SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
10/21/2013

The Future Paradigm Shifts of the Cloud and
Big Data: Security Impacts & New Strategies
We Must Consider
We are living in an age where the velocity of information growth
has reached new speeds, the volume of information that we keep
and use is exploding, and the increasing variety of information
sources is creating a new demand to expand our definition of
security. No longer is it just security in our enterprise, but across
an expanded infrastructure and an ever-expanding collection of
devices. This talk will explore this changing universe, the
emerging paradigms, the impacts on security and suggestions
on how to manage the risk.
Key Takeaways
•A future view of where Cloud Computing and Bid Data are
headed
•How these futures and new paradigm will impact security
•What we need to do to meet the new needs

The Future Paradigm
Shifts of the Cloud
and Big Data:
Security Impacts &
New Strategies We
Must Consider

David Smith
President
dsmith@socialcare.com
linkedin.com/in/davidsmithaustin

1
10/21/2013

 Cyberspace will become orders of

magnitude more complex and confused very
quickly
 Overall this is a very positive development

and will enrich human society
 It will be messy but need not be chaotic!
 Cyber security research and practice are

loosing ground
 VOLUME / VELOCITY / VARIETY Change
everything
 The Internet of Things will Change it all
3

Origin of the term “Cloud Computing”
• “Comes from the early days of the Internet
where we drew the network as a cloud… we
didn’t care where the messages went… the
cloud hid it from us” – Kevin Marks, Google
• First cloud around networking (TCP/IP
abstraction)
• Second cloud around documents (WWW data
abstraction)
• The emerging cloud abstracts infrastructure
complexities of servers, applications, data, and
heterogeneous platforms
– (“muck” as Amazon’s CEO Jeff Bezos calls it)

2
10/21/2013

Industry Trends Leading to Cloud
Computing
A “cloud” is an IT service delivered to users that has:
• A user interface that makes the infrastructure underlying the service transparent to the
user
• Near-zero incremental management costs when additional IT resources are added
• A service management platform
2010
2000
Cloud Computing
1998
Software as a Service
1990
• Next-Generation
Utility Computing
Internet computing
• Network-based
Grid Computing
subscriptions to
• Offering computing
• Next-Generation
applications
• Solving large
resources as a
Data Centers
problems with
metered service
• Gained momentum
parallel computing
in 2001
• Introduced in late
• Made mainstream by
1990s
Globus Alliance

Even as clouds take hold, the IT landscape
is changing rapidly…
Technology is rapidly being
commoditized
Businesses are more
willing and able to shop for
IT services
In-house IT infrastructure is
increasingly seen as
complex and rigid
Unstructured data is the
new gold

© Harvard Business Review

3
10/21/2013

Cloud Computing
'Platform as a service' (PaaS) Infrastructure as a Service (IaaS)
Software as a service (SaaS)

 Public Clouds
 Application-centric cloud platforms
 Public clouds reduce corporate IT jobs and spend. CIOs
lead the charge. Private clouds become THE strategic
decision for enterprise IT

 Private Clouds
 enterprise owned or leased

 Hybrid cloud
 composition of two or more clouds

 Community cloud
 shared infrastructure for specific community

Copyright, 2010 © HBMG, Inc

A Crisis of Complexity. The Need for Progress
is Clear.

1.5x

Explosion of information
driving 54% growth in
storage shipments
every year.

70¢ per $1
70% on average is spent
on maintaining current IT
infrastructures versus
adding new capabilities.

85% idle
In distributed computing
environments, up to
85% of computing
capacity sits idle.

70%+ Never
recover

Howard Levenson, IBM

Of business never
recover from a major
data disaster.

4
10/21/2013

Users Wait Too Long For New
Servers
Requester

Submit
Request

Requester

Acquire
HW &
SW

Install &
Config.
HW

Install &
Config
SW

Deploy
Server

Three to six months to provision a new server!
Howard Levenson, IBM

From http://geekandpoke.typepad.com

5
10/21/2013

Cloud Computing Delivery Models
Flexible Delivery Models

Public …

Private …

•Access by Service provider 
owned and managed.
•subscription.
•Delivers select set of 
standardized business process, 
application and/or 
infrastructure services on a 
flexible price per use basis.

.…Standardization, capital 
preservation, flexibility and 
time to  deploy  
ORGANIZATION

•Privately owned and 
managed.
•Access limited to client 
and its partner network.
•Drives efficiency, 
standardization and best 
practices while retaining 
greater customization and 
control

Cloud Services 
Cloud Computing 
Model

Hybrid …
•Access to client, partner 
network, and third party 
resources

CULTURE

.… Customization, efficiency, 
availability, resiliency, security 
and privacy 

GOVERNANCE

...service sourcing and service value

Growth of Data

6
10/21/2013

Virtualization for Client Computing
Hosted Virtual Desktops
Architectural equivalent of
the blade PC
Full "thick-client" image,
thin-client delivery model

Application

Application

Application

PC OS

PC OS

PC OS

VMM
Server Hardware

Portable Personalities
• Carry the bubble, not the
hardware
• Portable media, stored on
the network
• Bubbles of various sizes:
some with OS, some without

.

