SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
Data Security in the Cloud


Chris Richter, CISSP, CISM, VP Security Services, Savvis
Brian Contos, CISSP, Chief Security Strategist, Imperva
Agenda
1. Background
2. Data Security
   –   Threatscape Evolution
   –   Data:  The New‐new Target
   –   The Industrialization of Hacking
3. The Cloud – a Primer
4. Eight Steps to Securing Data in the Cloud
5. Q&A
Savvis Background
  •   Headquartered in St. Louis, Missouri
  •   FY 2009 Revenue of $874 million
  •   28 Data Centers extending reach to US, Europe and Asia
  •   Tier 1 Internet backbone—ranked #4 globally (more than 20% 
      of the IP traffic traverses our network)*
  • 1.4 million square feet of raised floor space
  • ~2,200 Employees
  • ~2,500 unique Global Enterprise and Government Agencies

  *Source: Renesys Blog, http://www.renesys.com/blog/2009/12/a‐bakers‐dozen‐in‐2009.shtml, December 31, 2009 
Savvis Background
  • Savvis has more than 2,500 unique customers 
    worldwide including:
     – 30 of Fortune’s top 100 companies 
     – 9 of Fortune’s top 15 commercial banks (including all 5 of 
       the top 5)
     – 9 of Fortune’s top 20 telecommunications firms
     – 7 of Fortune’s top 10 software companies 
     – 8 of Fortune’s top 14 securities firms
Who is Imperva?

 •   A Data Security Company
 •   Founded in 2002 by Check Point Founder
 •   Headquartered in Redwood Shores CA
 •   Growing in R&D, Support, Sales/Channel, & PS
 •   Installed in 50+ Countries
 •   5,000+ direct and cloud‐protected customers
      –   3 of the top 5 US banks
      –   3 of the top 5 Telecoms
      –   3 of the top 5 specialty retailers
      –   2 of the top 5 food & drug stores
Imperva Solutions
             ASSESSMENT AND                          REAL‐TIME
               MONITORING                           PROTECTION 


              DATABASE         PCI   PCI
              AUDITING               COMPLIANCE

                                                            WEB APPLICATION 
                                                            SECURITY

              AUTOMATED              ENTERPRISE 
              COMPLIANCE             APPLICATION 
              REPORTING              SECURITY

                                                            DATABASE 
                                                            SECURITY
              DATABASE 
              VULNERABILITY          DATA RISK 
         !    ASSESSMENT             MANAGEMENT
Threatscape Evolution 
Circa 1805
Threatscape Evolution
Late 1960s and Early 1970s
Threatscape Evolution
1988
Threatscape Evolution
2001‐2003
Threatscape Evolution
Recent Activity
Threatscape Evolution
Recent Activity
Threatscape Evolution
Solution Delivery Has Changed

Local Resources ‐ Local Management



Local Resources ‐ Remote Management

                                       Hybrid

Remote Resources ‐ Local Management



Remote Resources ‐ Remote Management
The Good
Changes in How We Work, Communicate & Live

  Information                      Information 
  Digitization                       Sharing
The Bad
Cyber Attacks
The Ugly
We Are Not Prepared
With Great Power Comes Great Responsibility
‐ Stan Lee (Spider‐man )
     Easier access to multiple targets for attackers
     A successful attack can bring down an entire service                  and can 
     impact many
     Risks around financially motivated attacks are amplified                   – i.e. 
     extort many instead of few
     More:   Digitization | Access | Utility | Locations | Value | Complexity




AS
The Industrialization of Hacking: Lay of the Land
The Industrialization of Hacking:  Maturity
                   Hacking is a Profitable Industry
       Roles                       Optimization                  Automation
The Industrialization of Hacking:  Competition
The Industrialization of Hacking: Enhanced ROI




                                    Goods, Services, eGold
                                    Size, Duration, Task
                                    Updates, Support
                                    Templates, Kits
Industrialized Attack Mitigation
Automated Attacks
                   Non‐browser, Non‐
                 human Activity Detected 
                     (Automation)

                   Humans and Bots are 
                       Separated

                 Human Impact:  Minimal
                   Bot Impact:  Failure
Industrialized Attack Mitigation
Adaptive Reputation‐based Defense
       Global Information Feeds




