SlideShare une entreprise Scribd logo
1  sur  16
Security
and
Governance
in the Cloud
NHS England’s use of
technology
2016-11-18
Sky News, Wednesday 16th November 2016
A Sky News investigation has discovered the
NHS trusts putting patients at risk by not
protecting their data online.
Seven NHS trusts, serving more than two million
people, spent nothing on cybersecurity in 2015.
Sky News worked with security experts to find
serious flaws in their cybersecurity, which could
be easily exploited by relatively unskilled
hackers.
Hacker House was able to find misconfigured
email servers, outdated software and security
certificates, along with NHS trusts' emails and
passwords, through public searches.
• It’s just security!
• But it is a convenient name
• External services
• Some scalability
• E.g. ESR, NHSmail
• Public vs Private
• Scale up/down
• Micro charging
Definitions
Cyber
cloud
Cloud
• A non-departmental public body, an Arm’s Length Body of
the Department of Health, part of the NHS Constitution
• Improving outcomes for patients, modernising
• Support and allocate resources to CCG’s
• Direct commissioning services
Background to NHS England
• Built on open principles & the premise of minimal patient
data
• Starting up as public Cloud was really taking off
• Considerable cloud use from the start
• “Infrastructure Free”
• Required to adopt existing solutions
• 3,500 people, 33 offices
► 7,000–8,000 people, 51 offices
• Contact Centre
• Highly sensitive information
• 10-12 thousand contacts a month
• Dynamics Online – Ministerial Sign-off
Building a New Organisation
• Cost
• Flexibility, mobility
• Speed to delivery
• Evergreen
Why the Cloud?
• Centralised
• Difficult to
steer
IT
Dictates
• Expensive
to change
• Slow to
change
SI does
the heavy
lifting
• Improve
agility
• Lower
Costs
• Knowledge
gap
Business
Leads
• The Threats
• DDOS
• Ransomware
• Phishing
• Malvertising
• Lots of little attacks accumulate data
• Sensitive data "has" to be in England!, "You
can't offshore", "You can't put that in the cloud!"
• Convincing the naysayers: Asking why,
assessing the actual risk not the assumed risk
• Getting people to own the risk and
management
• Is your (suppliers) datacentre more secure than a global
scale specialist?
Security
• Moving away from centralised compliance to risk
management
• Simplify the message so non-security specialists
understand it
• Greater alignment to commercial offerings
• Security becomes proportional to the risk
• No more “Computer says no”
Agile Security
• The landscape has changed
• Working outside the security boundary
• Shifting boundaries
• Untrusted environments - do you want this?
• Checking the location of Cloud data
• Not everything is where you think it is
• Check where support is located
• Eyes on
• The need to review reports
• Audit, DLP, "Secure Score“
• Security Information & Event Management (SIEM)
• Identity Management & SSO
• Integrated on-prem SSO requires authentication channels
from the Internet (unless using ExpressRoute or VPN)
• Two-Factor Authentication
Security: Some Challenges
• Sort the governance early
• Understand the risks
• Get sign-off early
• Simplify and clarify – data classifications
• Shadow IT is a growing reality – how to deal with it?
• We are actively pushing IT out to the business – but less
strict controls mean more governance required.
Governing the Cloud?
• Many people actually hate change – though they claim they
want it
• Overlapping services are confusing
• Communicate - evangelise – encourage
• Use the language of the business
• The "evergreen" problem
• Apps only supported to n-1
• Ongoing need for comms
• Taking responsibility not just taking "training“
• Lots of short videos are good
• Shifting staff skills
Engagement
• Overlapping services
• Shifting network requirements
• The "evergreen" problem
• Apps only supported to n-1
• Ongoing need for comms - evangelise - encourage
• Taking responsibility not just taking "training"
• Test environments
• Shifting staff skills
• Cost creep
• Backup/Archive
• O365 is BIG! Take care with deployment projects
• Clear down and tidy AD first
• Migration
Other Lessons
Quote from Land Registry
“Office 365 isn’t a project, it’s
a way of life. You will forever
be tweaking and changing
things, along with rolling out,
restricting and managing new
features”
• Cloud offers genuine savings and flexibility
• Governance is achievable – politics not technology
• Security is there but people need convincing and processes
need amending
• The pace is fast! Get ready to run.
• The journey continues – desktop is next
Recap
• Future Networks
• Cloud Managed Identities & SSO
• Cloud Managed Desktops
• Unified Comms
• More Azure
Roadmap for NHS England
Email: **************
LinkedIn: julianknight2
Twitter: @knightnet
Julian Knight
Head of Corporate ICT Technology & Security
Transformation & Corporate Operations
NHS England

Contenu connexe

Tendances

C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageTrish McGinity, CCSK
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computingMoshe Ferber
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesSusanneT
 
Cloud risk and business continuity v21
Cloud risk and business continuity v21Cloud risk and business continuity v21
Cloud risk and business continuity v21Jorge Sebastiao
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureCprime
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceRightScale
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 

Tendances (20)

Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computing
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
Cloud risk and business continuity v21
Cloud risk and business continuity v21Cloud risk and business continuity v21
Cloud risk and business continuity v21
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud security
Cloud securityCloud security
Cloud security
 

En vedette

Diaporama sur la bataille de Verdun
Diaporama sur la bataille de Verdun Diaporama sur la bataille de Verdun
Diaporama sur la bataille de Verdun Hubert Tassel
 
Accountability for Data Governance in the Cloud
Accountability for Data Governance in the CloudAccountability for Data Governance in the Cloud
Accountability for Data Governance in the CloudMassimo Felici
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013David Linthicum
 
"What does 'Full Life-Cycle' Data Management Mean ?"
"What does 'Full Life-Cycle' Data Management Mean ?""What does 'Full Life-Cycle' Data Management Mean ?"
"What does 'Full Life-Cycle' Data Management Mean ?"Tom Moritz
 
Building Real-Time Web Applications
Building Real-Time Web ApplicationsBuilding Real-Time Web Applications
Building Real-Time Web ApplicationsTony Abou-Assaleh
 
HTML5 WebSockets in Python/Django
HTML5 WebSockets in Python/DjangoHTML5 WebSockets in Python/Django
HTML5 WebSockets in Python/DjangoTony Abou-Assaleh
 
AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010
AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010
AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010AgilePath Corporation
 
Enterprise Cloud Governance: A Frictionless Approach
Enterprise Cloud Governance: A Frictionless ApproachEnterprise Cloud Governance: A Frictionless Approach
Enterprise Cloud Governance: A Frictionless ApproachRightScale
 
AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...
AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...
AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...Amazon Web Services
 
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Amazon Web Services
 
How Social and the Cloud Impact Your Governance Strategy
How Social and the Cloud Impact Your Governance StrategyHow Social and the Cloud Impact Your Governance Strategy
How Social and the Cloud Impact Your Governance StrategyChristian Buckley
 

En vedette (12)

Diaporama sur la bataille de Verdun
Diaporama sur la bataille de Verdun Diaporama sur la bataille de Verdun
Diaporama sur la bataille de Verdun
 
Accountability for Data Governance in the Cloud
Accountability for Data Governance in the CloudAccountability for Data Governance in the Cloud
Accountability for Data Governance in the Cloud
 
Azure cloud governance deck
Azure cloud governance deckAzure cloud governance deck
Azure cloud governance deck
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
 
"What does 'Full Life-Cycle' Data Management Mean ?"
"What does 'Full Life-Cycle' Data Management Mean ?""What does 'Full Life-Cycle' Data Management Mean ?"
"What does 'Full Life-Cycle' Data Management Mean ?"
 
Building Real-Time Web Applications
Building Real-Time Web ApplicationsBuilding Real-Time Web Applications
Building Real-Time Web Applications
 
HTML5 WebSockets in Python/Django
HTML5 WebSockets in Python/DjangoHTML5 WebSockets in Python/Django
HTML5 WebSockets in Python/Django
 
AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010
AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010
AgilePath's Live Webinar: Exploring the Cloud Governance Lifecycle Dec 16 2010
 
Enterprise Cloud Governance: A Frictionless Approach
Enterprise Cloud Governance: A Frictionless ApproachEnterprise Cloud Governance: A Frictionless Approach
Enterprise Cloud Governance: A Frictionless Approach
 
AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...
AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...
AWS re:Invent 2016: How News UK Centralized Cloud Governance Through Policy M...
 
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
 
How Social and the Cloud Impact Your Governance Strategy
How Social and the Cloud Impact Your Governance StrategyHow Social and the Cloud Impact Your Governance Strategy
How Social and the Cloud Impact Your Governance Strategy
 

Similaire à Security and governance in the cloud

What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?John Kinsella
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYSilverlineCRM
 
Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17itSMF UK
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013Moshe Ferber
 
Trust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erpTrust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erpHarshit Garg
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtimeAFCOM
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud servicesEduserv
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentationJaime Cajigas ☁
 

Similaire à Security and governance in the cloud (20)

What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Trust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erpTrust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erp
 
Cloudsourcing2013
Cloudsourcing2013Cloudsourcing2013
Cloudsourcing2013
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud services
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Security and governance in the cloud