Source: Matthew Gardiner, Computer Associates

7
10/21/2013

Big Data Numbers
How many data in the world?
– 800 Terabytes, 2000
– 160 Exabytes, 2006
– 500 Exabytes(Internet), 2009
– 2.7 Zettabytes, 2012
– 35 Zettabytes by 2020
How many data generated ONE day?
– 7 TB, Twitter

Big data: The next frontier for innovation, competition, and productivity
McKinsey Global Institute 2011

– 10 TB, Facebook

Tapping into the Data
•
•
•
•

Data Storage
Reporting
Analytics
Advanced Analytics
– Computing with big
datasets is a
fundamentally different
challenge than doing “big
compute” over a small
dataset

Utilized data

Unutilized data
that can be
available to
business

8
10/21/2013

Business, Knowledge, and Innovation
Landscape
• Typically 80% of the key knowledge (and value) is held
by 20% of the people – we need to get it to the right
people
• Only 20% of the knowledge in an organization is
typically used (the rest being undiscovered or underutilized)
• 80-90% of the products and services today will be
obsolete in 10 years – companies need to innovate &
invent faster

Copyright 2012@ HBMG Inc.

Computer generated data
 Application server logs (web sites, games)
 Sensor data (weather, water, smart grids)
 Images/videos (traffic, security cameras)

Human generated data
 Twitter “Firehose” (50 mil tweets/day 1,400% growth
per year)
 Blogs/Reviews/Emails/Pictures

Social graphs
 Facebook, linked-in, contacts

Device generated data
– …………..

9
10/21/2013

“Big Data” and it’s close
relatives “Cloud Computing”,
“Social Media” and "Mobile"
are the new frontier of
innovation.

Driven by Advance
Analytics

Big Data and It’s Brothers

Volume
Variety
Velocity
………..

10
10/21/2013

Volume
Volume is increasing at incredible
rates. With more people using
high speed internet connections
than ever, plus these people
becoming more proficient at
creating content and just more
people in general contributing
information are combined forces
that are causing this tremendous
increase in Volume.

Variety
Next in breaking down Big Data into easily
digestible bite-size chunks is the concept of
Variety. Take your personal experience and
think about how much information you create
and contribute in your daily routine. Your
voicemails, your e-mails, your file shares, your
TV viewing habits, your Facebook updates,
your LinkedIn activity, your credit card
transactions, etc.
Whether you consciously think about it or not the
Variety of information you personally create on
a daily basis which is being collected and
analyzed is simply overwhelming.

11
10/21/2013

Velocity
The speed at which data enters organizations these
days is absolutely amazing. With mega internet
bandwidth nearly being common place anymore in
conjunction with the proliferation of mobile devices,
this simply gives people more opportunity than ever
to contribute content to storage systems.

VELOCITY

Worldwide digital content
will double in 18 months,
and every 18 months
thereafter.

IDC

Mobile

Inventory

Emails

Planning

GPS

CRM Data

Demand

The Economist

Speed

Opportunities

Things
Service Calls

In 2005, humankind
created 150 exabytes
of information. In
2011, over 1,200
exabytes was created.

Velocity
Customer

Transactions

Sales Orders

Instant Messages

Tweets

VOLUME

VARIETY
80% of enterprise data
will be unstructured,
spanning traditional and
non traditional sources.

Gartner

12
10/21/2013

But I Believe there are Four V4

Clouds and Crowds
Interactive Cloud

Analytic Cloud

People Cloud

Transactional
systems
Data entry

… + Sensors
(physical & software)

… + Web 2.0

Get and Put

Map Reduce
Parallel DBMS
Stream Processing

… + Collaborative
Structures (e.g.,
Mechanical Turk,
Intelligence
Markets)

Data Model

Records

Numbers, Media

… + Text, Media,
Natural Language

Response
Time

Seconds

Hours/Days

… +Continuous

Data
Acquisition
Computation

The Future Cloud will be a Hybrid of These.
.

13
10/21/2013

As the world gets smarter,
infrastructure demands will grow

Smart
traffic
systems

Smart
Smart oil
food
field
technologies systems

Smart water
management

Smart
supply
chains

Smart
healthcare

Smart retail

Smart
weather

Smart
countries

Smart
energy
grids

Smart
regions

Smart
cities

.

14
10/21/2013

The Threat Landscape Has
Evolved…
CYBERCRIMINALS
FINANCIALLY
MOTIVATED
Ransom
& fraud

DDOS

Defacement

ATA/APT
GRADE

BAD
DATA
STUFF IN
THEFT
GOOD STUFF
MALWARE
OUT

HACKTIVISTS
POLITICALLY
MOTIVATED

NATIONALISTICALLY
MOTIVATED

Public data
leakage

STATESPONSORED
ATTACKERS

Gov’t, enterprise &
infrastructure
targets

29

The Malware Problem –
Overwhelming Odds

1/3

85%

of malware is customized
(no signature available at
time of exploit)

of breaches took weeks
or more to discover (+6%)

of organizations believe
exploits bypassing their
IDS and AV systems

(VzB, 2012)

(VzB, 2012)

(Ponemon)

91%

30

15
10/21/2013

Why is Security Hard?
No system can be 100% secure
– Reality is risk mitigation, not risk avoidance

Difficult to prove good security
– Bad security gets proven for us!

Good security and no security can look the same
– How does one know how secure they are?

