SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
Cloud Security Strategy
Signaler
Partager
Capgemini
Global leader in consulting, technology, outsourcing, and local professional services à Capgemini
Suivre
•
4 j'aime
•
3,946 vues
1
sur
24
Cloud Security Strategy
•
4 j'aime
•
3,946 vues
Signaler
Partager
Télécharger maintenant
Télécharger pour lire hors ligne
Understanding and evaluating the real risks in the cloud By Lee Newcombe Infrastructure Services
Lire la suite
Capgemini
Global leader in consulting, technology, outsourcing, and local professional services à Capgemini
Suivre
Recommandé
Cloud security and security architecture par
Cloud security and security architecture
Vladimir Jirasek
27.8K vues
•
12 diapositives
Cloud Security par
Cloud Security
AWS User Group Bengaluru
1.9K vues
•
133 diapositives
Cloud Security Architecture.pptx par
Cloud Security Architecture.pptx
Moshe Ferber
619 vues
•
46 diapositives
CLOUD NATIVE SECURITY par
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
1K vues
•
11 diapositives
Cloud Security - Security Aspects of Cloud Computing par
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
13.1K vues
•
16 diapositives
Multi cloud security architecture par
Multi cloud security architecture
Maganathin Veeraragaloo
2.9K vues
•
12 diapositives
Contenu connexe
Tendances
Cloud Security: A New Perspective par
Cloud Security: A New Perspective
Wen-Pai Lu
1.5K vues
•
29 diapositives
Cloud Migration Strategy Framework par
Cloud Migration Strategy Framework
PT Datacomm Diangraha
9.3K vues
•
47 diapositives
Azure security architecture par
Azure security architecture
Karl Ots
2.2K vues
•
15 diapositives
Cloud security par
Cloud security
BikashPokharel3
438 vues
•
14 diapositives
Zero-Trust SASE DevSecOps par
Zero-Trust SASE DevSecOps
Araf Karsh Hamid
557 vues
•
273 diapositives
Cloud security par
Cloud security
Mohamed Shalash
2.8K vues
•
68 diapositives
Tendances
(20)
Cloud Security: A New Perspective par Wen-Pai Lu
Cloud Security: A New Perspective
Wen-Pai Lu
•
1.5K vues
Cloud Migration Strategy Framework par PT Datacomm Diangraha
Cloud Migration Strategy Framework
PT Datacomm Diangraha
•
9.3K vues
Azure security architecture par Karl Ots
Azure security architecture
Karl Ots
•
2.2K vues
Cloud security par BikashPokharel3
Cloud security
BikashPokharel3
•
438 vues
Zero-Trust SASE DevSecOps par Araf Karsh Hamid
Zero-Trust SASE DevSecOps
Araf Karsh Hamid
•
557 vues
Cloud security par Mohamed Shalash
Cloud security
Mohamed Shalash
•
2.8K vues
introduction to Azure Sentinel par Robert Crane
introduction to Azure Sentinel
Robert Crane
•
2.8K vues
cyber-security-reference-architecture par Birendra Negi ☁️
cyber-security-reference-architecture
Birendra Negi ☁️
•
751 vues
Moving to the cloud: cloud strategies and roadmaps par Jisc
Moving to the cloud: cloud strategies and roadmaps
Jisc
•
8.4K vues
A cloud readiness assessment framework par Carlo Colicchio
A cloud readiness assessment framework
Carlo Colicchio
•
7.3K vues
Cloud computing and Cloud security fundamentals par Viresh Suri
Cloud computing and Cloud security fundamentals
Viresh Suri
•
9.5K vues
The evolution of continuous cloud security and compliance - DEM05-S - New Yor... par Amazon Web Services
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
Amazon Web Services
•
936 vues
Zero Trust Model Presentation par Gowdhaman Jothilingam
Zero Trust Model Presentation
Gowdhaman Jothilingam
•
12.3K vues
Cloud Migration Workshop par Amazon Web Services
Cloud Migration Workshop
Amazon Web Services
•
6.7K vues
Cloud Computing Security par Ninh Nguyen
Cloud Computing Security
Ninh Nguyen
•
41.6K vues
Cloud computing and its security issues par Jyoti Srivastava
Cloud computing and its security issues
Jyoti Srivastava
•
1.5K vues
Cloud Security par AWS User Group Bengaluru
Cloud Security
AWS User Group Bengaluru
•
12.4K vues
Zero Trust Network Access par Er. Ajay Sirsat
Zero Trust Network Access
Er. Ajay Sirsat
•
1.7K vues
Cloud computing Risk management par Padma Jella
Cloud computing Risk management
Padma Jella
•
8.9K vues
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf par ParishSummer
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
•
148 vues
En vedette
Cloud security and adoption par
Cloud security and adoption
Sudsanguan Ngamsuriyaroj
934 vues
•
29 diapositives
IBM Security Strategy Intelligence, par
IBM Security Strategy Intelligence,
Information Security Awareness Group
2.3K vues
•
26 diapositives
Full slide deck for Minicourse M5 "Leading radical change a day of transforma... par
Full slide deck for Minicourse M5 "Leading radical change a day of transforma...