  • 1. Security and Governance in the Cloud NHS England’s use of technology 2016-11-18
  • 2. Sky News, Wednesday 16th November 2016 A Sky News investigation has discovered the NHS trusts putting patients at risk by not protecting their data online. Seven NHS trusts, serving more than two million people, spent nothing on cybersecurity in 2015. Sky News worked with security experts to find serious flaws in their cybersecurity, which could be easily exploited by relatively unskilled hackers. Hacker House was able to find misconfigured email servers, outdated software and security certificates, along with NHS trusts' emails and passwords, through public searches.
  • 3. • It’s just security! • But it is a convenient name • External services • Some scalability • E.g. ESR, NHSmail • Public vs Private • Scale up/down • Micro charging Definitions Cyber cloud Cloud
  • 4. • A non-departmental public body, an Arm’s Length Body of the Department of Health, part of the NHS Constitution • Improving outcomes for patients, modernising • Support and allocate resources to CCG’s • Direct commissioning services Background to NHS England
  • 5. • Built on open principles & the premise of minimal patient data • Starting up as public Cloud was really taking off • Considerable cloud use from the start • “Infrastructure Free” • Required to adopt existing solutions • 3,500 people, 33 offices ► 7,000–8,000 people, 51 offices • Contact Centre • Highly sensitive information • 10-12 thousand contacts a month • Dynamics Online – Ministerial Sign-off Building a New Organisation
  • 6. • Cost • Flexibility, mobility • Speed to delivery • Evergreen Why the Cloud? • Centralised • Difficult to steer IT Dictates • Expensive to change • Slow to change SI does the heavy lifting • Improve agility • Lower Costs • Knowledge gap Business Leads
  • 7. • The Threats • DDOS • Ransomware • Phishing • Malvertising • Lots of little attacks accumulate data • Sensitive data "has" to be in England!, "You can't offshore", "You can't put that in the cloud!" • Convincing the naysayers: Asking why, assessing the actual risk not the assumed risk • Getting people to own the risk and management • Is your (suppliers) datacentre more secure than a global scale specialist? Security
  • 8. • Moving away from centralised compliance to risk management • Simplify the message so non-security specialists understand it • Greater alignment to commercial offerings • Security becomes proportional to the risk • No more “Computer says no” Agile Security
  • 9. • The landscape has changed • Working outside the security boundary • Shifting boundaries • Untrusted environments - do you want this? • Checking the location of Cloud data • Not everything is where you think it is • Check where support is located • Eyes on • The need to review reports • Audit, DLP, "Secure Score“ • Security Information & Event Management (SIEM) • Identity Management & SSO • Integrated on-prem SSO requires authentication channels from the Internet (unless using ExpressRoute or VPN) • Two-Factor Authentication Security: Some Challenges
  • 10. • Sort the governance early • Understand the risks • Get sign-off early • Simplify and clarify – data classifications • Shadow IT is a growing reality – how to deal with it? • We are actively pushing IT out to the business – but less strict controls mean more governance required. Governing the Cloud?
  • 11. • Many people actually hate change – though they claim they want it • Overlapping services are confusing • Communicate - evangelise – encourage • Use the language of the business • The "evergreen" problem • Apps only supported to n-1 • Ongoing need for comms • Taking responsibility not just taking "training“ • Lots of short videos are good • Shifting staff skills Engagement
  • 12. • Overlapping services • Shifting network requirements • The "evergreen" problem • Apps only supported to n-1 • Ongoing need for comms - evangelise - encourage • Taking responsibility not just taking "training" • Test environments • Shifting staff skills • Cost creep • Backup/Archive • O365 is BIG! Take care with deployment projects • Clear down and tidy AD first • Migration Other Lessons
  • 13. Quote from Land Registry “Office 365 isn’t a project, it’s a way of life. You will forever be tweaking and changing things, along with rolling out, restricting and managing new features”
  • 14. • Cloud offers genuine savings and flexibility • Governance is achievable – politics not technology • Security is there but people need convincing and processes need amending • The pace is fast! Get ready to run. • The journey continues – desktop is next Recap
  • 15. • Future Networks • Cloud Managed Identities & SSO • Cloud Managed Desktops • Unified Comms • More Azure Roadmap for NHS England
  • 16. Email: ************** LinkedIn: julianknight2 Twitter: @knightnet Julian Knight Head of Corporate ICT Technology & Security Transformation & Corporate Operations NHS England

