SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Security Benefits of Cloud Computing
Presenter: Eric Jeffery, Solutions Engineer, Vidyo, Inc.
2| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Agenda
• My Background
• Risks and Security Threats
• Status of the Oil & Gas (O&G) Industry
• What is Cloud Computing
• Security Benefits of Cloud Computing
• Moving to “The Cloud”
3| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
My Background
4| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Eric Jeffery Background
• Bachelors Degree in Economics
• >20 Years IT Experience
• Manager at Software Etc.
• IT Contractor
• Systems and Network Administrator
• IT Network Security Analyst
• Network Engineer and Capacity Planning Lead
• Sr. Manager Professional Services
• Solutions Engineer
5| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Risks and Security Threats
6| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Methods that Create Threats and Risks
• In Person Physical Penetration
• Network Intrusion Over the Wire
• Malware, Spyware, Virus, Trojan
• Bots, DoS, DDos
• Phishing
• Pretexting
• IP Spoofing
• Baiting
• Dumpster diving
• Shoulder surfing
TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
7| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Internal Security Threats
Verizon 2015 Data Breach Investigations Report
8| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Status of Oil & Gas Cyber Security
9| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Headlines:
• U.S. Oil and Gas at Greater Risk for Cyber Attacks – June,
2013 – Fox Business
• Russia attacks U.S. oil and gas companies in massive hack
– July, 2014 – CNN Money
• Oil and Gas Industry Preparing for Cyber Attacks –
January, 2015 – iNews
• NatGas, Oil Industry in 'Crosshairs' of Malicious Cyber
Attacks – June, 2015 – Natural Gas Intel Daily
• Oil, Gas firms face cyber attack threats – June, 2014 –
Trade Arabia
10| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
O&G Industry Security Statistices
• Data out of the US show that between April 2013 and 2014, threat
actors hit 53 per cent of energy companies1.
• Cyber attacks are costing the energy sector in the UK some $700
million a year1.
• The Shamoon virus took Saudi Aramco, the world’s largest oil
producing company out of action for almost two weeks1.
• Recent analysis from Frost & Sullivan shows that the security of
critical facilities remains the topmost priority for the global oil and gas
industry. – Security Week, June 2013
• BP’s CEO, Bob Dudley, revealed in 2013 that BP suffered on average
50,000 cyber attacks every day, from both domestic and foreign
offenders.
1 TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
11| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Industry Rankings for Cyber Espionage Attacks
Verizon 2015 Data Breach Investigations Report
12| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Security Threats to O&G Firms
• Internal
• External
• Structured
• Unstructured
Verizon 2015 Data Breach Investigations Report
13| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
O&G Biggest Fear from Cyber Attack(s)
TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
14| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Major O&G Cyber Security Attacks 2010-2014
TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
15| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
What is Cloud Computing?
16| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
What is Cloud Computing?
17| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
XaaS – Anything & Everything “As A Service”
• IaaS – Infrastructure
• PaaS - Platform
• VaaS - Video
• SaaS – Software/Storage
• DRaaS – Disaster Recovery
• DaaS – Desktop
• BaaS – Backup
• EaaS - Email
18| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Security Benefits of Cloud Computing
19| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Top Level Cloud Computing Benefits
• Vetted staff
• Data distribution
• Physical security benefits
• Staffing levels
• Expertise
• Evolving requirements
• Scaling of technical resources
• Legal Considerations
• Experience with forensic analysis
20| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Functional Advantages of Cloud Computing
• Vetted Staff
– Rigorous background screening
– Former military and law enforcement
– 3rd party staff also vetted
• Data Distribution
– Multiple systems, Geographic Disparity
– Threats have no physical access to data
– Increased capability for HA/BC/DR
21| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Functional Advantages of Cloud Computing
• Physical Security
– Redundant power, multiple uplinks
– 24x7 guards, camera’s, logs, badge requirement, escorts, etc.
• Staffing Levels
– Educated with ongoing training
– Extra staff
– Extreme depth of skill
22| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Functional Advantages of Cloud Computing
• Expertise
– Deep Level Experts
– Process Engineering
– Project Management
– Change Management
– Release Management
• Adapt to New Requirements and Regulations
– HIPAA 1996, 2003
– SOX 2002
– SSAE16 (SAS70) 2013/2014
23| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Functional Advantages of Cloud Computing
• Scaling Technical Resources
– Rapid resource deployment
– Ease of upgrade
• Legal Considerations
– Liability Shift?
– Jurisdiction (National/International)
– Data Ownership, Responsibility
• Experience staff dealing with forensic analysis
– Rapidly identify cause/impact of breach
24| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Reasons that Cloud Delivers More Security
• Experience
• Focus
• Staffing
• Up to Date Technology
• Stay current with regulations compliance standards
• Partnerships with largest and best suited vendors in industry
25| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Cloud Computing Risk Mitigation
• Moves the “Honey Pot”
• Reduces physical access risk
• Distributes data physically and logically
• Economies of scale
– Network
– Physical Security Implementations
– Technology
• Ensures proper data destruction
26| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Key Mitigation Methods
: Probable benefits
from Cloud providers
Verizon 2015 Data Breach Investigations Report
27| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Moving to The Cloud
28| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
What to Consider When Moving to the Cloud
• Tenancy: Privacy, Identity, and Access
• Location
• Compliance
• Data Integrity
• Availability
• International Geography Considerations
• Information Protection
• Legal Jurisdiction
29| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Why Move to Cloud Computing?
• Well established
• Multiple layers of security
• Experienced staff
• Energy companies are behind
• Economies of scale
30| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Getting Started
• Understand “Why”
• Validate plan with corporate goals
• Determine which applications are applicable
– Irreplaceable expertise in IT
– Intellectual property
– What’s the budget
– Legal implications
• Find a partner
– Data Center
– Application Management
31| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015
Thank You
Questions or Comments?
Eric Jeffery
Solutions Engineer, Vidyo, Inc.
ejeffery@vidyo.com
719-641-8114
https://www.linkedin.com/in/ericrjeffery