Many things to secure
– People, equipment, OS, network, Application Servers,
applications, phones, and databases

Balancing the Business
Usability

Add Devices and Thing to Things
and it gets very BAD

x

Security

Performance

16
10/21/2013

Mobile Devices
Mobile computers:

– Mainly smartphones,
tablets
– Sensors: GPS, camera,
accelerometer, etc.
– Computation: powerful
CPUs (≥ 1 GHz, multicore)
– Communication:
cellular/4G, Wi-Fi, near
field communication
(NFC), etc.

Many connect to cellular
networks: billing
system
Cisco: 7 billion mobile
devices will have been
sold by 2012

Organization

Data Mining as a Threat to
Security
Data mining gives us “facts” that are not obvious to human
analysts of the data
Enables inspection and analysis of huge amounts of data
Possible threats:
– Predict information about classified work from correlation with
unclassified work (e.g. budgets, staffing)
– Detect “hidden” information based on “conspicuous” lack of
information
– Mining “Open Source” data to determine predictive events (e.g.,
Pizza deliveries to the Pentagon)

It isn’t the data we want to protect, but correlations among
data items
Published in Chris Clifton and Don Marks, “Security and Privacy Implications of Data Mining”,
Proceedings of the ACM SIGMOD Workshop on Research Issues in Data Mining and
Knowledge Discovery

17
10/21/2013

Challenges in the 21st century
Safety &
Security

Information
Explosion

Knowledge
Economy
Globalization

Accelerating
Change

International
Partnerships

Complex
Technologies

Finite
Resources

Diverse
Workforce
Life-Long
Learning

Citizen
Engagement

Sustainable
Development

Mega Trends to Consider…
•

Digitization of all content (listening = getting!)

•

Distribution is the default (just having a network
won’t be enough)

•

Virtualization (location matters less and less)

•

Niche-ization of content & lifestyles

•

Mass-Personalization of media will become
standard

•

Democratization of creation, & peer production

•

Amateurization of the entire value chain (but
NOT to the detriment of experts)

•

“Godzilla-zation” of users/consumers

18
10/21/2013

Growth at the Edge of the Network
4,000

Petabytes/Day Global

3,500

• Mobile
• Device to Device
• Sensors
• Entertainment
• Smart Home
• Distributed Industrial
• Autos/Trucks
• Smart Toys

3,000
2,500
2,000
1,500

Converged
Content

1,000
500

Traditional
Computation

0
2003

2004

2005

2006

2007

2008

2009

2010

2011

2012

Year

19
10/21/2013

Internet of Things
• a system . . . that would be able to
instantaneously identify any kind of object.
• network of objects . .
• one major next step in this development of the
Internet, which is is to progressively evolve
from a network of interconnected computers to
a network of interconnected objects …
• from communicating people (Internet)
... to communicating items …
• from human triggered communication …
•
... to event triggered communication

20
10/21/2013

Tomorrow’s ubiquitous world of
tags, sensors and smart systems

21
10/21/2013

Sensor Data Volume

How do we handle all this data?
“Rebalancing Collection & PED may be Necessary”

The “Fat Pipe”

22
10/21/2013

Data

Desktop

AMP: Algorithms, Machines, People

Adaptive/Active
Machine Learning
and Analytics

Massive
and
Diverse
Data

CrowdSourcing

Cloud Computing

23
10/21/2013

Characteristics of Agents
Agents dynamically adapt
to and learn about
their environment

Intelligent
Agents

Adaptive

Autonomous

Agents are goal directed
and act on their
own performing
tasks on your behalf

Agents coordinate
and negotiate to achieve
common goals

Cooperative

Mobile

Agents move
to where they
are needed

Social
Personality

Information
Agents

Interoperate

Agents interoperate
with humans, other,
legacy systems, and
information sources

.

24
10/21/2013

Embeddedness

The Invisible Computer
EmbeddednessDigital convergence
technologies will “form the invisible technical
infrastructure for human actionanalogous to the
visible infrastructure provided by buildings and
cities.”
Embeddedness is driven by cost-effective computing,
Moore’s Law, miniaturization, ubiquitous
communication, and advanced materials and sensing
devices.
In 2000, 98% of computing devices sold are embedded
in products and are not apparent to the product’s
user.

SOA Reference Architecture
Channel

Web Applications

Portals / Websites
ASP JSP HTML

CSS Voice/XML

User Interface
User
Interactions
Business Process
Messaging

Service Mediation, Routing, Logging, Auditing

Management

Identity Policy Enforcement

“Service Registry”

Network

Voice
IVR

IPhone

Service Transformations

“Enterprise
Service Bus”

Platform

Browsers
Cell Phone

Orchestrated Web Services
Service Discovery

Service
Management

Web
Services

PDA

Authentication

Single Sign-On
Atomic

Composite
Data Access

Federated

Mainframe UNIX Windows .NET Java J2EE COBOL CICS
Firewalls Routers XML Accelerators Proxy Servers TCP/IP

Business
Logic/Rules
System
Administration
Network
Administration

Security, Operations, & Governance

Access Points

PC

Policy, Process, Monitoring, Reporting, Usage Tracking

Users

50

25
10/21/2013

Emerging Technology Sequence
Emerging
Technology
Vectors
Cellular
Array

Defect
Tolerant

Biologically
Inspired

1-D
Structures

Resonant
Tunneling

Floating
Body DRAM

Nano
FG

UTB Single
Gate FET

Source/Drain
Engineered FET

SET

Quantum
Computing

Molecular

Insulator
SET Resistance
Change

QCA

Molecular

UTB Multiple
Gate FET

Biological
Based

Architecture

Spin
Transistor

Logic

Quantum

Quasi
Ballistic FET

DNA Memory

Hybrid Non-Classical
CMOS
Risk

Source: Technology Futures, Inc.

Risk Management And Needed
Security
Unacceptable Risk
Impact to business

Business defines impact

High

Low

Risk management
drives risk to an
acceptable level

Acceptable Risk
Probability of exploit

High

Security engineering defines probability

26
10/21/2013

Cyber Security is all about tradeoffs

Productivity

Security

Let’s build it
Cash out the benefits
Next generation can secure it

Let’s not build it
Let’s bake in super-security to
make it unusable/unaffordable
Let’s sell unproven solutions

There is a middle ground
We don’t know how to predictably find it

53

Exposures
1. Increased Dependency on Complex Technologies
and Business Processes
2. Steep Decline of Barriers to Trade
3. Speed of Transactions
4. The Death of Distance
5. The Adoption of Advanced Communications
6. Consolidation/Transformation of Traditional
Industries
7. The Internet and the Abundance of Information
8. Infrastructure
9. Overcommitted Agencies
10. Changing Social Constructs
11. The Device to Device Computing Growth

27
10/21/2013

Top 5 Most Appreciated Technologies
Microwave Oven
Universal Remote Control
Garage Door Opener
Telephone Answering Machine (For Home)
Ear Thermometer

77.3%
66.6%
64.6%
61.7%
59.5%

28
10/21/2013

Big Data
“85% of eBay’s analytic workload is new and
unknown. We are architected for the
unknown.”
Oliver Ratzesberger, eBay
Data exploration – data as the new oil





The exploration for data, rather than the exploration of data
Uncovering pockets of untapped data
Processing the whole data set, without sampling
eBay’s Singularity platform combines transactional data
with behavioral data, enabled identification of top sellers,
driving increased revenue from those sellers
57

29
10/21/2013

 Cyberspace will become orders of

magnitude more complex and confused very
quickly
 Overall this is a very positive development

and will enrich human society
 It will be messy but need not be chaotic!
 Cyber security research and practice are

loosing ground
 VOLUME / VELOCITY / VARIETY Change
everything
 The Internet of Things will Change it all
59

In Parting: Be Paranoid
“Sooner or later, something
fundamental in your business
world will change.”
 Andrew S. Grove, Founder, Intel
“Only the Paranoid Survive”

30

Contenu connexe

Tendances

Big Data & the Cloud
Big Data & the CloudBig Data & the Cloud
Big Data & the CloudDATAVERSITY
 
Building Your Data Hub to Support Digital
Building Your Data Hub to Support DigitalBuilding Your Data Hub to Support Digital
Building Your Data Hub to Support DigitalDenodo
 
Computer Applications and Systems - Workshop V
Computer Applications and Systems - Workshop VComputer Applications and Systems - Workshop V
Computer Applications and Systems - Workshop VRaji Gogulapati
 
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Stijn (Stan) Christiaens
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
 
Data Integration, Interoperability and Virtualization
Data Integration, Interoperability and VirtualizationData Integration, Interoperability and Virtualization
Data Integration, Interoperability and VirtualizationJavier Ramírez
 
Fasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data StewardFasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data StewardJean-Pierre Riehl
 
Usama Fayyad talk at IIT Madras on March 27, 2015: BigData, AllData, Old Dat...
Usama Fayyad talk at IIT Madras on March 27, 2015:  BigData, AllData, Old Dat...Usama Fayyad talk at IIT Madras on March 27, 2015:  BigData, AllData, Old Dat...
Usama Fayyad talk at IIT Madras on March 27, 2015: BigData, AllData, Old Dat...Usama Fayyad
 
Big data's impact on online marketing
Big data's impact on online marketingBig data's impact on online marketing
Big data's impact on online marketingPros Global Inc
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDICitrix
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Cognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsCognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsPietro Leo
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyDenodo
 
Laserfiche Empower 2017 information managementaas
Laserfiche Empower 2017 information managementaasLaserfiche Empower 2017 information managementaas
Laserfiche Empower 2017 information managementaasChristopher Wynder
 
Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...Christopher Bradley
 
Modern data integration | Diyotta
Modern data integration | Diyotta Modern data integration | Diyotta
Modern data integration | Diyotta diyotta
 
Capitalize On Social Media With Big Data Analytics
Capitalize On Social Media With Big Data AnalyticsCapitalize On Social Media With Big Data Analytics
Capitalize On Social Media With Big Data AnalyticsHassan Keshavarz
 
Matt McIlwain opening keynote
Matt McIlwain opening keynoteMatt McIlwain opening keynote
Matt McIlwain opening keynoteSeattleSIM
 
Data-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceData-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceDATAVERSITY
 

Tendances (20)

Big Data & the Cloud
Big Data & the CloudBig Data & the Cloud
Big Data & the Cloud
 
Building Your Data Hub to Support Digital
Building Your Data Hub to Support DigitalBuilding Your Data Hub to Support Digital
Building Your Data Hub to Support Digital
 
Computer Applications and Systems - Workshop V
Computer Applications and Systems - Workshop VComputer Applications and Systems - Workshop V
Computer Applications and Systems - Workshop V
 
