SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
S’identifier
S’inscrire
Global Mandate to Secure Cloud Computing
Signaler
CloudSecurityAllianceAustralia
Suivre
28 May 2014
•
0 j'aime
•
933 vues
1
sur
32
Global Mandate to Secure Cloud Computing
28 May 2014
•
0 j'aime
•
933 vues
Télécharger maintenant
Télécharger pour lire hors ligne
Signaler
Technologie
Business
Cloud Security Alliance presentation
CloudSecurityAllianceAustralia
Suivre
Recommandé
Why CSA Australia
CloudSecurityAllianceAustralia
361 vues
•
23 diapositives
CSA Introduction 2013 David Ross
Graeme Wood
799 vues
•
36 diapositives
CSA Standards Development Summary
CloudSecurityAllianceAustralia
588 vues
•
9 diapositives
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
112 vues
•
13 diapositives
How to Keep your Atlassian Cloud Secure
Cprime
147 vues
•
38 diapositives
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
535 vues
•
142 diapositives
Contenu connexe
Tendances
Cloud Security Governance
Shankar Subramaniyan
4.3K vues
•
16 diapositives
Securing Servers in Public and Hybrid Clouds
RightScale
940 vues
•
44 diapositives
Webroot - self-defending IoT devices & gateways
IISPEastMids
813 vues
•
12 diapositives
63 Requirements for CASB
Kyle Watson
3K vues
•
7 diapositives
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
94 vues
•
8 diapositives
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn
91 vues
•
23 diapositives
Tendances
(20)
Cloud Security Governance
Shankar Subramaniyan
•
4.3K vues
Securing Servers in Public and Hybrid Clouds
RightScale
•
940 vues
Webroot - self-defending IoT devices & gateways
IISPEastMids
•
813 vues
63 Requirements for CASB
Kyle Watson
•
3K vues
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
•
94 vues
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn
•
91 vues
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
•
1.1K vues
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
•
3.4K vues
4.5.cloud security
DrRajapraveenkN
•
35 vues
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
•
204 vues
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
•
177 vues
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
•
650 vues
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
•
3.7K vues
Workshop on CASB Part 2
Priyanka Aash
•
2.5K vues
CSA & GRC Stack
CloudSecurityAllianceAustralia
•
1.3K vues
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
•
183 vues
Cloud Security Demystified
Michael Torres
•
958 vues
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
•
3.4K vues
Best practices for automating cloud security processes with Evident.io and AWS
Amazon Web Services
•
578 vues
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
•
1.6K vues
Similaire à Global Mandate to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
754 vues
•
36 diapositives
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
622 vues
•
45 diapositives
Csa summit argentina-reavis
CSA Argentina
1.1K vues
•
27 diapositives
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
2.9K vues
•
41 diapositives
2014 2nd me cloud conference trust in the cloud v01
promediakw
646 vues
•
21 diapositives
Keys to success and security in the cloud
Scalar Decisions
909 vues
•
42 diapositives
Similaire à Global Mandate to Secure Cloud Computing
(20)
Global Efforts to Secure Cloud Computing
InnoTech
•
754 vues
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
•
622 vues
Csa summit argentina-reavis
CSA Argentina
•
1.1K vues
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
•
2.9K vues
2014 2nd me cloud conference trust in the cloud v01
promediakw
•
646 vues
Keys to success and security in the cloud
Scalar Decisions
•
909 vues
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
•
213 vues
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
•
535 vues
EveryCloud_Company_Intro_Piece
Paul Richards
•
85 vues
EveryCloud_Company_Intro_Piece
Keith Purves
•
177 vues
Zero trust strategy: cloud security by design
accenture
•
645 vues
Security: Enabling the Journey to the Cloud
Capgemini
•
1.9K vues
3245224.ppt
ahmad21315
•
7 vues
Scot-Cloud 2015
Ray Bugg
•
612 vues
Cloud Security By Dr. Anton Ravindran
GSTF
•
110 vues
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Mark Silverberg
•
4.6K vues
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Novosco
•
73 vues
Hogan Kusnadi - Cloud Computing Secutity
Indonesia Honeynet Chapter
•
816 vues
C-Level tools for Cloud strategy decisions
Cloud Security Alliance, UK chapter
•
325 vues
C-Level tools for Cloud security
Vladimir Jirasek
•
826 vues
Dernier
ContainerDays Hamburg 2023 — Cilium Workshop.pdf
Raphaël PINSON
58 vues
•
66 diapositives
Netwitness RT - Don’t scratch that patch.pptx
Stefano Maccaglia
72 vues
•
24 diapositives
Accelerating Data Science through Feature Platform, Transformers, and GenAI
FeatureByte
117 vues
•
46 diapositives
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
ThousandEyes
78 vues
•
26 diapositives
