SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Cloud Computing:
Why should the Finance
     Community Care?
           Kevin L. Jackson
           Vice President
           General Manager
           NJVC Cloud Services
           Kevin.jackson@njvc.com
The New IT Era




  IDC September 2008


                       rev date 3/25/2012
Data Processing Explosion
Cloud Computing
 Not a new technology but a new approach in the provisioning and consumption of
  information technology
 A services oriented architecture (SOA) implemented typically on a virtualized infrastructure
  (compute, storage, networks) using commodity components coupled with highly automated
  controls enable the five essential characteristics of cloud computing.


                   Key Benefits                              Key Concerns
           Significant cost reductions                   Standards
           Reduced time to capability                    Portability
           Increased flexibility                         Control/Availability
           Elastic scalability                           Security
           Increase service quality                      IT Policy
           Increased security                            Management /
           Ease of technology refresh                     Monitoring
           Ease of collaboration                         Ecosystem
           Increased efficiency
Cloud Computing: Value and Capabilities

 Time
    Reduce time to deliver/execute mission
    Increased responsiveness/flexibility/availability
 Cost
    Optimizing cost to deliver/execute mission
    Optimizing cost of ownership (lifecycle cost)
    Increased efficiencies in capital/operational expenditures
 Quality
    Environmental improvements
    Experiential improvements
Relational Databases and the Cloud
                                                                                German, BMW,
                                                                                    Truck
                                   Truck   The economics of data
                                           storage led to the use of
                      BMW          Car     content addressable                  German, BMW,
                                                                                    Car
                                           storage, flat storage
                                   SUV     architectures and internet
                                                                                German, BMW,
                                           scaling.                                 SUV
          Germany                   …

                    Volkswagen      …                                               German
                                                                               Volkswagen, Truck
                      Audi          …

                                                                 Search               …
                      Toyota
Country
           Japan      Honda
                                                                                      …
                      Mazda
                                            Database design,
                       Ford                 database tuning no                        …
                                            longer required with
            US       Chrysler
                                            infinite scalability and
                                            consistent                                …
                       GM           …
                                            responsiveness
                                                                                 US, GM, SUV




                              3t                                          1t                       6
Traditional Analytics
                               Traditionally, lexical searches, filtering or
                               Boolean search attributes are used to
•••••••••••                    reduce data to a “working set”.
                               Analytical tools are then applied to this
                               “working set”.
•••••••••••
•••••••••••
•••••••••••
•••••••••••                         Tools/Analysis               Reports/Conclusions

•••••••••••
    All Data Sources / Types




                                                                                 7
Cloud Enables Searching All the Data, All the Time


•••••••••••
•••••••••••
•••••••••••
•••••••••••
•••••••••••                                          Reports/Conclusions


•••••••••••


                                                                       8
Computing


                                                                                                        Malicious Insiders


                                                      Data Loss or Leakage


Unknown Risk Profile
                                                                             Shared Technology Issues
                                                                                                                             Insecure Interfaces and APIs




                       Account or Service Hijacking
                                                                                                                                                            Abuse and Nefarious Use of Cloud
                                                                                                                                                                                                       Top Threats to
                                                                                                                                                                                                      Cloud Computing
                                                                                                                                                                                               Governance and
                                                                                                                                                                                               Enterprise Risk
                                                                                                                                                                                               Management
                                                                                                                                                                                               Legal and
                                                                                                                                                                                               Electronic Discovery

                                                                                                                                                                                               Compliance and Audit
                                                                                                                                                                                                                        Governance




                                                                                                                                                                                               Information
                                                                                                                                                                                               Lifecycle Management

                                                                                                                                                                                               Portability and
                                                                                                                                                                                               Interoperability

                                                                                                                                                                                               Traditional
                                                                                                                                                                                               Security, Business
                                                                                                                                                                                               Continuity,
                                                                                                                                                                                               Data Center
                                                                                                                                                                                               and Disaster Recovery
                                                                                                                                                                                               Operations

                                                                                                                                                                                               Incident Response,
                                                                                                                                                                                               Notification and
                                                                                                                                                                                               Remediation
                                                                                                                                                                                               Application
                                                                                                                                                                                               Security
                                                                                                                                                                                                                        Operational




                                                                                                                                                                                               Encryption and
                                                                                                                                                                                               Key Management

                                                                                                                                                                                               Identity and
                                                                                                                                                                                               Access Management

                                                                                                                                                                                               Virtualization
IT Auditing

  Collecting and evaluating evidence to determine weather a computer system
  (information system) safeguards asset, maintains data integrity, achieves
  organizational goals effectively and consumes resources efficiently.
 Finance and Commercial
     PCI
     Gramm-Leach-Bliley Act
 Social and Labor
     Sarbanes-Oxley (SOX)
     SAS70
     HIPAA
 Public Safety
     Data Protection Act (UK)
     Federal Information Security Management Act (FISMA)
 Security
     ISO27000
Auditing the Cloud

Areas for Audit
    Compliance
    Governance and Risk
    Security
Auditing Challenges
    1:1 mapping no longer exists
    Dynamic, global environments
    Requirement to retrieve, correlate and extract meaningful data
     from an ever increasing number of data sources
    Auditing as a service spreads the audit trail across multiple
     domains
Data Confidentiality, Privacy, Integrity

