Enviar pesquisa
Carregar
Clouds And Security
•
Transferir como PPT, PDF
•
1 gostou
•
560 visualizações
Predrag Mitrovic
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 64
Baixar agora
Recomendados
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Issa 042711
Issa 042711
Erin Banks
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Edureka!
CloudPassage Overview
CloudPassage Overview
CloudPassage
AWS User Group - Security & Compliance
AWS User Group - Security & Compliance
Satish Kumar Natarajan
Security on AWS
Security on AWS
Amazon Web Services LATAM
Cloud security
Cloud security
François Boucher
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
Recomendados
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Issa 042711
Issa 042711
Erin Banks
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Edureka!
CloudPassage Overview
CloudPassage Overview
CloudPassage
AWS User Group - Security & Compliance
AWS User Group - Security & Compliance
Satish Kumar Natarajan
Security on AWS
Security on AWS
Amazon Web Services LATAM
Cloud security
Cloud security
François Boucher
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
F5 Programmability & Orchestration
F5 Programmability & Orchestration
MarketingArrowECS_CZ
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
Amazon Web Services
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
Kenny Buntinx
What is ransomware?
What is ransomware?
Francisco Diaz III
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
Modern Security for the Modern Data Center
Modern Security for the Modern Data Center
VMware
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
Amazon Web Services
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
DATA SECURITY SOLUTIONS
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
craigbalding
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Karim Hopper
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Jean-François LOMBARDO
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
Brian Andrzejewski
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
YounesChafi1
Securing Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
School Vegetable Gardening - Victory Gardens
Retractable roof greenhouse production system
Retractable roof greenhouse production system
Rajender Thakur
Mais conteúdo relacionado
Mais procurados
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
F5 Programmability & Orchestration
F5 Programmability & Orchestration
MarketingArrowECS_CZ
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
Amazon Web Services
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
Kenny Buntinx
What is ransomware?
What is ransomware?
Francisco Diaz III
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
Modern Security for the Modern Data Center
Modern Security for the Modern Data Center
VMware
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
Amazon Web Services
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
DATA SECURITY SOLUTIONS
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
craigbalding
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Karim Hopper
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Jean-François LOMBARDO
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
Brian Andrzejewski
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
YounesChafi1
Securing Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
Mais procurados
(20)
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
F5 Programmability & Orchestration
F5 Programmability & Orchestration
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
What is ransomware?
What is ransomware?
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
Modern Security for the Modern Data Center
Modern Security for the Modern Data Center
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
Securing Applications in the Cloud
Securing Applications in the Cloud
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Destaque
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
School Vegetable Gardening - Victory Gardens
Retractable roof greenhouse production system
Retractable roof greenhouse production system
Rajender Thakur
Net zero house
Net zero house
Suzanne Ga San Roman
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
Академия интернет-маркетинга «WebPromoExperts»
net house cultivation of vegetables in Punjab An Economic Analysis
net house cultivation of vegetables in Punjab An Economic Analysis
ramanraman
Plant tissue culture
Plant tissue culture
Sir Parashurambhau College, Pune
Destaque
(6)
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Retractable roof greenhouse production system
Retractable roof greenhouse production system
Net zero house
Net zero house
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
net house cultivation of vegetables in Punjab An Economic Analysis
net house cultivation of vegetables in Punjab An Economic Analysis
Plant tissue culture
Plant tissue culture
Semelhante a Clouds And Security
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story Craig Balding
craigbalding
Ampi vmware
Ampi vmware
anapelizondo
040711 webcast securing vmachine
040711 webcast securing vmachine
Erin Banks
Implementing Governance as Code
Implementing Governance as Code
Amazon Web Services
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
ICT-Partners
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
Risk Crew
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
HostedbyConfluent
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
rpark31
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
Amazon Web Services
Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
Amazon Web Services
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Morgan Simonsen
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
Amazon Web Services
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
CA Nimsoft
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
CA Technologies