                                            Feeds are Translated 
                                          into Security Policies for
                                             Adaptive Defense



                                   Block
                                   Re‐direct
                                   Multi‐factor Authentication
                                   Challenge‐response ‐ Captcha
Industrialized Attack Mitigation
Virtual Patching Part I
•   Ideally
    – Custom code is immediately fixed by programmers and application is redeployed
    – Patches for 3rd party components are immediately installed
    – Fixes can be applied anywhere at anytime (no freeze period)
    – There are never business operations that get in the way of security; the business case is 
      always clear
•   The above is of course a very romantic and unrealistic view of application 
    development
Industrialized Attack Mitigation
Virtual Patching Part II




XSS                           Application
SQL injection                                        XSS
                           In‐line Protection
Directory Traversal                                  SQL Injection
                                                     Directory 
                      Vulnerability Information In   Traversal
                         Security Controls Out
Five Cloud Value Points for Data Security

  1. Reputation done better
  2. Virtual patching done better
  3. Data‐centric and network‐centric 
     controls unified
  4. Rapid and exacting response 
     procedures
  5. Talent:  data security + network 
     security expertise
“Be Careful Up There!”
The Fear of Cloud Computing:

• “Analysts warn that the cloud is becoming particularly 
  attractive to cyber crooks.”
  – ComputerWeekly

• “Corporate use of cloud services slowed by concerns 
  about data security, reliability.”
  – Computerworld

• “Privacy, security issues darken cloud computing plans.”
  – IDG


• “It is a security nightmare and it can't be handled in 
  traditional ways." 
  – John Chambers, CEO, Cisco
Security Tops Cloud Concerns
Q: Rate the challenges/issues of the ‘cloud’/on‐demand model
    (Scale: 1 = Not at all concerned; 5 = Very concerned)

                                                     Security 87.5%
                                                 Availability 83.3%

                                              Performance 82.9%

  On‐demand paym’t model may cost more 81.0%

              Lack of interoperability standards 80.2%

      Bringing back in‐house may be difficult 79.8%

              Hard to integrate within‐house IT 76.8%

                 Not enough ability to customize 76.0%
                                                                (% responding 3, 4, or 5)


Source: IDC eXchange, New IDC IT Cloud Services Survey: Top Benefits and Challenges, (http://blogs.idc.com/ie/?p=730) December 2009 
What is the Biggest Barrier to Adoption of 
Cloud Services?
                                                               Cost/benefit unclear (23.69%)

                                                               Unknown management headaches (21.89%)

                                                               Lack of security (17.07%)

                                                               Lack of reliability (6.03%)

                                                               No standard way to switch providers (6.43%)

                                                               Limited reference cases (6.02%)

                                                               Disruption to IT org chart/politics (4.22%)

                497 responses                                  Other (13.85%)




Source: Tech Target: Cloud Computing Readership Survey, 2009
Not All Clouds Are The Same
  Multiple models. Multiple vendors. Multiple policies.
     • Each cloud provider takes a different approach to security

     • No official security industry‐standard has been ratified

     • Some cloud providers do not allow vulnerability scanning

     • Some cloud providers are not forthcoming about their 
       security architectures and policies

     • Compliance auditors are wary of the cloud, and are 
       awaiting guidelines on audit testing procedures 
What the Industry is Doing
   Several initiatives are underway
     Cloud Security Alliance
     • A non‐profit organization formed to promote the use of standardized practices for 
       providing security assurance within cloud computing 
     Center for Internet Security
     • A non‐profit enterprise whose mission is to help organizations reduce risk resulting from 
       inadequate technical security controls
     PCI Security Standards Council
     • Has created a special interest group (SIG) to help shape requirements for 
       virtual‐ and cloud‐based cardholder‐data environments
     NIST
     • The National Institute of Standards and Technology has created a new team to determine 
       the best way to provide security for agencies that want to adopt cloud computing. 
     VMware
     • Has issued guidelines for secure VM configurations and hardening.
Cloud Architectures and Models

ESSENTIAL CHARACTERISTICS
                            Broad Network           Rapid              Measured       On‐Demand
                                Access            Elasticity            Service       Self‐Service

                                                        Resource Pooling
ARCHITECTURES


                                Software‐                    Platform‐              Infrastructure‐
                            as‐a‐Service (SaaS)         as‐a‐Service (PaaS)       as‐a‐Service (IaaS)


DEPLOYMENT MODELS



                              Public              Private               Hybrid        Community
Challenges In Bridging Security Requirements 
to the Cloud

      Traditional IT                   Cloud Computing

 • Dedicated Compute,            • Complex, Shared
   Storage & Network               Deployment Models
   Infrastructure
                                 • Data Location Varies
 • Defined Locations for Data
   Storage & Backup              • Security Controls & Policies
 • Proprietary Security            Defined by Service Provider
   Controls & Policies
                                 • Compliance Standards
 • Compliance Standards            Must Be Interpreted
   Designed For Traditional IT
An Eight‐Step Journey To A Secure Cloud


 1    Contemplate Your Application’s Suitability
      For The Cloud


                    ? ? ?            ?
                              ?
     Payment 
                      ERP     Corporate      CRM
       Processing
                                Systems
 Company Web Site    Test &                 e‐Commerce
                       Development
An Eight‐Step Journey To A Secure Cloud


 2   Classify Your Data

     Financial            Healthcare/PHI
     Marketing            EU Citizens
     Customer Records
     Government
     Newsfeeds/Blogs
An Eight‐Step Journey To A Secure Cloud


 3   Determine Cloud Type  (Think about applications)

     Software‐as‐a‐Service (SaaS)

     Infrastructure‐as‐a‐Service (IaaS)

     Platform‐as‐a‐Service (PaaS)
An Eight‐Step Journey To A Secure Cloud


 4   Select a Delivery Model  (Think about data classification)
     Private: • Self‐Managed
                • Outsourced

     Public: • Commodity
                • Enterprise

     Hybrid: • Private + Public
                • Private + Exchange
                • Private + Customer
                • Cloud Bursting
An Eight‐Step Journey To A Secure Cloud


 5   Specify Platform Architecture
                                                        Cloud         Customer       Customer
     Compute                                          Automation
                                                      Application
                                                                     Application    Application

                                                                        VPDC           VPDC
     Storage & Backup         API/System Call


     Network & Routing                                        Cloud OS (ex. IaaS)
                          System Device 
                                Drivers
     Virtualization vs.
     Dedicated                                         Compute       Network        Storage




                                           Security
                                                        Data Center Ethernet 
                                                        Fabric
An Eight‐Step Journey To A Secure Cloud


 6   Specify Security Controls
     Firewall
     Intrusion Detection/Prevention
     Log Management
     Application Protection
     Database Protection
     Identity & Access Management
     Encryption
     Vulnerability Scanning
An Eight‐Step Journey To A Secure Cloud


 7   Determine Policy Requirements
     Policy Creation and Enforcement
     • What are my service provider’s policies? 
      Can I specify my own? How do they handle 
      critical events?  
     Policy “Bursting”
     • If I choose a cloud‐bursting model, will my 
      policies “burst” along with my VMs?
     Policy Migration
     • If I contract for cloud‐based DR, will my 
      polices migrate with my VMs?
An Eight‐Step Journey To A Secure Cloud


 8   Determine Service Provider Requirements
     Delivery‐Model Integration
     Automation
     Scalability
     Monitoring
     SLAs
     Services
     Security Controls
     Stability
     Terms
     Compliance                      
Compliance & Outsourced Cloud‐Computing

   • Will a “compliant service provider”
     make me compliant? 


   • What will most auditors look for?


   • How does making the move 
     to a hosted cloud‐computing 
     environment change the way 
     audits will occur? 
Journey to The Cloud: Key Considerations

               Determine service provider requirements

                    Determine policy requirements

                       Specify security controls

                     Specify platform architecture

                         Select delivery model

                       Determine type of cloud

                             Classify data

        Understand your application’s applicability to the cloud
Reference Sites

www.cloudsecurityalliance.org
www.cloudsecurity.org
www.cisecurity.org
csrc.nist.gov/groups/SNS/cloud‐computing/
www.vmware.com/pdf/vi3_security_hardening_wp.pdf
www.dmtf.org/about/cloud‐incubator
More Information on Savvis
More Information:  Imperva.com


     www.savvis.net
     www.savvis.net/cloudcompute
     blog.savvis.net
More Imperva Information
More Information:  Imperva.com