CoinEZ_whitepaper.pdf
KentaAratani
19 vues
•
31 diapositives
Smart Contracts - The Blockchain Beyond Bitcoin
Jim McKeeth
30 vues
•
37 diapositives
Dernier
(20)
ContainerDays Hamburg 2023 — Cilium Workshop.pdf
Raphaël PINSON
•
58 vues
Netwitness RT - Don’t scratch that patch.pptx
Stefano Maccaglia
•
72 vues
Accelerating Data Science through Feature Platform, Transformers, and GenAI
FeatureByte
•
117 vues
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
ThousandEyes
•
78 vues
CoinEZ_whitepaper.pdf
KentaAratani
•
19 vues
Smart Contracts - The Blockchain Beyond Bitcoin
Jim McKeeth
•
30 vues
Inclusivity and AI: opportunity or threat
Alan Dix
•
30 vues
h2 meet pdf test.pdf
JohnLee971654
•
43 vues
Webinar: Discover the Power of SpiraTeam - A Jira Alternative To Revolutioniz...
Inflectra
•
26 vues
ISO Survey 2022: ISO 27001 certificates (ISMS)
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
•
49 vues
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...
CILIP MDG
•
17 vues
AMAZON-RESUME.pdf
RegineRaneses
•
35 vues
The Ultimate Administrator’s Guide to HCL Nomad Web
panagenda
•
39 vues
TaketoFujikawa_KES2023
Matsushita Laboratory
•
112 vues
Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...
Jasper Oosterveld
•
20 vues
Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...
DianaGray10
•
33 vues
The Rise of the Machines: How AI will shape our lives in 2024
Iain Martin
•
39 vues
Die ultimative Anleitung für HCL Nomad Web Administratoren
panagenda
•
48 vues
How to DAO?
Liveplex
•
42 vues
Microsoft Azure New - Sep 2023
Daniel Toomey
•
28 vues
Global Mandate to Secure Cloud Computing
1.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance Ken Low Chairman, Asia Pacific Executive Council Cloud Security Alliance
2.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Cloud One million new mobile devices - each day! Social Networking Digital Natives
3.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance State Sponsored Cyberattacks? Organized Crime? Legal Jurisdiction & Data Sovereignty? Global Security Standards? Privacy Protection for Citizens? Transparency & Visibility from Cloud Providers?
4.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Shift the balance of power to consumers of IT Enable innovation to solve difficult problems of humanity Give the individual the tools to control their digital destiny Do this by creating confidence, trust and transparency in IT systems Security is not overhead, it is the enabler
5.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Transparency & visibility from providers Compatible laws across jurisdictions Data sovereignty Incomplete standards Lack true multi-tenant technologies & architecture Incomplete Identity Mgt implementations Risk Concentration
6.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Shared Responsibility Incident sharing Legal frameworks Human intelligence Agile communities
7.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Global, not-for-profit organization, founded 2009 Geographically divided into Americas, EMEA and APAC regions to meet strategic objectives 200 member driven organization with over 44,000 individual members in 64 chapters worldwide Established with the aim of bringing trust to the cloud Develop a global trusted cloud ecosystem Building best practices and standards for next-gen IT Grounded in an agile philosophy, rapid development of applied research that supports all activities
8.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance 2009 CSA launch at RSA 2009 with Security Guidance for Critical Areas of Focus in Cloud Computing 6,000 members 2010 Launch Certificate of Cloud Security Knowledge (CCSK) 15,000 members 2011 Launch CSA Security, Trust and Assurance Registry (STAR) 27,000 members 2012 Launch CSA Mobile and Big Data research to address emerging needs 42,000 members North America EMEA APAC Latin America 0 5,000 10,000 15,000 20,000 25,000 30,000 35,000 40,000 45,000 Membership Growth
9.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
10.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Corporate HQ is established in Singapore Global CSA Research Centre Global Standards Secretariat CCSK Global Centre of Excellence Secondary hub is established in Hong Kong anchored by CloudCERT APAC Operational Base Both locations also serve as APAC business centre Serving as a regional hub and operations magnet our members Subsequently satellite hubs are established in Thailand, Taiwan and New Zealand
11.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
12.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance CSA research is organized under a framework based on CSA Security Guidance for Critical Area of Focus in Cloud Computing Total of 14 domains organised under 3 key areas of focus – Architecture, Governance and Operational Security