NHS Improving Quality
2.8K vues
•
169 diapositives
Enabling Finance Transformation with Cloud Technology: How to Increase Agilit... par
Enabling Finance Transformation with Cloud Technology: How to Increase Agilit...
Argyle Executive Forum
2.1K vues
•
9 diapositives
Cloud, the Enterprise, and the Enterprise Architect par
Cloud, the Enterprise, and the Enterprise Architect
Elisabeth Stahl
1.5K vues
•
15 diapositives
Enterprise Cloud Transformation par
Enterprise Cloud Transformation
Cloud Best Practices Network
939 vues
•
21 diapositives
En vedette
(18)
Cloud security and adoption par Sudsanguan Ngamsuriyaroj
Cloud security and adoption
Sudsanguan Ngamsuriyaroj
•
934 vues
IBM Security Strategy Intelligence, par Information Security Awareness Group
IBM Security Strategy Intelligence,
Information Security Awareness Group
•
2.3K vues
Full slide deck for Minicourse M5 "Leading radical change a day of transforma... par NHS Improving Quality
Full slide deck for Minicourse M5 "Leading radical change a day of transforma...
NHS Improving Quality
•
2.8K vues
Enabling Finance Transformation with Cloud Technology: How to Increase Agilit... par Argyle Executive Forum
Enabling Finance Transformation with Cloud Technology: How to Increase Agilit...
Argyle Executive Forum
•
2.1K vues
Cloud, the Enterprise, and the Enterprise Architect par Elisabeth Stahl
Cloud, the Enterprise, and the Enterprise Architect
Elisabeth Stahl
•
1.5K vues
Enterprise Cloud Transformation par Cloud Best Practices Network
Enterprise Cloud Transformation
Cloud Best Practices Network
•
939 vues
"Thinking diffrent" about your information security strategy par Jason Clark
"Thinking diffrent" about your information security strategy
Jason Clark
•
1.2K vues
Cloud Transformation: A Pragmatic Approach par Capgemini
Cloud Transformation: A Pragmatic Approach
Capgemini
•
5.5K vues
Financial Risk Management: Integrated Solutions to Help Financial Institution... par IBM Banking
Financial Risk Management: Integrated Solutions to Help Financial Institution...
IBM Banking
•
3K vues
Cloud Security par Hi-Tech College
Cloud Security
Hi-Tech College
•
4.8K vues
K1 keynote 1_oracle_integrated_cloud_strategy_and_vision_for_journey_to_cloud... par Dr. Wilfred Lin (Ph.D.)
K1 keynote 1_oracle_integrated_cloud_strategy_and_vision_for_journey_to_cloud...
Dr. Wilfred Lin (Ph.D.)
•
490 vues
(ISM205) A Framework for IT and Business Transformation par Amazon Web Services
(ISM205) A Framework for IT and Business Transformation
Amazon Web Services
•
2.9K vues
The People Model and Cloud Transformation | AWS Public Sector Summit 2016 par Amazon Web Services
The People Model and Cloud Transformation | AWS Public Sector Summit 2016
Amazon Web Services
•
11.4K vues
Enterprise Strategy for Cloud Security par Bob Rhubart
Enterprise Strategy for Cloud Security
Bob Rhubart
•
3.1K vues
Best in Class Finance Transformation - Best Practices for the Finance Function par Proformative, Inc.
Best in Class Finance Transformation - Best Practices for the Finance Function
Proformative, Inc.