         Imperva
Questions & Answers

Contenu connexe

Tendances

Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6David Spinks
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsBill Burns
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Brian K. Dickard
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Intel IT Center
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 

Tendances (20)

Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 

En vedette

Frequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against FranchisorsFrequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against FranchisorsCarmen Caruso
 
What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...
What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...
What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...Carmen Caruso
 
Application acceleration from the data storage perspective
Application acceleration from the data storage perspectiveApplication acceleration from the data storage perspective
Application acceleration from the data storage perspectiveInterop
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencingInterop
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practicesInterop
 
Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011Primero Mining Corp.
 
Bridging the c suite gap
Bridging the c suite gapBridging the c suite gap
Bridging the c suite gapInterop
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructureInterop
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standardsInterop
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeInterop
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7Interop
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glassInterop
 
Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloudInterop
 
Cutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practicesCutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practicesInterop
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutionsInterop
 
What virtualization means to the branch office
What virtualization means to the branch officeWhat virtualization means to the branch office
What virtualization means to the branch officeInterop
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit allInterop
 
Evidentiary & Trial Issues in Franchise Cases
Evidentiary & Trial Issues in Franchise CasesEvidentiary & Trial Issues in Franchise Cases
Evidentiary & Trial Issues in Franchise CasesCarmen Caruso
 

En vedette (20)

Frequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against FranchisorsFrequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against Franchisors
 
What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...
What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...
What Lies Beneath: The Franchisee Perspective on Franchise Claims Beyond the ...
 
What Lies Beneath
What Lies BeneathWhat Lies Beneath
What Lies Beneath
 
Application acceleration from the data storage perspective
Application acceleration from the data storage perspectiveApplication acceleration from the data storage perspective
Application acceleration from the data storage perspective
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencing
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
 
Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011
 
Bridging the c suite gap
Bridging the c suite gapBridging the c suite gap
Bridging the c suite gap
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructure
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standards
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally change
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glass
 
Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloud
 
Cutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practicesCutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practices
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
 
What virtualization means to the branch office
What virtualization means to the branch officeWhat virtualization means to the branch office
What virtualization means to the branch office
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit all
 
Evidentiary & Trial Issues in Franchise Cases
Evidentiary & Trial Issues in Franchise CasesEvidentiary & Trial Issues in Franchise Cases
Evidentiary & Trial Issues in Franchise Cases
 

Similaire à Data security in cloud

Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Cloud risk and business continuity v21
Cloud risk and business continuity v21Cloud risk and business continuity v21
Cloud risk and business continuity v21Jorge Sebastiao
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...Amazon Web Services
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdfjames yoo
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 

Similaire à Data security in cloud (20)

Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Cloud risk and business continuity v21
Cloud risk and business continuity v21Cloud risk and business continuity v21
Cloud risk and business continuity v21
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 

Plus de Interop

Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessInterop
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storageInterop
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemInterop
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability managementInterop
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability processInterop
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threatsInterop
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategiesInterop
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environmentInterop
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center networkInterop
 
Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkInterop
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practicesInterop
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performanceInterop
 
Deep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must changeDeep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must changeInterop
 
Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storageInterop
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controlsInterop
 
Cloud tco numbers and lessons
Cloud tco   numbers and lessonsCloud tco   numbers and lessons
Cloud tco numbers and lessonsInterop
 
Choosing a video conferencing
Choosing a video conferencingChoosing a video conferencing
Choosing a video conferencingInterop
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wirelessInterop
 

Plus de Interop (18)

Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wireless
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storage
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problem
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability management
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability process
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threats
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategies
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environment
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area network
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practices
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performance
 
Deep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must changeDeep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must change
 
Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storage
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controls
 
Cloud tco numbers and lessons
Cloud tco   numbers and lessonsCloud tco   numbers and lessons
Cloud tco numbers and lessons
 
Choosing a video conferencing
Choosing a video conferencingChoosing a video conferencing
Choosing a video conferencing
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
 

Dernier

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Dernier (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Data security in cloud