Contenu connexe

Tendances

CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCapgemini
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...TI Safe
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...Nur Shiqim Chok
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Software
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Ishay Tentser
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015Shah Sheikh
 
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
Overload: Critical Lessons from 15 Years of ICS VulnerabilitiesOverload: Critical Lessons from 15 Years of ICS Vulnerabilities
Overload: Critical Lessons from 15 Years of ICS VulnerabilitiesTripwire
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Benjamin Ang
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & CybersecurityDavid Sweigert
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkQuEST Forum
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...MITRE - ATT&CKcon
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceShah Sheikh
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 

Tendances (20)

CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
Neotel
Neotel Neotel
Neotel
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
Overload: Critical Lessons from 15 Years of ICS VulnerabilitiesOverload: Critical Lessons from 15 Years of ICS Vulnerabilities
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
 
Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 

Similaire à EUCI O&G Cloud Security - Eric Jeffery Final

Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Cloud Standards Customer Council
 
Security architecture best practices
Security architecture best practicesSecurity architecture best practices
Security architecture best practicesAspire Systems
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre EuclidesTI Safe
 
Cloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureCloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureProlifics
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startupsKesava Reddy
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?QualiQuali
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...IRJET Journal
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionAronson LLC
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Prabir Saha
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 

Similaire à EUCI O&G Cloud Security - Eric Jeffery Final (20)

Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
Security architecture best practices
Security architecture best practicesSecurity architecture best practices
Security architecture best practices
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides
 
Cloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureCloud Options for a Modern Architecture
Cloud Options for a Modern Architecture
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startups
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 