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless Experience
 
Data Integration, Interoperability and Virtualization
Data Integration, Interoperability and VirtualizationData Integration, Interoperability and Virtualization
Data Integration, Interoperability and Virtualization
 
Fasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data StewardFasten you seatbelt and listen to the Data Steward
Fasten you seatbelt and listen to the Data Steward
 
Usama Fayyad talk at IIT Madras on March 27, 2015: BigData, AllData, Old Dat...
Usama Fayyad talk at IIT Madras on March 27, 2015:  BigData, AllData, Old Dat...Usama Fayyad talk at IIT Madras on March 27, 2015:  BigData, AllData, Old Dat...
Usama Fayyad talk at IIT Madras on March 27, 2015: BigData, AllData, Old Dat...
 
Big data's impact on online marketing
Big data's impact on online marketingBig data's impact on online marketing
Big data's impact on online marketing
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Cognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analyticsCognitive computing big_data_statistical_analytics
Cognitive computing big_data_statistical_analytics
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
 
Laserfiche Empower 2017 information managementaas
Laserfiche Empower 2017 information managementaasLaserfiche Empower 2017 information managementaas
Laserfiche Empower 2017 information managementaas
 
Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...Information is at the heart of all architecture disciplines & why Conceptual ...
Information is at the heart of all architecture disciplines & why Conceptual ...
 
Modern data integration | Diyotta
Modern data integration | Diyotta Modern data integration | Diyotta
Modern data integration | Diyotta
 
Capitalize On Social Media With Big Data Analytics
Capitalize On Social Media With Big Data AnalyticsCapitalize On Social Media With Big Data Analytics
Capitalize On Social Media With Big Data Analytics
 
Matt McIlwain opening keynote
Matt McIlwain opening keynoteMatt McIlwain opening keynote
Matt McIlwain opening keynote
 
Data-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data GovernanceData-Ed Online: Making the Case for Data Governance
Data-Ed Online: Making the Case for Data Governance
 

Similaire à The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New Strategies We Must Consider

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentationrichszy
 
Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17MJD Management Group
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingBhaktiKarale
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computingtntsa1972
 
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGSECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGIJNSA Journal
 
Security issues associated with big data in cloud computing
Security issues associated with big data in cloud computingSecurity issues associated with big data in cloud computing
Security issues associated with big data in cloud computingIJNSA Journal
 
Ibm Perspective On Cloud Computing
Ibm Perspective On Cloud ComputingIbm Perspective On Cloud Computing
Ibm Perspective On Cloud Computinglambertt
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)Denny Muktar
 
F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityEuroCloud
 
Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliverySoftweb Solutions
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 

Similaire à The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New Strategies We Must Consider (20)

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17
 
Columbia CITI Econonomics of Net 060515 final
Columbia CITI Econonomics of Net 060515 finalColumbia CITI Econonomics of Net 060515 final
Columbia CITI Econonomics of Net 060515 final
 
Columbia citi economics of net 060515 final
Columbia citi economics of net 060515 finalColumbia citi economics of net 060515 final
Columbia citi economics of net 060515 final
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Briefing 47
Briefing 47Briefing 47
Briefing 47
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGSECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
 
Security issues associated with big data in cloud computing
Security issues associated with big data in cloud computingSecurity issues associated with big data in cloud computing
Security issues associated with big data in cloud computing
 
Ibm Perspective On Cloud Computing
Ibm Perspective On Cloud ComputingIbm Perspective On Cloud Computing
Ibm Perspective On Cloud Computing
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
 
F ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiityF ernando sousa ibm_from hype to realiity
F ernando sousa ibm_from hype to realiity
 
Cloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT DeliveryCloud Computing – The Best Form of IT Delivery
Cloud Computing – The Best Form of IT Delivery
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 

Plus de InnoTech

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"InnoTech
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is MaturingInnoTech
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?InnoTech
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostInnoTech
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering StormInnoTech
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the fieldInnoTech
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged InfrastructureInnoTech
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365InnoTech
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studiesInnoTech
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential InnoTech
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?InnoTech
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...InnoTech
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeInnoTech
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacyInnoTech
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumInnoTech
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionInnoTech
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentationInnoTech
 
Using rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranetsUsing rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranetsInnoTech
 

Plus de InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 
Using rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranetsUsing rest to create responsive html 5 share point intranets
Using rest to create responsive html 5 share point intranets
 

Dernier

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Dernier (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New Strategies We Must Consider