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
anupriti
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
Dell Technologies
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
Virtualization presentation
Virtualization presentation
Mangesh Gunjal
Automating your AWS Security Operations
Automating your AWS Security Operations
Evident.io
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Tom Laszewski
Semelhante a Clouds And Security
(20)
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story Craig Balding
Ampi vmware
Ampi vmware
040711 webcast securing vmachine
040711 webcast securing vmachine
Implementing Governance as Code
Implementing Governance as Code
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
Virtualization presentation
Virtualization presentation
Automating your AWS Security Operations
Automating your AWS Security Operations
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Mais de Predrag Mitrovic
Nygammalt om molnlöftet
Nygammalt om molnlöftet
Predrag Mitrovic
Personlig vision och skapande
Personlig vision och skapande
Predrag Mitrovic
Strategi, kompetens och utveckling
Strategi, kompetens och utveckling
Predrag Mitrovic
Information om e-grannar
Information om e-grannar
Predrag Mitrovic
Identiteter nordic edge april 2011
Identiteter nordic edge april 2011
Predrag Mitrovic
Agility computing itarc2011
Agility computing itarc2011
Predrag Mitrovic
Agility computing itarc2011
Agility computing itarc2011
Predrag Mitrovic
Sig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & Molnsäkerhet
Predrag Mitrovic
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till höger
Predrag Mitrovic
Cloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till höger
Predrag Mitrovic
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTX
Predrag Mitrovic
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPT
Predrag Mitrovic
Cloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-format
Predrag Mitrovic
Dokumenthantering i molnet
Dokumenthantering i molnet
Predrag Mitrovic
Cloud strategy briefing 101
Cloud strategy briefing 101
Predrag Mitrovic
Predrag cv short english
Predrag cv short english
Predrag Mitrovic
Cloud Sweden Charter English
Cloud Sweden Charter English
Predrag Mitrovic
Cloud Sweden Charter English
Cloud Sweden Charter English
Predrag Mitrovic
Cloud Sweden Kick-off
Cloud Sweden Kick-off
Predrag Mitrovic
Cloud Sweden Kick-Off
Cloud Sweden Kick-Off
Predrag Mitrovic
Mais de Predrag Mitrovic
(20)
Nygammalt om molnlöftet
Nygammalt om molnlöftet
Personlig vision och skapande
Personlig vision och skapande
Strategi, kompetens och utveckling
Strategi, kompetens och utveckling
Information om e-grannar
Information om e-grannar
Identiteter nordic edge april 2011
Identiteter nordic edge april 2011
Agility computing itarc2011
Agility computing itarc2011
Agility computing itarc2011
Agility computing itarc2011
Sig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & Molnsäkerhet
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till höger
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-format
Dokumenthantering i molnet
Dokumenthantering i molnet
Cloud strategy briefing 101
Cloud strategy briefing 101
Predrag cv short english
Predrag cv short english
Cloud Sweden Charter English
Cloud Sweden Charter English
Cloud Sweden Charter English
Cloud Sweden Charter English
Cloud Sweden Kick-off
Cloud Sweden Kick-off
Cloud Sweden Kick-Off
Cloud Sweden Kick-Off
Último
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Último
(20)
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Clouds And Security
1.
Cloud Computing =
.COM 2.0? Predrag Mitrovic, CISSP, CISM, Author [email_address]
2.
2 minute bio
www.cloudadvisor.se
3.
www.cloudadvisor.se
4.
www.cloudadvisor.se
5.
1990 Botkyrka kommun
www.cloudadvisor.se
6.
www.cloudadvisor.se 1995 IDG
Nätverk & Kommunikation
7.
1997 NetHouse Konsult
& Media www.cloudadvisor.se
8.
www.cloudadvisor.se 1999 Novell
EMEA
9.
2000 Microsoft www.cloudadvisor.se
10.
www.cloudadvisor.se 2007 LabCenter
11.
www.cloudadvisor.se October 1st
MyNethouse
12.
www.cloudadvisor.se
13.
www.cloudadvisor.se
14.
15.
www.cloudadvisor.se
16.
Security-as-a-Service Storage-as-a-Service Integration-as-a-Service
Database-as-a-Service Information-as-a-Service Process-as-a-Service Application-as-a-Service Platform-as-a-Service Management/Governance-as-a-Service Testing-as-a-Service
17.
18.
19.
20.
The idea Shared
infrastructure www.cloudadvisor.se Server OS Database App Server Storage Network App 1 Server OS Database App Server Storage Network App 2 Server OS Database App Server Storage Network App 100
21.
22.
23.
24.
IaaS example www.cloudadvisor.se
25.
PaaS examples www.cloudadvisor.se
26.
SaaS examples www.cloudadvisor.se
27.
www.cloudadvisor.se
28.
www.cloudadvisor.se
29.
www.cloudadvisor.se
30.
Security in the
clouds
31.
Storage Virtualized resources
Virtuell Image 1 Virtual Image.. n Virtual Image 1 Security www.cloudadvisor.se CPU, RAM, Networking SW Kernel (OS & VM) Cloud applications Risk Governance Lifecycle mgmt AAA Auditing Security in- depth Incident mgmt
32.
33.
34.
35.
36.
37.
38.
39.
Risk management www.cloudadvisor.se
40.
41.
Governance www.cloudadvisor.se
42.
43.
Legal www.cloudadvisor.se
44.
45.
Compliance & Audit
www.cloudadvisor.se
46.
47.
ILM www.cloudadvisor.se
48.
49.
Portability & Interoperability
www.cloudadvisor.se
50.
51.
Identity www.cloudadvisor.se
52.
53.
Datacenter operations www.cloudadvisor.se
54.
55.
Incident handling www.cloudadvisor.se
56.
57.
Conclusions www.cloudadvisor.se
58.
Cloud Computing is
built on known technology – but the risks are definitively virgin territory! www.cloudadvisor.se
59.
There are loads
of exciting opportunities – open to all! www.cloudadvisor.se
60.
Business demands results
without ”whining and but´s” – handle it or be bypassed and marginalized! www.cloudadvisor.se
61.
Why not implement
the philosophy of the cloud in your IT? www.cloudadvisor.se
62.
63.
64.
Baixar agora