Europe 2017 Highlights | Lastline, Inc.
Lastline, Inc.
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share Securely
Gareth Niblett
“They’re Coming for OUR Internet: We can fight back”
“They’re Coming for OUR Internet: We can fight back”
Daniella Vallurupalli
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Corporate Profile 8 - 1 b 3- 25 July
Corporate Profile 8 - 1 b 3- 25 July
Kamel Salloum
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
n|u - The Open Security Community
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
CipherCloud
Defining A Cyber Moonshot: Getting Safer in Five Years
Defining A Cyber Moonshot: Getting Safer in Five Years
scoopnewsgroup
Debunking the mysteries of cloud computing!
Debunking the mysteries of cloud computing!
Henge Systems
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Company yufansun
Company yufansun
Yufan Sun
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
Security In The Cloud Timed
Security In The Cloud Timed
Frederick James Rathweg
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVA
About Me - Vinay Pandey
About Me - Vinay Pandey
Vinay Pandey
Instituting_Wi-Fi_Policies
Instituting_Wi-Fi_Policies
Will Kelly
Ministry of Foreign Affairs
Ministry of Foreign Affairs
Cisco Case Studies
Sprint Secure Portfolio
Sprint Secure Portfolio
Richard Baredziak, MBA
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Jisc
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Pia Waugh
GSAW Presentation on Cloud Security V2.1
GSAW Presentation on Cloud Security V2.1
GovCloud Network
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
GovCloud Network
Mais conteúdo relacionado
Mais procurados
Infosec Europe 2017 Highlights | Lastline, Inc.
Infosec Europe 2017 Highlights | Lastline, Inc.
Lastline, Inc.
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share Securely
Gareth Niblett
“They’re Coming for OUR Internet: We can fight back”
“They’re Coming for OUR Internet: We can fight back”
Daniella Vallurupalli
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Corporate Profile 8 - 1 b 3- 25 July
Corporate Profile 8 - 1 b 3- 25 July
Kamel Salloum
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
n|u - The Open Security Community
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
CipherCloud
Defining A Cyber Moonshot: Getting Safer in Five Years
Defining A Cyber Moonshot: Getting Safer in Five Years
scoopnewsgroup
Debunking the mysteries of cloud computing!
Debunking the mysteries of cloud computing!
Henge Systems
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Company yufansun
Company yufansun
Yufan Sun
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
Security In The Cloud Timed
Security In The Cloud Timed
Frederick James Rathweg
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVA
About Me - Vinay Pandey
About Me - Vinay Pandey
Vinay Pandey
Instituting_Wi-Fi_Policies
Instituting_Wi-Fi_Policies
Will Kelly
Ministry of Foreign Affairs
Ministry of Foreign Affairs
Cisco Case Studies
Sprint Secure Portfolio
Sprint Secure Portfolio
Richard Baredziak, MBA
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Jisc
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Pia Waugh
Mais procurados
(20)
Infosec Europe 2017 Highlights | Lastline, Inc.
Infosec Europe 2017 Highlights | Lastline, Inc.
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share Securely
“They’re Coming for OUR Internet: We can fight back”
“They’re Coming for OUR Internet: We can fight back”
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Corporate Profile 8 - 1 b 3- 25 July
Corporate Profile 8 - 1 b 3- 25 July
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
Defining A Cyber Moonshot: Getting Safer in Five Years
Defining A Cyber Moonshot: Getting Safer in Five Years
Debunking the mysteries of cloud computing!
Debunking the mysteries of cloud computing!
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
Company yufansun
Company yufansun
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Security In The Cloud Timed
Security In The Cloud Timed
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
GWAVACon 2015: GWAVA - Why Unified Archiving Pays Off…
About Me - Vinay Pandey
About Me - Vinay Pandey
Instituting_Wi-Fi_Policies
Instituting_Wi-Fi_Policies
Ministry of Foreign Affairs
Ministry of Foreign Affairs
Sprint Secure Portfolio
Sprint Secure Portfolio
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Digital demand - the challenges of being a CIO in the UK HE sector, by John C...