  • 1. 10/21/2013 The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New Strategies We Must Consider We are living in an age where the velocity of information growth has reached new speeds, the volume of information that we keep and use is exploding, and the increasing variety of information sources is creating a new demand to expand our definition of security. No longer is it just security in our enterprise, but across an expanded infrastructure and an ever-expanding collection of devices. This talk will explore this changing universe, the emerging paradigms, the impacts on security and suggestions on how to manage the risk. Key Takeaways •A future view of where Cloud Computing and Bid Data are headed •How these futures and new paradigm will impact security •What we need to do to meet the new needs The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New Strategies We Must Consider David Smith President dsmith@socialcare.com linkedin.com/in/davidsmithaustin 1
  • 2. 10/21/2013  Cyberspace will become orders of magnitude more complex and confused very quickly  Overall this is a very positive development and will enrich human society  It will be messy but need not be chaotic!  Cyber security research and practice are loosing ground  VOLUME / VELOCITY / VARIETY Change everything  The Internet of Things will Change it all 3 Origin of the term “Cloud Computing” • “Comes from the early days of the Internet where we drew the network as a cloud… we didn’t care where the messages went… the cloud hid it from us” – Kevin Marks, Google • First cloud around networking (TCP/IP abstraction) • Second cloud around documents (WWW data abstraction) • The emerging cloud abstracts infrastructure complexities of servers, applications, data, and heterogeneous platforms – (“muck” as Amazon’s CEO Jeff Bezos calls it) 2
  • 3. 10/21/2013 Industry Trends Leading to Cloud Computing A “cloud” is an IT service delivered to users that has: • A user interface that makes the infrastructure underlying the service transparent to the user • Near-zero incremental management costs when additional IT resources are added • A service management platform 2010 2000 Cloud Computing 1998 Software as a Service 1990 • Next-Generation Utility Computing Internet computing • Network-based Grid Computing subscriptions to • Offering computing • Next-Generation applications • Solving large resources as a Data Centers problems with metered service • Gained momentum parallel computing in 2001 • Introduced in late • Made mainstream by 1990s Globus Alliance Even as clouds take hold, the IT landscape is changing rapidly… Technology is rapidly being commoditized Businesses are more willing and able to shop for IT services In-house IT infrastructure is increasingly seen as complex and rigid Unstructured data is the new gold © Harvard Business Review 3
  • 4. 10/21/2013 Cloud Computing 'Platform as a service' (PaaS) Infrastructure as a Service (IaaS) Software as a service (SaaS)  Public Clouds  Application-centric cloud platforms  Public clouds reduce corporate IT jobs and spend. CIOs lead the charge. Private clouds become THE strategic decision for enterprise IT  Private Clouds  enterprise owned or leased  Hybrid cloud  composition of two or more clouds  Community cloud  shared infrastructure for specific community Copyright, 2010 © HBMG, Inc A Crisis of Complexity. The Need for Progress is Clear. 1.5x Explosion of information driving 54% growth in storage shipments every year. 70¢ per $1 70% on average is spent on maintaining current IT infrastructures versus adding new capabilities. 85% idle In distributed computing environments, up to 85% of computing capacity sits idle. 70%+ Never recover Howard Levenson, IBM Of business never recover from a major data disaster. 4
  • 5. 10/21/2013 Users Wait Too Long For New Servers Requester Submit Request Requester Acquire HW & SW Install & Config. HW Install & Config SW Deploy Server Three to six months to provision a new server! Howard Levenson, IBM From http://geekandpoke.typepad.com 5
  • 6. 10/21/2013 Cloud Computing Delivery Models Flexible Delivery Models Public … Private … •Access by Service provider  owned and managed. •subscription. •Delivers select set of  standardized business process,  application and/or  infrastructure services on a  flexible price per use basis. .…Standardization, capital  preservation, flexibility and  time to  deploy   ORGANIZATION •Privately owned and  managed. •Access limited to client  and its partner network. •Drives efficiency,  standardization and best  practices while retaining  greater customization and  control Cloud Services  Cloud Computing  Model Hybrid … •Access to client, partner  network, and third party  resources CULTURE .… Customization, efficiency,  availability, resiliency, security  and privacy  GOVERNANCE ...service sourcing and service value Growth of Data 6
  • 7. 10/21/2013 Virtualization for Client Computing Hosted Virtual Desktops Architectural equivalent of the blade PC Full "thick-client" image, thin-client delivery model Application Application Application PC OS PC OS PC OS VMM Server Hardware Portable Personalities • Carry the bubble, not the hardware • Portable media, stored on the network • Bubbles of various sizes: some with OS, some without . Source: Matthew Gardiner, Computer Associates 7
  • 8. 10/21/2013 Big Data Numbers How many data in the world? – 800 Terabytes, 2000 – 160 Exabytes, 2006 – 500 Exabytes(Internet), 2009 – 2.7 Zettabytes, 2012 – 35 Zettabytes by 2020 How many data generated ONE day? – 7 TB, Twitter Big data: The next frontier for innovation, competition, and productivity McKinsey Global Institute 2011 – 10 TB, Facebook Tapping into the Data • • • • Data Storage Reporting Analytics Advanced Analytics – Computing with big datasets is a fundamentally different challenge than doing “big compute” over a small dataset Utilized data Unutilized data that can be available to business 8