EUCI O&G Cloud Security - Eric Jeffery Final

  • 1. Security Benefits of Cloud Computing Presenter: Eric Jeffery, Solutions Engineer, Vidyo, Inc.
  • 2. 2| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Agenda • My Background • Risks and Security Threats • Status of the Oil & Gas (O&G) Industry • What is Cloud Computing • Security Benefits of Cloud Computing • Moving to “The Cloud”
  • 3. 3| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 My Background
  • 4. 4| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Eric Jeffery Background • Bachelors Degree in Economics • >20 Years IT Experience • Manager at Software Etc. • IT Contractor • Systems and Network Administrator • IT Network Security Analyst • Network Engineer and Capacity Planning Lead • Sr. Manager Professional Services • Solutions Engineer
  • 5. 5| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Risks and Security Threats
  • 6. 6| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Methods that Create Threats and Risks • In Person Physical Penetration • Network Intrusion Over the Wire • Malware, Spyware, Virus, Trojan • Bots, DoS, DDos • Phishing • Pretexting • IP Spoofing • Baiting • Dumpster diving • Shoulder surfing TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
  • 7. 7| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Internal Security Threats Verizon 2015 Data Breach Investigations Report
  • 8. 8| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Status of Oil & Gas Cyber Security
  • 9. 9| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Headlines: • U.S. Oil and Gas at Greater Risk for Cyber Attacks – June, 2013 – Fox Business • Russia attacks U.S. oil and gas companies in massive hack – July, 2014 – CNN Money • Oil and Gas Industry Preparing for Cyber Attacks – January, 2015 – iNews • NatGas, Oil Industry in 'Crosshairs' of Malicious Cyber Attacks – June, 2015 – Natural Gas Intel Daily • Oil, Gas firms face cyber attack threats – June, 2014 – Trade Arabia
  • 10. 10| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 O&G Industry Security Statistices • Data out of the US show that between April 2013 and 2014, threat actors hit 53 per cent of energy companies1. • Cyber attacks are costing the energy sector in the UK some $700 million a year1. • The Shamoon virus took Saudi Aramco, the world’s largest oil producing company out of action for almost two weeks1. • Recent analysis from Frost & Sullivan shows that the security of critical facilities remains the topmost priority for the global oil and gas industry. – Security Week, June 2013 • BP’s CEO, Bob Dudley, revealed in 2013 that BP suffered on average 50,000 cyber attacks every day, from both domestic and foreign offenders. 1 TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
  • 11. 11| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Industry Rankings for Cyber Espionage Attacks Verizon 2015 Data Breach Investigations Report
  • 12. 12| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Security Threats to O&G Firms • Internal • External • Structured • Unstructured Verizon 2015 Data Breach Investigations Report
  • 13. 13| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 O&G Biggest Fear from Cyber Attack(s) TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
  • 14. 14| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Major O&G Cyber Security Attacks 2010-2014 TIM HAÏDAR | EDITOR IN CHIEF | OIL & GAS IQ | 2015
  • 15. 15| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 What is Cloud Computing?
  • 16. 16| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 What is Cloud Computing?
  • 17. 17| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 XaaS – Anything & Everything “As A Service” • IaaS – Infrastructure • PaaS - Platform • VaaS - Video • SaaS – Software/Storage • DRaaS – Disaster Recovery • DaaS – Desktop • BaaS – Backup • EaaS - Email
  • 18. 18| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Security Benefits of Cloud Computing
  • 19. 19| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Top Level Cloud Computing Benefits • Vetted staff • Data distribution • Physical security benefits • Staffing levels • Expertise • Evolving requirements • Scaling of technical resources • Legal Considerations • Experience with forensic analysis
  • 20. 20| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Functional Advantages of Cloud Computing • Vetted Staff – Rigorous background screening – Former military and law enforcement – 3rd party staff also vetted • Data Distribution – Multiple systems, Geographic Disparity – Threats have no physical access to data – Increased capability for HA/BC/DR
  • 21. 21| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Functional Advantages of Cloud Computing • Physical Security – Redundant power, multiple uplinks – 24x7 guards, camera’s, logs, badge requirement, escorts, etc. • Staffing Levels – Educated with ongoing training – Extra staff – Extreme depth of skill
  • 22. 22| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Functional Advantages of Cloud Computing • Expertise – Deep Level Experts – Process Engineering – Project Management – Change Management – Release Management • Adapt to New Requirements and Regulations – HIPAA 1996, 2003 – SOX 2002 – SSAE16 (SAS70) 2013/2014
  • 23. 23| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Functional Advantages of Cloud Computing • Scaling Technical Resources – Rapid resource deployment – Ease of upgrade • Legal Considerations – Liability Shift? – Jurisdiction (National/International) – Data Ownership, Responsibility • Experience staff dealing with forensic analysis – Rapidly identify cause/impact of breach
  • 24. 24| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Reasons that Cloud Delivers More Security • Experience • Focus • Staffing • Up to Date Technology • Stay current with regulations compliance standards • Partnerships with largest and best suited vendors in industry
  • 25. 25| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Cloud Computing Risk Mitigation • Moves the “Honey Pot” • Reduces physical access risk • Distributes data physically and logically • Economies of scale – Network – Physical Security Implementations – Technology • Ensures proper data destruction
  • 26. 26| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Key Mitigation Methods : Probable benefits from Cloud providers Verizon 2015 Data Breach Investigations Report
  • 27. 27| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Moving to The Cloud
  • 28. 28| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 What to Consider When Moving to the Cloud • Tenancy: Privacy, Identity, and Access • Location • Compliance • Data Integrity • Availability • International Geography Considerations • Information Protection • Legal Jurisdiction
  • 29. 29| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Why Move to Cloud Computing? • Well established • Multiple layers of security • Experienced staff • Energy companies are behind • Economies of scale
  • 30. 30| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Getting Started • Understand “Why” • Validate plan with corporate goals • Determine which applications are applicable – Irreplaceable expertise in IT – Intellectual property – What’s the budget – Legal implications • Find a partner – Data Center – Application Management
  • 31. 31| Vidyo Inc. Proprietary, Confidential & Patent Pending Information |9/1/2015 Thank You Questions or Comments? Eric Jeffery Solutions Engineer, Vidyo, Inc. ejeffery@vidyo.com 719-641-8114 https://www.linkedin.com/in/ericrjeffery