•
12.8K vues
(ISM305) Framework: Create Cloud Strategy & Accelerate Results par Amazon Web Services
(ISM305) Framework: Create Cloud Strategy & Accelerate Results
Amazon Web Services
•
16.1K vues
How to Build a Successful AWS Consulting Practice par Amazon Web Services
How to Build a Successful AWS Consulting Practice
Amazon Web Services
•
23.6K vues
Financial risk management ppt @ mba finance par Babasab Patil
Financial risk management ppt @ mba finance
Babasab Patil
•
60.9K vues
Similaire à Cloud Security Strategy
CLUSIR DU 12 JUIN par
CLUSIR DU 12 JUIN
ndelannoy
805 vues
•
46 diapositives
Will the Cloud be your disaster, or will Cloud be your disaster recovery? par
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Livingstone Advisory
570 vues
•
24 diapositives
Becoming the safe choice for the cloud by addressing cloud fraud & security t... par
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
cVidya Networks
801 vues
•
18 diapositives
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage... par
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Livingstone Advisory
525 vues
•
19 diapositives
2010 grail research_cloud_computing par
2010 grail research_cloud_computing
Inpingo Digital Publishing Solutions
687 vues
•
28 diapositives
Cloud Computing: Fact versus Fog par
Cloud Computing: Fact versus Fog
JocelynDG
12.5K vues
•
28 diapositives
Similaire à Cloud Security Strategy
(20)
CLUSIR DU 12 JUIN par ndelannoy
CLUSIR DU 12 JUIN
ndelannoy
•
805 vues
Will the Cloud be your disaster, or will Cloud be your disaster recovery? par Livingstone Advisory
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Livingstone Advisory
•
570 vues
Becoming the safe choice for the cloud by addressing cloud fraud & security t... par cVidya Networks
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
cVidya Networks
•
801 vues
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage... par Livingstone Advisory
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Livingstone Advisory
•
525 vues
2010 grail research_cloud_computing par Inpingo Digital Publishing Solutions
2010 grail research_cloud_computing
Inpingo Digital Publishing Solutions
•
687 vues
Cloud Computing: Fact versus Fog par JocelynDG
Cloud Computing: Fact versus Fog
JocelynDG
•
12.5K vues
False Cloud Debate Panel Interop 2011 par David Linthicum
False Cloud Debate Panel Interop 2011
David Linthicum
•
426 vues
CCSK, cloud security framework, Indonesia par Wise Pacific Venture
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
•
2.9K vues
Are you ready for the private cloud? [WHITEPAPER] par KVH Co. Ltd.
Are you ready for the private cloud? [WHITEPAPER]
KVH Co. Ltd.
•
491 vues
Csathreats.v1.0 par vivek_kale27
Csathreats.v1.0
vivek_kale27
•
575 vues
Top Cloud Threats par Piyush Mittal
Top Cloud Threats
Piyush Mittal
•
807 vues
Lss implementing cyber security in the cloud, and from the cloud-feb14 par L S Subramanian
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
•
535 vues
CLOUD COMPUTING -DETAILED APPROACH par SHAIMA A R
CLOUD COMPUTING -DETAILED APPROACH
SHAIMA A R
•
242 vues
Cloud security Deep Dive 2011 par Kim Jensen
Cloud security Deep Dive 2011
Kim Jensen
•
919 vues
Hybrid cloud computing explained par PMOfficers PMOAcademy
Hybrid cloud computing explained
PMOfficers PMOAcademy
•
2.7K vues
The Myths And Magic Of Cloud Computing par jayroy
The Myths And Magic Of Cloud Computing
jayroy
•
1.1K vues
How Adopting the Cloud Can Improve Your Security. par martin_lee1969
How Adopting the Cloud Can Improve Your Security.
martin_lee1969
•
231 vues
Moving your Infrastructure to the Cloud par Rackspace
Moving your Infrastructure to the Cloud
Rackspace
•
629 vues
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance par UNIT4 IT Solutions
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
•
660 vues
To cloud or not to cloud par TalentLMS
To cloud or not to cloud
TalentLMS
•
969 vues
Plus de Capgemini
Top Healthcare Trends 2022 par
Top Healthcare Trends 2022
Capgemini
108.6K vues
•
13 diapositives
Top P&C Insurance Trends 2022 par
Top P&C Insurance Trends 2022
Capgemini
3.3K vues
•
13 diapositives
Commercial Banking Trends book 2022 par
Commercial Banking Trends book 2022
Capgemini
12.4K vues
•
13 diapositives
Top Trends in Payments 2022 par
Top Trends in Payments 2022
Capgemini
17.9K vues
•
13 diapositives
Top Trends in Wealth Management 2022 par
Top Trends in Wealth Management 2022
Capgemini
1.6K vues
•
13 diapositives
Retail Banking Trends book 2022 par
Retail Banking Trends book 2022
Capgemini
11.1K vues
•
13 diapositives
Plus de Capgemini
(20)
Top Healthcare Trends 2022 par Capgemini
Top Healthcare Trends 2022
Capgemini
•
108.6K vues
Top P&C Insurance Trends 2022 par Capgemini
Top P&C Insurance Trends 2022
Capgemini
•
3.3K vues
Commercial Banking Trends book 2022 par Capgemini
Commercial Banking Trends book 2022
Capgemini
•
12.4K vues
Top Trends in Payments 2022 par Capgemini
Top Trends in Payments 2022
Capgemini
•
17.9K vues
Top Trends in Wealth Management 2022 par Capgemini
Top Trends in Wealth Management 2022
Capgemini
•
1.6K vues
Retail Banking Trends book 2022 par Capgemini
Retail Banking Trends book 2022
Capgemini
•
11.1K vues
Top Life Insurance Trends 2022 par Capgemini
Top Life Insurance Trends 2022
Capgemini
•
1.8K vues
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです par Capgemini
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
Capgemini
•
40.6K vues
Property & Casualty Insurance Top Trends 2021 par Capgemini
Property & Casualty Insurance Top Trends 2021
Capgemini
•
200.2K vues
Life Insurance Top Trends 2021 par Capgemini
Life Insurance Top Trends 2021
Capgemini
•
3.4K vues
Top Trends in Commercial Banking: 2021 par Capgemini
Top Trends in Commercial Banking: 2021
Capgemini
•
81.7K vues
Top Trends in Wealth Management: 2021 par Capgemini
Top Trends in Wealth Management: 2021
Capgemini
•
30.3K vues
Top Trends in Payments: 2021 par Capgemini
Top Trends in Payments: 2021
Capgemini
•
1.8K vues
Health Insurance Top Trends 2021 par Capgemini
Health Insurance Top Trends 2021
Capgemini
•
5.7K vues
Top Trends in Retail Banking: 2021 par Capgemini
Top Trends in Retail Banking: 2021
Capgemini
•
6.4K vues
Capgemini’s Connected Autonomous Planning par Capgemini
Capgemini’s Connected Autonomous Planning
Capgemini
•
89.6K vues
Top Trends in Retail Banking: 2020 par Capgemini
Top Trends in Retail Banking: 2020
Capgemini
•
47.6K vues
Top Trends in Life Insurance: 2020 par Capgemini
Top Trends in Life Insurance: 2020
Capgemini
•
2.6K vues
Top Trends in Health Insurance: 2020 par Capgemini
Top Trends in Health Insurance: 2020
Capgemini
•
3.4K vues
Top Trends in Payments: 2020 par Capgemini
Top Trends in Payments: 2020
Capgemini
•
2.5K vues
Cloud Security Strategy
1.
Cloud security strategy: understanding
and evaluating the real risks in the cloud Lee Newcombe (lee.newcombe@capgemini.com) Infrastructure Services November 2012
2.
Session Agenda Introduction
5 minutes Presentation 15 minutes “Securing Cloud Services” Facilitated Round Table Discussions 20 minutes What are the genuine security issues that hold back Cloud adoption? Are services in the cloud less secure than those on-premise? How much of the threat is human (malicious or accidental), and how much IT, devices and hardware? What is the best way to manage security in a world of self‐service IT, mobile devices and social media? Sharing of outcomes from Discussions 20 minutes 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 2
3.
Agenda
Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 3
4.
The questions you
asked… What are the genuine security issues that hold back Cloud adoption? Where do the main security threats come from and where should you focus your attention? Are services in the cloud less secure than those on-premise? How much of the threat is human (malicious or accidental), and how much IT, devices and hardware? Eliminating the human security risk: educating your workforce What is the best way to manage security in a world of self‐service IT, mobile devices and social media? How do emerging social business technologies complicate security strategies? 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 4
5.
The ones I
will tackle! What are the genuine security issues that hold back Cloud adoption? Where do the main security threats come from and where should you focus your attention? Are services in the cloud less secure than those on-premise? How much of the threat is human (malicious or accidental), and how much IT, devices and hardware? Eliminating the human security risk: educating your workforce What is the best way to manage security in a world of self‐service IT, mobile devices and social media? How do emerging social business technologies complicate security strategies? 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 5
6.