Notes de l'éditeur

  1. Cyber It’s just security! A new name for an old problem But some new challenges too But it is a convenient name Helps others get a handle on it, makes it a more tangible target cloud (small c) External services Not in our (or SI’s) data centre Some scalability Perhaps up more than down, maybe some limits E.g. ESR, NHSmail, O365 Cloud (big C) Public vs Private Can be either, public increasingly common as security and confidence improves Scale up/down Instantly Micro charging Turn on/off instantly. Pay for whats on, when its on. Like a BANK (reusing money)
  2. ALB + NHS = Part of 2 worlds. Central Government financial controls
  3. Initial cloud use: ESR, NHSmail, PDR, Expenses, Office 365, Corestream, Kontiki (cloud with a small c) Not much legacy, little to no migration
  4. Timeline of change Early days IT was magic and needed lots of magicians. Businesses wanted focus, magicians moved to specialist “temples” Now IT is a commodity, business users know and can do more themselves Gaps: Cyber, Operations, Control/Governance Cost: reducing costs (no capital investment in data centres full of expensive kit), ability to scale up/down instantly, increased agility (reducing time to deliver/change) Some Potential Cost Issues Highlights are often amazingly cheap compared to on-prem (but not always) Not always obvious - get the right license, watch out for required extras The highlight cost not always the true cost Don't forget the addons & the tools Watch out for the shift from capital to revenue Control Mission Creep “Slack was the fastest growing cloud app amongst Okta customers in the second half of 2015, with a 77 percent increase in adoption.” - https://www.okta.com/Businesses-At-Work/2016-03/
  5. The Threats Combat Cloud DDOS with tested, safe DNS configurations and maybe direct WAN links Combat Ransomware with Versioned, Offline backups. Combat Phishing with education. Your data IS interesting! And valuable. Lots of bits of data make up a big picture. Low value targets pave the way to jump to high-value targets. Say No? No! Security is about ensuring the organisation safely delivers, not about blocking access or blindly following the “rules” Dig under the skin of assumptions – e.g. patient data has to be in England. Understanding and managing the risks DC vs Cloud Security Does Cloud service security being better than a DC mean it will never fail? No, no more so than a self-driving car, but they are safer. Information Security Policy (It's important to have an overarching policy which basically covers all bases at a high level)  Incident Response (No one can guarantee 100% security) Access Control (Don't forget 3rd Party Access) Vulnerability Management (In particular Patch Management) Information handling & retention policy (This works if you are confident of you data classification ) Acceptable Use Policy (Covers things that 5 misses) From <cisp> Almost half of NHS Trusts make no attempt to monitor cloud app usage, according to the results of a Freedom of Information request. From <http://www.theregister.co.uk/2016/09/30/nhs_cloud_app_security/> A new book by Luis Ayala "Cybersecurity for Hospitals and Healthcare Facilities" provides an ideal resource for hospital managers and administrators. Wishing to come up to date with the types of attack hospitals are likely to face. In fact Ayala found over 170 possible attack vectors. Condensing them into the main point in this concise and informative book : 1. Hacker Reconnaissance of Hospital Networks. 2. How Hackers Gain Access to Healthcare Facilities. 3. Active Medical Device Cyber Attacks. 4. Cyber-Physical Attacks. 5. Hospital Insider Threat. 6. Detection of Cyber Attacks. 7. Preventing Cyber Attacks. 8. Cyber Attack Response and recovery Planning. Cyber Attack Response Procedures Template.  http://www.apress.com/9781484221549?gtmf=s
  6. Moving away from centralised compliance to risk management Simplify the message so non-security specialists understand it Less domain specific – no more NHS-only terminology Greater alignment to commercial offerings Get rid of bespoke, no more “but we’re special” thinking Security becomes proportional to the risk Not one-size-fits-all
  7. Centralised Compliance vs Principles based Risk Management
  8. Sort the governance early Data sovereignty, Data classifications. SIRO sign-off Understand the risks Get sign-off early Simplify and clarify – data classifications Shadow IT is a growing reality – how to deal with it?
  9. Many people actually hate change – though they claim they want it Fear, restricted understanding Overlapping services can be are confusing Too many options. Need to simplify the message. Pick & choose areas of focus, build in layers. Communicate - evangelise – encourage constantly – IT not always good at this – get the help of others Not everyone listens to IT Use the language of the business The key to communications, especially at higher levels Especially challenging to “magicians” The "evergreen" problem Constant change Apps only supported to n-1 Especially hard in mixed environments Ongoing need for comms Taking responsibility not just taking "training“ Business users have to take responsibility along with innovation Lots of short videos are good Easy way to consume, not difficult to produce (though takes practice & some confidence) Shifting staff skills You WONT have all the skills You WILL have to lose some people – not redundant, more changed
  10. From a lessons learnt document shared via Crown Technology Services
  11. Future Networks More agile, lower latency, private connections to public clouds Sharing infrastructure Cloud Managed Identities & SSO Cloud Managed Desktops The next BIG change! Tremendous opportunities for agility and further cost controls Unified Comms Simplify, reduce friction Lower costs by further eliminating travel More Azure Or other cloud platforms! 
  12. LinkedIn