  • 9. 10/21/2013 Business, Knowledge, and Innovation Landscape • Typically 80% of the key knowledge (and value) is held by 20% of the people – we need to get it to the right people • Only 20% of the knowledge in an organization is typically used (the rest being undiscovered or underutilized) • 80-90% of the products and services today will be obsolete in 10 years – companies need to innovate & invent faster Copyright 2012@ HBMG Inc. Computer generated data  Application server logs (web sites, games)  Sensor data (weather, water, smart grids)  Images/videos (traffic, security cameras) Human generated data  Twitter “Firehose” (50 mil tweets/day 1,400% growth per year)  Blogs/Reviews/Emails/Pictures Social graphs  Facebook, linked-in, contacts Device generated data – ………….. 9
  • 10. 10/21/2013 “Big Data” and it’s close relatives “Cloud Computing”, “Social Media” and "Mobile" are the new frontier of innovation. Driven by Advance Analytics Big Data and It’s Brothers Volume Variety Velocity ……….. 10
  • 11. 10/21/2013 Volume Volume is increasing at incredible rates. With more people using high speed internet connections than ever, plus these people becoming more proficient at creating content and just more people in general contributing information are combined forces that are causing this tremendous increase in Volume. Variety Next in breaking down Big Data into easily digestible bite-size chunks is the concept of Variety. Take your personal experience and think about how much information you create and contribute in your daily routine. Your voicemails, your e-mails, your file shares, your TV viewing habits, your Facebook updates, your LinkedIn activity, your credit card transactions, etc. Whether you consciously think about it or not the Variety of information you personally create on a daily basis which is being collected and analyzed is simply overwhelming. 11
  • 12. 10/21/2013 Velocity The speed at which data enters organizations these days is absolutely amazing. With mega internet bandwidth nearly being common place anymore in conjunction with the proliferation of mobile devices, this simply gives people more opportunity than ever to contribute content to storage systems. VELOCITY Worldwide digital content will double in 18 months, and every 18 months thereafter. IDC Mobile Inventory Emails Planning GPS CRM Data Demand The Economist Speed Opportunities Things Service Calls In 2005, humankind created 150 exabytes of information. In 2011, over 1,200 exabytes was created. Velocity Customer Transactions Sales Orders Instant Messages Tweets VOLUME VARIETY 80% of enterprise data will be unstructured, spanning traditional and non traditional sources. Gartner 12
  • 13. 10/21/2013 But I Believe there are Four V4 Clouds and Crowds Interactive Cloud Analytic Cloud People Cloud Transactional systems Data entry … + Sensors (physical & software) … + Web 2.0 Get and Put Map Reduce Parallel DBMS Stream Processing … + Collaborative Structures (e.g., Mechanical Turk, Intelligence Markets) Data Model Records Numbers, Media … + Text, Media, Natural Language Response Time Seconds Hours/Days … +Continuous Data Acquisition Computation The Future Cloud will be a Hybrid of These. . 13
  • 14. 10/21/2013 As the world gets smarter, infrastructure demands will grow Smart traffic systems Smart Smart oil food field technologies systems Smart water management Smart supply chains Smart healthcare Smart retail Smart weather Smart countries Smart energy grids Smart regions Smart cities . 14
  • 15. 10/21/2013 The Threat Landscape Has Evolved… CYBERCRIMINALS FINANCIALLY MOTIVATED Ransom & fraud DDOS Defacement ATA/APT GRADE BAD DATA STUFF IN THEFT GOOD STUFF MALWARE OUT HACKTIVISTS POLITICALLY MOTIVATED NATIONALISTICALLY MOTIVATED Public data leakage STATESPONSORED ATTACKERS Gov’t, enterprise & infrastructure targets 29 The Malware Problem – Overwhelming Odds 1/3 85% of malware is customized (no signature available at time of exploit) of breaches took weeks or more to discover (+6%) of organizations believe exploits bypassing their IDS and AV systems (VzB, 2012) (VzB, 2012) (Ponemon) 91% 30 15
  • 16. 10/21/2013 Why is Security Hard? No system can be 100% secure – Reality is risk mitigation, not risk avoidance Difficult to prove good security – Bad security gets proven for us! Good security and no security can look the same – How does one know how secure they are? Many things to secure – People, equipment, OS, network, Application Servers, applications, phones, and databases Balancing the Business Usability Add Devices and Thing to Things and it gets very BAD x Security Performance 16
  • 17. 10/21/2013 Mobile Devices Mobile computers: – Mainly smartphones, tablets – Sensors: GPS, camera, accelerometer, etc. – Computation: powerful CPUs (≥ 1 GHz, multicore) – Communication: cellular/4G, Wi-Fi, near field communication (NFC), etc. Many connect to cellular networks: billing system Cisco: 7 billion mobile devices will have been sold by 2012 Organization Data Mining as a Threat to Security Data mining gives us “facts” that are not obvious to human analysts of the data Enables inspection and analysis of huge amounts of data Possible threats: – Predict information about classified work from correlation with unclassified work (e.g. budgets, staffing) – Detect “hidden” information based on “conspicuous” lack of information – Mining “Open Source” data to determine predictive events (e.g., Pizza deliveries to the Pentagon) It isn’t the data we want to protect, but correlations among data items Published in Chris Clifton and Don Marks, “Security and Privacy Implications of Data Mining”, Proceedings of the ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery 17
  • 18. 10/21/2013 Challenges in the 21st century Safety & Security Information Explosion Knowledge Economy Globalization Accelerating Change International Partnerships Complex Technologies Finite Resources Diverse Workforce Life-Long Learning Citizen Engagement Sustainable Development Mega Trends to Consider… • Digitization of all content (listening = getting!) • Distribution is the default (just having a network won’t be enough) • Virtualization (location matters less and less) • Niche-ization of content & lifestyles • Mass-Personalization of media will become standard • Democratization of creation, & peer production • Amateurization of the entire value chain (but NOT to the detriment of experts) • “Godzilla-zation” of users/consumers 18