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Destaque
GSAW Presentation on Cloud Security V2.1
GSAW Presentation on Cloud Security V2.1
GovCloud Network
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
GovCloud Network
Yongsan presentation 1
Yongsan presentation 1
GovCloud Network
Georgia HIT Summit Keynote
Georgia HIT Summit Keynote
Lee Aase
NJVC-Virtual Global PaaS white paper
NJVC-Virtual Global PaaS white paper
GovCloud Network
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
GovCloud Network
Value Of Cloud Computing For Fed Governmen Oct 8
Value Of Cloud Computing For Fed Governmen Oct 8
GovCloud Network
Destaque
(7)
GSAW Presentation on Cloud Security V2.1
GSAW Presentation on Cloud Security V2.1
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Yongsan presentation 1
Yongsan presentation 1
Georgia HIT Summit Keynote
Georgia HIT Summit Keynote
NJVC-Virtual Global PaaS white paper
NJVC-Virtual Global PaaS white paper
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8
Value Of Cloud Computing For Fed Governmen Oct 8
Semelhante a Nils Puhlmann Ncoic Slides
Cloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
Subra Kumaraswamy CISSP CISM
Presd1 10
Presd1 10
Niels Groeneveld
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Cloud computing for SMBs
Cloud computing for SMBs
Krishnan Subramanian
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
SAP Ariba
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
Eiji Sasahara, Ph.D., MBA 笹原英司
Cloud security ppt
Cloud security ppt
Venkatesh Chary
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Livingstone Advisory
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
SAP Ariba
Cloud security and privacy
Cloud security and privacy
Subra Kumaraswamy CISSP CISM
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Jisc
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Ramy Houssaini
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
cVidya Networks
Cloud security ely kahn
Cloud security ely kahn
Ely Kahn
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Andy Powell
Enterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
Semelhante a Nils Puhlmann Ncoic Slides
(20)
Cloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
Presd1 10
Presd1 10
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Cloud computing for SMBs
Cloud computing for SMBs
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
Cloud security ppt
Cloud security ppt
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Cloud security and privacy
Cloud security and privacy
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Cloud security ely kahn
Cloud security ely kahn
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Enterprise Security in Cloud
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Mais de GovCloud Network
IaaS Price performance-benchmark
IaaS Price performance-benchmark
GovCloud Network
Cloud computing training what's right for me
Cloud computing training what's right for me
GovCloud Network
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
GovCloud Network
Staying Safe in Cyberspace
Staying Safe in Cyberspace
GovCloud Network
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
GovCloud Network
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
GovCloud Network
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
GovCloud Network
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
GovCloud Network
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network
GovCloud Network Overview Presentation
GovCloud Network Overview Presentation
GovCloud Network
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
GovCloud Network
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
GovCloud Network
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
GovCloud Network
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
GovCloud Network
Tech gate kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
GovCloud Network
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
GovCloud Network
Cloud computing-made-easy
Cloud computing-made-easy
GovCloud Network
Mais de GovCloud Network
(20)
IaaS Price performance-benchmark
IaaS Price performance-benchmark
Cloud computing training what's right for me
Cloud computing training what's right for me
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
Staying Safe in Cyberspace
Staying Safe in Cyberspace
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network Overview Presentation
GovCloud Network Overview Presentation
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
Tech gate kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
Cloud computing-made-easy
Cloud computing-made-easy
Último
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Último
(20)
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Nils Puhlmann Ncoic Slides
1.
NCOIC Federal
Cloud Storefront Workshop Nils Puhlmann Co-Founder September 21st, 2009
2.
Security is a
concern Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
3.
S-P-I Model
You “RFP” SaaS security in You build security in PaaS IaaS Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
4.
Security and the
SPI model Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
5.
Risk Examples •
Geo-location of sensitive data • Inability to deploy security services (e.g. scanning) • Risk with shared computing platform (multi-tenant) • Data confidentiality • Access via internet – untrusted • Cloud vendors for the most part non-committal on security • Company data on 3rd party machine • Compliance lacking – inability to satisfy auditors • Vendors not up to speed from a guidance and auditing perspective • Inability to perform forensic investigation Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
6.
Meet the Cloud
Security Alliance • Global, not-for-profit organization, started Nov. 2008, individual members (free), corporate members and affiliated organizations • Inclusive membership, supporting broad spectrum of subject matter expertise: cloud experts, security, legal, compliance, virtualization, and on and on… • We believe Cloud Computing has a robust future, we want to make it better “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
7.
Current corporate members
Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
8.
Current affiliates
Cloud-Standards.org Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
9.
Individual Members •
4,174 as of September 15th • Broad Geographical Distribution • Active Working Groups • Editorial • New Working Groups • Educational Outreach • Healthcare • Architecture • Cloud Threat Analysis • Governance, Risk Mgt, Compliance, Business • US Federal Government Continuity • Financial Services • Legal & E-Discovery • Portability, Interoperability and Application Security • Identity and Access Mgt, Encryption & Key Mgt • Data Center Operations and Incident Response • Information Lifecycle Management & Storage • Virtualization and Technology Compartmentalization Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
10.
Project Roadmap •
April 2009: Security Guidance for Critical Areas of Focus for Cloud Computing – Version 1 • July 2009: Version 1 translated into Japanese • October 2009: Security Guidance for Critical Areas of Focus for Cloud Computing – Version 2 • October 2009: Top Ten Cloud Threats (monthly) • November 2009: Provider & Customer Checklists • December 2009: eHealth Guidance • Global CSA Executive Summits • Q1 2010 – Europe • Q1 or Q2 2010 - US Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
11.
Security Guidance for Critical
Areas of Focus in Cloud Computing Download at: www.cloudsecurityalliance.org/guidance Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
12.
Overview of Guidance
1. Architecture & Framework Governing in the Cloud Operating in the Cloud 2. Governance & Risk Mgt 8. Traditional, BCM, DR 3. Legal 9. Data Center Operations 4. Electronic Discovery 10. Incident Response 5. Compliance & Audit 11. Application Security 6. Information Lifecycle Mgt 12. Encryption & Key Mgt 7. Portability & 13. Identity & Access Mgt Interoperability 14. Storage 15. Virtualization Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
13.
Contact •
www.cloudsecurityalliance.org • info@cloudsecurityalliance.org • Twitter: @cloudsa, #csaguide • LinkedIn: www.linkedin.com/groups?gid=1864210 Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
14.
Thank You!
www.cloudsecurityalliance.org
Baixar agora