Agenda
Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 6
7.
Cloud Computing –
NIST Cloud Computing: “…a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction…” • On-demand self-service • Broad network access • Resource pooling Essential Characteristics • Rapid elasticity; and of Cloud Computing • Measured service. csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 7
8.
Service Models
12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 8
9.
NIST Deployment Models
and Jericho Cloud Cube Model Strengths Weaknesses The Jericho Forum® Cloud Model represents Public Agile, cost-effective, Multi-tenant an alternative mechanism to represent “Illusion of infinite Data residency deployment models. resource” Assurance Standard contracts Private Dedicated use Expensive cf Public Assurance No “illusion of infinite Scope to negotiate resource” SLAs etc Community Designed for a specific, Difficult to govern; need to shared, set of security manage all stakeholders requirements Hybrid “Best of breed” “Weakest link” suppliers can be Must cater for security switched in and out. issues across ALL suppliers http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 9
10.
Agenda
Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 10
11.
“Where do the
main security threats come from and where should you focus your attention?” -> Cloud Threats 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 11
12.
Agenda
Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 12
13.
“What are the
genuine security issues that hold back Cloud adoption?” -> Cloud Risks Compliance Multi-tenancy Assurance ? Supply chain – cloud, on cloud, on cloud, on… Lock-in Standard Terms and Conditions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 13
14.
“Are services in
the cloud less secure than those on-premise?” -> Cloud Benefits? Cost-effective datacentre security Improved resilience More efficient security patching Improved security expertise, including application-specific expertise, at the ? centre Cloud data storage and sharing vs removable media Encourages adoption of Jericho principles 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 14
15.
Agenda
Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 15
16.
“What is the
best way to manage security in a world of self‐service IT, mobile devices and social media?” -> Security Architecture “The fundamental security organization of a system, embodied in its components, their relationships to each other and the environment, and the security principles governing its design and evolution” Adapted from: ISO/IEC 42010:2007 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 16
17.
Security Reference Model
12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 17
18.
Modelling Different Delivery
Responsibilities The delivery responsibilities for the security services shifts from the consumer to the provider as you move from IaaS to SaaS. Interfaces between consumer and provider present a risk of gaps in capability and poor/no/mis- communication between provider and consumer. 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 18
19.
Procurement Usage
12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 19
20.
Agenda
Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 20
21.
Conclusions • All
delivery models are unique. Cloud computing models have unique security challenges. So do other delivery models including on-premise and traditional outsourcing. • Cloud is an evolution not a revolution. • The threat actors remain mostly the same, cloud or on-premise • The risks remain mostly the same, whether your applications are hosted on-premise or on-cloud, however • increased sharing of resources due to multi-tenancy introduces new attack surfaces • assurance difficulties can cause compliance issues (data residency, data deletion, segregation etc) • Security architecture approach can help to enable cloud adoption. • Architecture methodologies help to enforce consistency across an enterprise, no matter the IT delivery model. • Architecture methodologies help to identify the security services required from a Provider • Architecture helps to identify areas of overlap or interface (or confusion or omission) between Provider and Consumer • Architecture helps to inform service procurement 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 21
22.
Conclusions • What
are the genuine security issues that hold back Cloud adoption? • Compliance • Assurance • Where do the main security threats come from and where should you focus your attention? • The usual… • Are services in the cloud less secure than those on-premise? • It depends! • How much of the threat is human (malicious or accidental), and how much IT, devices and hardware? • Confidentiality? Human. Availability? Mixture. •What is the best way to manage security in a world of self‐service IT, mobile devices and social media? • Adopt an architectural approach. 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 22
23.
Session Agenda Introduction
5 minutes Presentation 15 minutes “Securing Cloud Services” Facilitated Round Table Discussions 20 minutes What are the genuine security issues that hold back Cloud adoption? Are services in the cloud less secure than those on-premise? How much of the threat is human (malicious or accidental), and how much IT, devices and hardware? What is the best way to manage security in a world of self‐service IT, mobile devices and social media? Sharing of outcomes from Discussions 20 minutes 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 23
24.
About Capgemini With more
than 120,000 people in 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2011 global revenues of EUR 9.7 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore ®, its worldwide delivery model. www.capgemini.com The information contained in this presentation is proprietary. Rightshore® is a trademark belonging to Capgemini © 2012 Capgemini. All rights reserved.