13.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Our research includes fundamental projects needed to define and implement trust within the future of information technology CSA continues to be aggressive in producing critical research, education and tools Sponsorship opportunities Selected research projects in following slides
14.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
15.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance The industry’s first user certification program for secure cloud computing Based on CSA research framework, specifically the Security Guidance for Critical Area of Focus in Cloud Computing Designed to ensure that a broad range of professionals with responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud
16.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance CCSK Basic One day course to enable student to pass CCSK CCSK Plus Two day course includes practical cloud lab work CCSK Train-the-Trainer Three day course including CCSK Plus GRC Stack Training Additional one day course to use GRC Stack components PCI/DSS In the Cloud Additional one day course focusing on achieving PCI compliance in cloud computing http://cloudsecurityalliance.org/education/training/
17.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
18.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance Public visibility into Providers Corporate Governance Supply Chain Information Security Program Policies Impacting Customers Consumer right to know Public will demand better Sunlight is the best disinfectant,” U.S. Supreme Court Justice Louis Brandeis
19.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. The CSA Open Certification Framework is a program for flexible, incremental and multi- layered certification Based on CSA best practices Integrating with popular third-party assessment and attestation statements, initially ISO 27001 & AICPA SSAE16 (SOC2) Pilots in progress, will be released Q3 2013 under the STAR brand
20.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance OPEN CERTIFICATION FRAMEWORK CONTINUOUS ATTESTATION | CERTIFICATION SELF ASSESSMENT TRANSPERANCY ASSURANCE
21.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Clear GRC objectives 3rd Party Assessment Real time, continuous monitoring + + Self Assessment +
22.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance CSA STAR (Security, Trust and Assurance Registry) Public Registry of Cloud Provider self assessments Based on Consensus Assessments Initiative Questionnaire Provider may substitute documented Cloud Controls Matrix compliance Voluntary industry action promoting transparency Security as a market differentiator www.cloudsecurityalliance.org/star STAR – Demand it from your providers!
23.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance 2 Registered (December 2012) 22 Registered (February 2013)
24.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
25.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Industry thought leadership Traditional Monday start to RSA Conference 2011: White House launches Federal Cloud Strategy 2012: Keynote from Former NSA Director Mike McConnell, announce CSA Mobile 2013: DHS Undersecretary for Cybersecurity and Presiding Director of Coca Cola Company, James Robinson III
26.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance One day conferences in conjunction with chapters Engage with local thought leaders Project CSA best practices globally 2013 Regional Summits (so far) 16 in Asia Pacific 4 in Americas 4 in EMEA http://www.csathailand.org
27.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Only multi-track, multi-day conference focused on cloud security Key venue for new research Primarily attended by enterprise end users 2013 CSA Congress Plans CSA Congress APAC, Singapore, May 14-17 CSA Congress EMEA, Europe, September CSA Congress US, Orlando, November http://www.csa-apac.org
28.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
29.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Challenges remain, there will always be insecurity Global collaboration, public & private Innovation can make policy restrictions obsolete Major focus on identity needed The Internet of Things is a ticking bomb Must solve tomorrow’s problems today Transparency must be our guide
30.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Be Pragmatic, Be Agile Follow the law, but do not concede to poor interpretations of the law. Defend the spirit of the law forcefully. More tools available than you think Advocate through procurement Waiting not an option, but don’t forget Strategy Risk Management Cloud-ready Enterprise Architecture Be Educated
31.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance For more information on the Cloud Security Alliance, please contact: Global/Americas Jim Reavis jreavis@cloudsecurityalliance.org EMEA Daniele Catteddu dcatteddu@cloudsecurityalliance.org APAC Aloysius Cheang acheang@cloudsecurityalliance.org
32.
www.cloudsecurityalliance.orgCopyright © 2012
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance