ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Predicting the Future: Security and Compliance in the Cloud Age
IntroductionMisha Govshteyn ¨C CTO, Alert LogicWork in security and web-scale architecture; operate high performance LAMP environment and  Erlang-based compute gridHelp hosting/cloud service providers deliver security servicesSecure Cloud Review blog -> http://www.securecloudreview.com/ What we do at Alert Logic
About this sessionObjective:Help you make security & compliance decisions that prepare your company for the futureThis presentation addresses a broad trend of consuming IT as a serviceCloud in this context includes IaaSPaaSSaaSWhy take such a broad view? Because each of these models has potential to significantly alter the way you protect your most critical assets
Putting 2010 questions in perspectiveQuestions of today are less important than this fact : IT is increasingly delivered as a serviceYour IT footprint is already changing¡­probably adopting some form of cloud servicesnetwork is already becoming decentralizedSome of your data may already be off-premiseIaaS? PaaS? SaaS?Private vs Public?IT vs Cloud?
 Formulating a Security Strategy
Your Enterprise in 2015platformISVvirtualdesktopsaas????burstprivateHRCRMFinancePOSweb storefrontCloud Enabled FunctionsEnterprise SoftwareEnterprise Platforms
Cloud questions today and tomorrow
Your enterprise 5 years from nowPerimeter is less important than everMore than 50% of your critical data is offsiteSome in environments you do not controlSome users don¡¯t need your VPN to do their jobs  Securing the enterprise will be characterized byContinuous transfer of security responsibility to service providers of all typesApplication/protocol level attacksEven more compliance requirements than today
Security trends in next 5 yearsGovernance and compliance efforts will extend to private and public cloud environmentsCloud providers will use security as a differentiatorBecome increasingly more transparentProvide automated attestation and auditing of key controls, including access to logsNative data encryption available & heavily promoted, but sparingly usedMost will offer enterprise-level Security-as-a-Service within 2-3 yearsChanges in security industryIdentity management is likely to become the first cloud sec ¡°killer app¡±Netsec vendors, less strategic to enterprises, will focus on CSPsApplication/protocol security and Data Leak Prevention are likely to become increasingly important due to PCI mandates
Cloud impact on network securityMost network security products are unable to deal with complexity of CSP networksBig pipes: CSPs already see speeds well in excess of 50gbpsSmall customers: thousands of customers, some with very little traffic (no native multi-tenancy)Rapid elasticity ¨C changing topology, new IP allocations, new VLANS, more traffic flowsToday¡¯s notions of trusted users, networks and computing resources will need to be re-thoughtCloud Service Providers will begin to control an increasing share of the network, rather than Enterprise ITThe Evolving perimeterTraditional notion of perimeter will change dramatically as data migrates into the cloud
Network firewalls will fade in importance as perimeter disappears
Network security functions subsumed by service providers
Increasingly offered as a service
Become embedded in CSP and NSP network fabric
New security focus:
Applications
Protocols

More Related Content

What's hot (20)

Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
OWASP Delhi
?
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
?
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Moshe Ferber
?
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
Haris Chughtai
?
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
Haris Chughtai
?
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
?
Introducing S.A.M.S Connecting the Dots ¨C your SMART technology partner
Introducing S.A.M.S Connecting the Dots ¨C your SMART technology partnerIntroducing S.A.M.S Connecting the Dots ¨C your SMART technology partner
Introducing S.A.M.S Connecting the Dots ¨C your SMART technology partner
Ricky Homem
?
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
?
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
?
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
Cloudflare
?
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
Moshe Ferber
?
What is SASE
What is SASEWhat is SASE
What is SASE
Adi Ruppin
?
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
Moshe Ferber
?
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
?
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
George Fares
?
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
AWS Chicago
?
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Moshe Ferber
?
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
Abhishek Tripathi
?
Thin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud SecurityThin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud Security
Dan Fitzgerald, CISSP, CIPM
?
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
?
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
OWASP Delhi
?
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Moshe Ferber
?
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
Haris Chughtai
?
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
?
Introducing S.A.M.S Connecting the Dots ¨C your SMART technology partner
Introducing S.A.M.S Connecting the Dots ¨C your SMART technology partnerIntroducing S.A.M.S Connecting the Dots ¨C your SMART technology partner
Introducing S.A.M.S Connecting the Dots ¨C your SMART technology partner
Ricky Homem
?
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
?
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
Cloudflare
?
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
Moshe Ferber
?
Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
Moshe Ferber
?
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
?
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
George Fares
?
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
AWS Chicago
?
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Moshe Ferber
?

