SlideShare une entreprise Scribd logo
1  sur  26
Trust & Value from Cloud Computing Why you should go for it. ISACA Cloud Computing Task Force Marc Vael, Chairman  5 August 2011 – Virtual Seminar and Tradeshow
Whostartedallthis? “What's interesting [now] is that there is an emergent new model, and you all are here because you are part of that new model. I don't think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call it cloud computing – they should be in a "cloud" somewhere. And that if you have the right kind of browser or the right kind of access, it doesn't matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what have you – or new devices still to be developed – you can get access to the cloud.” Mr. Eric Schmidt, Chairman & CEO Google Search Engine Strategies Conference,9th of August 2006 http://www.google.com/press/podium/ses2006.html  5 August 2011 – Virtual Seminar and Tradeshow
We live in a world today that is quiteradically different from the world that existed just five yearsago. Cloud Computing Task Force Marc Vael, Chairman  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
3 service models  5 August 2011 – Virtual Seminar and Tradeshow
4 deployment models  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing advantages  5 August 2011 – Virtual Seminar and Tradeshow
T R U S T V A L U E Cloud computing advantages Cloud Computing Trust & Value elements Confidentiality Privacy Integrity Availability Compliance Licensing Reliability Monitoring Integration Network centric Lower upfront investments More OPEX than CAPEX On demand Convenience Scalability Better resource pooling/usage Flexibility Business control over IT solutions Centralized data (sort of) Faster implementation Logging & Monitoring Green IT Trust creates the opportunity for Value Value is based on an expectation of Trust  5 August 2011 – Virtual Seminar and Tradeshow
53%
Cloud computing attention topics Keep 15 basic IT outsourcing lessonslearned in mind: Psychological impact IT governance model Integration withinternal IT systems Network connectivity / bandwidth Data location Shared tenancy Lock in withvendor Cloud Service Provider stability, reliabilityandviability Service portability Legal & regulatory compliance aspects (includingLicensing, Contractual arrangements) Information security management (including IAM) Incident response & crisis management Business Continuity Management & Disaster Recovery Planning Data archiving & removal (Right to) Audit (pentest, screening, monitoring,…)  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing ready?  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing auditing ,[object Object]
PO8 Manage quality
PO9 Assess & manage IT risks
AI4 Enableoperation & use
AI5 Procure IT resources
AI6 Manage change
AI7 Install & accredit solutions & changes
DS1 Design & manage service levels

Contenu connexe

Tendances

Sophos network protection 6 sep 17
Sophos network protection 6 sep 17Sophos network protection 6 sep 17
Sophos network protection 6 sep 17Yabibo
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed ServicesThe TNS Group
 
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of ITWhy is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of ITClearSky Data
 
Cloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesCloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesRamneek Kalra
 
Cisco Data Center Fabric
Cisco Data Center FabricCisco Data Center Fabric
Cisco Data Center FabricShashi Kiran
 
Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...HEX64
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAPPT Datacomm Diangraha
 
Head in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceHead in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceDavid Terrar
 
Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0kimwisniewski
 
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...PT Datacomm Diangraha
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Citrix
 
Why edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successWhy edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successClearSky Data
 
Expert predictions for cloud 2018
Expert predictions for cloud 2018Expert predictions for cloud 2018
Expert predictions for cloud 2018ClearSky Data
 
10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for HealthcareNetApp
 
Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesRamneek Kalra
 
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)Tyrone Systems
 
Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010GovCloud Network
 
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
CWIN17 Singapore / Darmadi komo (microsoft)   modern data estateCWIN17 Singapore / Darmadi komo (microsoft)   modern data estate
CWIN17 Singapore / Darmadi komo (microsoft) modern data estateCapgemini
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheNovosco
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions NetApp
 

Tendances (20)

Sophos network protection 6 sep 17
Sophos network protection 6 sep 17Sophos network protection 6 sep 17
Sophos network protection 6 sep 17
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
 
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of ITWhy is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
 
Cloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesCloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all Industries
 
Cisco Data Center Fabric
Cisco Data Center FabricCisco Data Center Fabric
Cisco Data Center Fabric
 
Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAP
 
Head in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceHead in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources Conference
 
Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0
 
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
 
Why edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successWhy edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud success
 
Expert predictions for cloud 2018
Expert predictions for cloud 2018Expert predictions for cloud 2018
Expert predictions for cloud 2018
 
10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare
 
Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging Technologies
 
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
 
Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010
 
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
CWIN17 Singapore / Darmadi komo (microsoft)   modern data estateCWIN17 Singapore / Darmadi komo (microsoft)   modern data estate
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions
 

En vedette

Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerDavid Wallom
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

En vedette (6)

sanju
sanjusanju
sanju
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similaire à Isaca india trust & value from cloud computing (aug 2011) print

IoT Connectivity & IoT Analytics
IoT Connectivity & IoT AnalyticsIoT Connectivity & IoT Analytics
IoT Connectivity & IoT AnalyticsSarah Takforyan
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Finalmdesai005
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopRazorfish
 
The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)Cloudera, Inc.
 
CRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerCRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerKrisValerio
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computingtntsa1972
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy Jason Baker
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan FalconerIDG Romania
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes SenseRightScale
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyVISIHOSTING
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud ComputingArt Upton
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfAmazon Web Services
 
Assembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementAssembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementIBM
 

Similaire à Isaca india trust & value from cloud computing (aug 2011) print (20)

IoT Connectivity & IoT Analytics
IoT Connectivity & IoT AnalyticsIoT Connectivity & IoT Analytics
IoT Connectivity & IoT Analytics
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshop
 
The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)
 
CRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerCRTC Cloud- Scott Sadler
CRTC Cloud- Scott Sadler
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan Falconer
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes Sense
 
Jakarta keynote
Jakarta keynoteJakarta keynote
Jakarta keynote
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud Computing
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
 
Assembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementAssembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud management
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 

Plus de Marc Vael

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as cisoMarc Vael
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersMarc Vael
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationMarc Vael
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?Marc Vael
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controlsMarc Vael
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrimeMarc Vael
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeMarc Vael
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)Marc Vael
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutMarc Vael
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security todayMarc Vael
 

Plus de Marc Vael (20)

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Isaca india trust & value from cloud computing (aug 2011) print

  • 1. Trust & Value from Cloud Computing Why you should go for it. ISACA Cloud Computing Task Force Marc Vael, Chairman 5 August 2011 – Virtual Seminar and Tradeshow
  • 2. Whostartedallthis? “What's interesting [now] is that there is an emergent new model, and you all are here because you are part of that new model. I don't think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call it cloud computing – they should be in a "cloud" somewhere. And that if you have the right kind of browser or the right kind of access, it doesn't matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what have you – or new devices still to be developed – you can get access to the cloud.” Mr. Eric Schmidt, Chairman & CEO Google Search Engine Strategies Conference,9th of August 2006 http://www.google.com/press/podium/ses2006.html 5 August 2011 – Virtual Seminar and Tradeshow
  • 3. We live in a world today that is quiteradically different from the world that existed just five yearsago. Cloud Computing Task Force Marc Vael, Chairman 5 August 2011 – Virtual Seminar and Tradeshow
  • 4. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 5. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 6. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 7. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 8. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 9. 3 service models 5 August 2011 – Virtual Seminar and Tradeshow
  • 10. 4 deployment models 5 August 2011 – Virtual Seminar and Tradeshow
  • 11. Cloud computing advantages 5 August 2011 – Virtual Seminar and Tradeshow
  • 12. T R U S T V A L U E Cloud computing advantages Cloud Computing Trust & Value elements Confidentiality Privacy Integrity Availability Compliance Licensing Reliability Monitoring Integration Network centric Lower upfront investments More OPEX than CAPEX On demand Convenience Scalability Better resource pooling/usage Flexibility Business control over IT solutions Centralized data (sort of) Faster implementation Logging & Monitoring Green IT Trust creates the opportunity for Value Value is based on an expectation of Trust 5 August 2011 – Virtual Seminar and Tradeshow
  • 13. 53%
  • 14.
  • 15.
  • 16. Cloud computing attention topics Keep 15 basic IT outsourcing lessonslearned in mind: Psychological impact IT governance model Integration withinternal IT systems Network connectivity / bandwidth Data location Shared tenancy Lock in withvendor Cloud Service Provider stability, reliabilityandviability Service portability Legal & regulatory compliance aspects (includingLicensing, Contractual arrangements) Information security management (including IAM) Incident response & crisis management Business Continuity Management & Disaster Recovery Planning Data archiving & removal (Right to) Audit (pentest, screening, monitoring,…) 5 August 2011 – Virtual Seminar and Tradeshow
  • 17. Cloud computing ready? 5 August 2011 – Virtual Seminar and Tradeshow
  • 18.
  • 19.
  • 21. PO9 Assess & manage IT risks
  • 23. AI5 Procure IT resources
  • 25. AI7 Install & accredit solutions & changes
  • 26. DS1 Design & manage service levels
  • 30. ME2 Monitor & evaluateinternal control
  • 31. ME3 Ensure compliance withexternalrequirements 5 August 2011 – Virtual Seminar and Tradeshow
  • 32.
  • 33.
  • 34. Your cloud computing solution is as strong … … as its weakest link
  • 35. Contact information Marc VaelCISA, CISM, CISSP, CGEIT, ITIL Service Manager, Prince2 Chairman ISACA Cloud Computing Task Force ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows IL 60008 USA http://www.isaca.org/cloud marc@vael.net http://www.linkedin.com/in/marcvael http://twitter.com/marcvael 5 August 2011 – Virtual Seminar and Tradeshow
  • 36. THANK YOU FOR YOUR ATTENTION
  • 37. Cloud computing websites www.cloudsecurityalliance.org/ www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment csrc.nist.gov/groups/SNS/cloud-computing/ opencloudconsortium.org/ www.opencloudmanifesto.org/ www.cloud-standards.org/wiki/ en.wikipedia.org/wiki/Cloud_computing searchcloudcomputing.techtarget.com/ cloudcomputing.sys-con.com/ cloudsecurity.org/ www.cloudaudit.org/ www.isaca.org/cloudcomputingresources 5 August 2011 – Virtual Seminar and Tradeshow
  • 38. Cloud computing publications Executive’s Guide to Cloud Computing,Eric Marks-Bob Lozano, 304 pages, May 2010 Enterprise Cloud Computing: A Strategy Guide for Business and Technology Leaders, Andy Mulholland-Jon Pyke-Peter Fingar, 260 pages, April 2010 Cloud Computing: technologies & strategies of the ubiquitous data center, Curtis Franklin & Brian Chee, 288 pages, February 2010 Above the Clouds: managing risk in the world of cloud computing, Kevin Mcdonald, February 2010 Cloud Computing for dummies, Judith Hurwitz-Robin Bloor-Marcia Kaufman, 310 pages, November 2009 Cloud Security,Ronald Krutz Russell Dean Vines, 384 pages, July 2010 Management strategies for the Cloud Revolution,Charles Babcock, 272 pages, June 2010 5 August 2011 – Virtual Seminar and Tradeshow