  • 19. 10/21/2013 Growth at the Edge of the Network 4,000 Petabytes/Day Global 3,500 • Mobile • Device to Device • Sensors • Entertainment • Smart Home • Distributed Industrial • Autos/Trucks • Smart Toys 3,000 2,500 2,000 1,500 Converged Content 1,000 500 Traditional Computation 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 Year 19
  • 20. 10/21/2013 Internet of Things • a system . . . that would be able to instantaneously identify any kind of object. • network of objects . . • one major next step in this development of the Internet, which is is to progressively evolve from a network of interconnected computers to a network of interconnected objects … • from communicating people (Internet) ... to communicating items … • from human triggered communication … • ... to event triggered communication 20
  • 21. 10/21/2013 Tomorrow’s ubiquitous world of tags, sensors and smart systems 21
  • 22. 10/21/2013 Sensor Data Volume How do we handle all this data? “Rebalancing Collection & PED may be Necessary” The “Fat Pipe” 22
  • 23. 10/21/2013 Data Desktop AMP: Algorithms, Machines, People Adaptive/Active Machine Learning and Analytics Massive and Diverse Data CrowdSourcing Cloud Computing 23
  • 24. 10/21/2013 Characteristics of Agents Agents dynamically adapt to and learn about their environment Intelligent Agents Adaptive Autonomous Agents are goal directed and act on their own performing tasks on your behalf Agents coordinate and negotiate to achieve common goals Cooperative Mobile Agents move to where they are needed Social Personality Information Agents Interoperate Agents interoperate with humans, other, legacy systems, and information sources . 24
  • 25. 10/21/2013 Embeddedness The Invisible Computer EmbeddednessDigital convergence technologies will “form the invisible technical infrastructure for human actionanalogous to the visible infrastructure provided by buildings and cities.” Embeddedness is driven by cost-effective computing, Moore’s Law, miniaturization, ubiquitous communication, and advanced materials and sensing devices. In 2000, 98% of computing devices sold are embedded in products and are not apparent to the product’s user. SOA Reference Architecture Channel Web Applications Portals / Websites ASP JSP HTML CSS Voice/XML User Interface User Interactions Business Process Messaging Service Mediation, Routing, Logging, Auditing Management Identity Policy Enforcement “Service Registry” Network Voice IVR IPhone Service Transformations “Enterprise Service Bus” Platform Browsers Cell Phone Orchestrated Web Services Service Discovery Service Management Web Services PDA Authentication Single Sign-On Atomic Composite Data Access Federated Mainframe UNIX Windows .NET Java J2EE COBOL CICS Firewalls Routers XML Accelerators Proxy Servers TCP/IP Business Logic/Rules System Administration Network Administration Security, Operations, & Governance Access Points PC Policy, Process, Monitoring, Reporting, Usage Tracking Users 50 25
  • 26. 10/21/2013 Emerging Technology Sequence Emerging Technology Vectors Cellular Array Defect Tolerant Biologically Inspired 1-D Structures Resonant Tunneling Floating Body DRAM Nano FG UTB Single Gate FET Source/Drain Engineered FET SET Quantum Computing Molecular Insulator SET Resistance Change QCA Molecular UTB Multiple Gate FET Biological Based Architecture Spin Transistor Logic Quantum Quasi Ballistic FET DNA Memory Hybrid Non-Classical CMOS Risk Source: Technology Futures, Inc. Risk Management And Needed Security Unacceptable Risk Impact to business Business defines impact High Low Risk management drives risk to an acceptable level Acceptable Risk Probability of exploit High Security engineering defines probability 26
  • 27. 10/21/2013 Cyber Security is all about tradeoffs Productivity Security Let’s build it Cash out the benefits Next generation can secure it Let’s not build it Let’s bake in super-security to make it unusable/unaffordable Let’s sell unproven solutions There is a middle ground We don’t know how to predictably find it 53 Exposures 1. Increased Dependency on Complex Technologies and Business Processes 2. Steep Decline of Barriers to Trade 3. Speed of Transactions 4. The Death of Distance 5. The Adoption of Advanced Communications 6. Consolidation/Transformation of Traditional Industries 7. The Internet and the Abundance of Information 8. Infrastructure 9. Overcommitted Agencies 10. Changing Social Constructs 11. The Device to Device Computing Growth 27
  • 28. 10/21/2013 Top 5 Most Appreciated Technologies Microwave Oven Universal Remote Control Garage Door Opener Telephone Answering Machine (For Home) Ear Thermometer 77.3% 66.6% 64.6% 61.7% 59.5% 28
  • 29. 10/21/2013 Big Data “85% of eBay’s analytic workload is new and unknown. We are architected for the unknown.” Oliver Ratzesberger, eBay Data exploration – data as the new oil     The exploration for data, rather than the exploration of data Uncovering pockets of untapped data Processing the whole data set, without sampling eBay’s Singularity platform combines transactional data with behavioral data, enabled identification of top sellers, driving increased revenue from those sellers 57 29
  • 30. 10/21/2013  Cyberspace will become orders of magnitude more complex and confused very quickly  Overall this is a very positive development and will enrich human society  It will be messy but need not be chaotic!  Cyber security research and practice are loosing ground  VOLUME / VELOCITY / VARIETY Change everything  The Internet of Things will Change it all 59 In Parting: Be Paranoid “Sooner or later, something fundamental in your business world will change.”  Andrew S. Grove, Founder, Intel “Only the Paranoid Survive” 30