Similar to Predicting The Future: Security and Compliance in the Cloud Age (20)

Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
?
The Cloud Is Rockin' and Rollin' In
The Cloud Is Rockin' and Rollin' InThe Cloud Is Rockin' and Rollin' In
The Cloud Is Rockin' and Rollin' In
Krishnan Subramanian
?
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Orange Business Services
?
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Madhusudan Partani
?
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
?
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
Novosco
?
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
Joseph Williams
?
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
?
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
?
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
?
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
Ben Kepes
?
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
Lakshika Rasanjali
?
Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
EuroCloud
?
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
Rahul Parmar
?
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
kavinalli
?
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
Rahul Parmar
?
Cloud Computing basics - an overview.pptx
Cloud Computing  basics - an overview.pptxCloud Computing  basics - an overview.pptx
Cloud Computing basics - an overview.pptx
Puneet Kumar Bhatia (MBA, ITIL V3 Certified)
?
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
LA_IBM_Cloud_Event
?
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Cyrus Sorab
?
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologies
sveldanda
?
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
?
The Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid CloudThe Trouble with Saas and Hybrid Cloud
The Trouble with Saas and Hybrid Cloud
Novosco
?
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
?
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
?
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
?
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
Ben Kepes
?
Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virg¨ªlio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
EuroCloud
?
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
Rahul Parmar
?
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
kavinalli
?
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
Rahul Parmar
?
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
LA_IBM_Cloud_Event
?
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Cyrus Sorab
?
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologies
sveldanda
?

Recently uploaded (20)

Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly MeetupLeadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
GDG Kathmandu
?
Benefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle CloudBenefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle Cloud
AstuteBusiness
?
How Telemedicine App Development is Revolutionizing Virtual Care.pptx
How Telemedicine App Development is Revolutionizing Virtual Care.pptxHow Telemedicine App Development is Revolutionizing Virtual Care.pptx
How Telemedicine App Development is Revolutionizing Virtual Care.pptx
Dash Technologies Inc
?
Commit Conf 2025 Bitnami Charts with Kubescape
Commit Conf 2025 Bitnami Charts with KubescapeCommit Conf 2025 Bitnami Charts with Kubescape
Commit Conf 2025 Bitnami Charts with Kubescape
Alfredo Garc¨ªa Lavilla
?
Least Privilege AWS IAM Role Permissions
Least Privilege AWS IAM Role PermissionsLeast Privilege AWS IAM Role Permissions
Least Privilege AWS IAM Role Permissions
Chris Wahl
?
A General introduction to Ad ranking algorithms
A General introduction to Ad ranking algorithmsA General introduction to Ad ranking algorithms
A General introduction to Ad ranking algorithms
Buhwan Jeong
?
APAC Solutions Challenge Info Session.pdf
APAC Solutions Challenge Info Session.pdfAPAC Solutions Challenge Info Session.pdf
APAC Solutions Challenge Info Session.pdf
GDG on Campus Monash
?
Packaging your App for AppExchange ¨C Managed Vs Unmanaged.pptx
Packaging your App for AppExchange ¨C Managed Vs Unmanaged.pptxPackaging your App for AppExchange ¨C Managed Vs Unmanaged.pptx
Packaging your App for AppExchange ¨C Managed Vs Unmanaged.pptx
mohayyudin7826
?
202408_JAWSPANKRATION_Introduction_of_Minaden.pdf
202408_JAWSPANKRATION_Introduction_of_Minaden.pdf202408_JAWSPANKRATION_Introduction_of_Minaden.pdf
202408_JAWSPANKRATION_Introduction_of_Minaden.pdf
NTTDOCOMO-ServiceInnovation
?
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMARSTRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
Sarathkumar Narsupalli
?
AI in Talent Acquisition: Boosting Hiring
AI in Talent Acquisition: Boosting HiringAI in Talent Acquisition: Boosting Hiring
AI in Talent Acquisition: Boosting Hiring
Beyond Chiefs
?
The Road to SAP S4HANA Cloud with SAP Activate.pptx
The Road to SAP S4HANA Cloud with SAP Activate.pptxThe Road to SAP S4HANA Cloud with SAP Activate.pptx
The Road to SAP S4HANA Cloud with SAP Activate.pptx
zsbaranyai
?
CIOs Speak Out - A Research Series by Jasper Colin
CIOs Speak Out - A Research Series by Jasper ColinCIOs Speak Out - A Research Series by Jasper Colin
CIOs Speak Out - A Research Series by Jasper Colin
Jasper Colin
?
Columbia Weather Systems - Product Overview
Columbia Weather Systems - Product OverviewColumbia Weather Systems - Product Overview
Columbia Weather Systems - Product Overview
Columbia Weather Systems
?
Smarter RAG Pipelines: Scaling Search with Milvus and Feast
Smarter RAG Pipelines: Scaling Search with Milvus and FeastSmarter RAG Pipelines: Scaling Search with Milvus and Feast
Smarter RAG Pipelines: Scaling Search with Milvus and Feast
Zilliz
?
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
Ivan Tang
?
State_of_AI_Transformation in Germany.pdf
State_of_AI_Transformation in Germany.pdfState_of_AI_Transformation in Germany.pdf
State_of_AI_Transformation in Germany.pdf
VaradRajanKrishna
?
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-WorldAll-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
Safe Software
?
Network_Packet_Brokers_Presentation.pptx
Network_Packet_Brokers_Presentation.pptxNetwork_Packet_Brokers_Presentation.pptx
Network_Packet_Brokers_Presentation.pptx
Khushi Communications
?
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥ÈDragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
CRI Japan, Inc.
?
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly MeetupLeadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
GDG Kathmandu
?
Benefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle CloudBenefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle Cloud
AstuteBusiness
?
How Telemedicine App Development is Revolutionizing Virtual Care.pptx
How Telemedicine App Development is Revolutionizing Virtual Care.pptxHow Telemedicine App Development is Revolutionizing Virtual Care.pptx
How Telemedicine App Development is Revolutionizing Virtual Care.pptx
Dash Technologies Inc
?
Least Privilege AWS IAM Role Permissions
Least Privilege AWS IAM Role PermissionsLeast Privilege AWS IAM Role Permissions
Least Privilege AWS IAM Role Permissions
Chris Wahl
?
A General introduction to Ad ranking algorithms
A General introduction to Ad ranking algorithmsA General introduction to Ad ranking algorithms
A General introduction to Ad ranking algorithms
Buhwan Jeong
?
APAC Solutions Challenge Info Session.pdf
APAC Solutions Challenge Info Session.pdfAPAC Solutions Challenge Info Session.pdf
APAC Solutions Challenge Info Session.pdf
GDG on Campus Monash
?
Packaging your App for AppExchange ¨C Managed Vs Unmanaged.pptx
Packaging your App for AppExchange ¨C Managed Vs Unmanaged.pptxPackaging your App for AppExchange ¨C Managed Vs Unmanaged.pptx
Packaging your App for AppExchange ¨C Managed Vs Unmanaged.pptx
mohayyudin7826
?
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMARSTRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
Sarathkumar Narsupalli
?
AI in Talent Acquisition: Boosting Hiring
AI in Talent Acquisition: Boosting HiringAI in Talent Acquisition: Boosting Hiring
AI in Talent Acquisition: Boosting Hiring
Beyond Chiefs
?
The Road to SAP S4HANA Cloud with SAP Activate.pptx
The Road to SAP S4HANA Cloud with SAP Activate.pptxThe Road to SAP S4HANA Cloud with SAP Activate.pptx
The Road to SAP S4HANA Cloud with SAP Activate.pptx
zsbaranyai
?
CIOs Speak Out - A Research Series by Jasper Colin
CIOs Speak Out - A Research Series by Jasper ColinCIOs Speak Out - A Research Series by Jasper Colin
CIOs Speak Out - A Research Series by Jasper Colin
Jasper Colin
?
Smarter RAG Pipelines: Scaling Search with Milvus and Feast
Smarter RAG Pipelines: Scaling Search with Milvus and FeastSmarter RAG Pipelines: Scaling Search with Milvus and Feast
Smarter RAG Pipelines: Scaling Search with Milvus and Feast
Zilliz
?
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
Ivan Tang
?
State_of_AI_Transformation in Germany.pdf
State_of_AI_Transformation in Germany.pdfState_of_AI_Transformation in Germany.pdf
State_of_AI_Transformation in Germany.pdf
VaradRajanKrishna
?
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-WorldAll-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
Safe Software
?
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥ÈDragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
CRI Japan, Inc.
?

Predicting The Future: Security and Compliance in the Cloud Age

  • 1. Predicting the Future: Security and Compliance in the Cloud Age
  • 2. IntroductionMisha Govshteyn ¨C CTO, Alert LogicWork in security and web-scale architecture; operate high performance LAMP environment and Erlang-based compute gridHelp hosting/cloud service providers deliver security servicesSecure Cloud Review blog -> http://www.securecloudreview.com/ What we do at Alert Logic
  • 3. About this sessionObjective:Help you make security & compliance decisions that prepare your company for the futureThis presentation addresses a broad trend of consuming IT as a serviceCloud in this context includes IaaSPaaSSaaSWhy take such a broad view? Because each of these models has potential to significantly alter the way you protect your most critical assets
  • 4. Putting 2010 questions in perspectiveQuestions of today are less important than this fact : IT is increasingly delivered as a serviceYour IT footprint is already changing¡­probably adopting some form of cloud servicesnetwork is already becoming decentralizedSome of your data may already be off-premiseIaaS? PaaS? SaaS?Private vs Public?IT vs Cloud?
  • 5. Formulating a Security Strategy
  • 6. Your Enterprise in 2015platformISVvirtualdesktopsaas????burstprivateHRCRMFinancePOSweb storefrontCloud Enabled FunctionsEnterprise SoftwareEnterprise Platforms
  • 7. Cloud questions today and tomorrow
  • 8. Your enterprise 5 years from nowPerimeter is less important than everMore than 50% of your critical data is offsiteSome in environments you do not controlSome users don¡¯t need your VPN to do their jobs Securing the enterprise will be characterized byContinuous transfer of security responsibility to service providers of all typesApplication/protocol level attacksEven more compliance requirements than today
  • 9. Security trends in next 5 yearsGovernance and compliance efforts will extend to private and public cloud environmentsCloud providers will use security as a differentiatorBecome increasingly more transparentProvide automated attestation and auditing of key controls, including access to logsNative data encryption available & heavily promoted, but sparingly usedMost will offer enterprise-level Security-as-a-Service within 2-3 yearsChanges in security industryIdentity management is likely to become the first cloud sec ¡°killer app¡±Netsec vendors, less strategic to enterprises, will focus on CSPsApplication/protocol security and Data Leak Prevention are likely to become increasingly important due to PCI mandates
  • 10. Cloud impact on network securityMost network security products are unable to deal with complexity of CSP networksBig pipes: CSPs already see speeds well in excess of 50gbpsSmall customers: thousands of customers, some with very little traffic (no native multi-tenancy)Rapid elasticity ¨C changing topology, new IP allocations, new VLANS, more traffic flowsToday¡¯s notions of trusted users, networks and computing resources will need to be re-thoughtCloud Service Providers will begin to control an increasing share of the network, rather than Enterprise ITThe Evolving perimeterTraditional notion of perimeter will change dramatically as data migrates into the cloud
  • 11. Network firewalls will fade in importance as perimeter disappears
  • 12. Network security functions subsumed by service providers
  • 14. Become embedded in CSP and NSP network fabric
  • 18. EndpointsDelivered byCloud Service Providers (CSPs) Network Service Providers (NSPs) Direct to enterprise by pure-play Security SaaS providersterminalsmobile devicesremote userslaptopsEmerging cloud security servicescloudsecurity saassecurity saasIPSVAWebAVIDMLogsVPNMailAppWAF
  • 19. CSP vs Customer responsibilityCustomer /Managed ServiceCloud Service Provider
  • 20. Compliance in the cloudRequires a robust set of enterprise-grade security capabilities and services from CSPsAutomated cloud auditability:Attestation
  • 21. Auditing of key controls
  • 24. X-Factor: the AuditorsPassing a compliance audit in the cloud in next 5 years will require equal parts luck and planningImproving your chancesDistant future: find an auditor that understands and has experience in cloud environmentsToday: help your auditor understand your environmentAPI? CSA? XML? A6? Hadoop? EC2? VPC? XEN?
  • 25. First stepsEngage with your IT security and auditorsBuild a roadmap for dealing with the dissolving perimeter and set realistic goals for your teamUnderstand how Security SaaS fits into your current and future strategyExplore technologies/efforts important to secure cloud adoption: IDM, OWASP, WAF, CSA, A6Choose cloud environments that understand and plan to address your evolving security needs
  • 26. Alert Logichttp://www.alertlogic.com/ Secure Cloud Review Bloghttp://www.securecloudreview.com/Email: misha@alertlogic.comTwitter: @CToMG