Data stored, transmitted and processed outside of
 the organization
Shared computing environments
No physical control of data
Physical and logical access managed by provider
No controls to prevent data modification
No logging events on data (access, modification,
 transmission)
Regulation and Compliance

Data subject to new laws
Exposure to foreign governments and subpoenas
Retention requirements vay among jurisdictions
Audit of provider’s environment
Increased complexity to comply with standards
Sli
de
14
Sli
de
15
Summary
 Cloud computing is a technological evolution
 “Drive for scale” (Internet) and “Drive for cheap” (Commodity
  components, Extensive automation) and the economics of Moore’s Law
  (Cheap storage) led to a business model revolution
 Fiscal realities and business model economics are driving rapid adoption
  of cloud computing
 Cloud computing can enable significant application enhancements
 Security: Same threat vectors. Same attacks but faster, broader and
  automated using “resource concentration
 Audit issues still need to be addressed.
 A Prediction: “FedRAMP for Finance” is coming


                                                                         16
Thank You !
Kevin L. Jackson
Vice President
General Manager
NJVC Cloud Services
(703) 335-0830
Kevin.jackson@NJVC.com
http://www.NJVC.com
http://kevinljackson.blogspot.com
http://govcloud.ulitzer.com

Contenu connexe

Tendances

493144 infosys slides_v5
493144 infosys slides_v5493144 infosys slides_v5
493144 infosys slides_v5
Accenture
 
C bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationC bu06 planning_your_cloud_education
C bu06 planning_your_cloud_education
Megan Irvine
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
Colloquium
 
Track 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproTrack 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wipro
EMC Forum India
 

Tendances (17)

Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
 Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
Mobility Broker Platform: the role of M2M in the pilot of Leuven - IBM
 
Cloud Slam Co D Presentation
Cloud Slam Co D PresentationCloud Slam Co D Presentation
Cloud Slam Co D Presentation
 
Yahoo & Hadoop
Yahoo & HadoopYahoo & Hadoop
Yahoo & Hadoop
 
Cloud Computing Potentials
Cloud Computing PotentialsCloud Computing Potentials
Cloud Computing Potentials
 
493144 infosys slides_v5
493144 infosys slides_v5493144 infosys slides_v5
493144 infosys slides_v5
 
C bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationC bu06 planning_your_cloud_education
C bu06 planning_your_cloud_education
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automation
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
 
Dancing With Clouds
Dancing With CloudsDancing With Clouds
Dancing With Clouds
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
 
Clouds:Random Thoughts
Clouds:Random ThoughtsClouds:Random Thoughts
Clouds:Random Thoughts
 
Le cloud microsoft - Présentation "fourre-tout" - Base
Le cloud microsoft - Présentation "fourre-tout" - BaseLe cloud microsoft - Présentation "fourre-tout" - Base
Le cloud microsoft - Présentation "fourre-tout" - Base
 
Track 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproTrack 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wipro
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuum
 
IBM Cloud Provocative Statements Whitepaper
IBM Cloud Provocative Statements WhitepaperIBM Cloud Provocative Statements Whitepaper
IBM Cloud Provocative Statements Whitepaper
 
Intalio|Cloud Overview
Intalio|Cloud OverviewIntalio|Cloud Overview
Intalio|Cloud Overview
 

En vedette

FedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsFedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conops
GovCloud Network
 
Vietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil OverviewVietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil Overview
GovCloud Network
 

En vedette (17)

Dataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry LynnDataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry Lynn
 
NCOIC Enterprise Cloud Computing - Kevin Jackson
NCOIC Enterprise Cloud Computing - Kevin JacksonNCOIC Enterprise Cloud Computing - Kevin Jackson
NCOIC Enterprise Cloud Computing - Kevin Jackson
 
Appistry How Google Overcame Wp
Appistry How Google Overcame WpAppistry How Google Overcame Wp
Appistry How Google Overcame Wp
 
FOSE Cloudbursting
FOSE CloudburstingFOSE Cloudbursting
FOSE Cloudbursting
 
Netflix Aws Startup Tour 090617134938 Phpapp02
Netflix Aws Startup Tour 090617134938 Phpapp02Netflix Aws Startup Tour 090617134938 Phpapp02
Netflix Aws Startup Tour 090617134938 Phpapp02
 
The Economic Gains of Cloud Computing
The Economic Gains of Cloud ComputingThe Economic Gains of Cloud Computing
The Economic Gains of Cloud Computing
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" Presentation
 
Grids Clouds Computation Steven Armentrout
Grids Clouds Computation Steven ArmentroutGrids Clouds Computation Steven Armentrout
Grids Clouds Computation Steven Armentrout
 
FedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsFedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conops
 
Control Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateControl Implementation Summary (CIS) Template
Control Implementation Summary (CIS) Template
 
Team Thunder Cloud
Team Thunder CloudTeam Thunder Cloud
Team Thunder Cloud
 
Vietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil OverviewVietmeyer Forge.Mil Overview
Vietmeyer Forge.Mil Overview
 
NJVC The Economic Benefit of Cloud Computing
NJVC The Economic Benefit of Cloud ComputingNJVC The Economic Benefit of Cloud Computing
NJVC The Economic Benefit of Cloud Computing
 
Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02
 
Unisys Service Oriented Self Adaptive Systems
Unisys Service Oriented Self Adaptive SystemsUnisys Service Oriented Self Adaptive Systems
Unisys Service Oriented Self Adaptive Systems
 
Moving Ahead With the Cloud—Enterprise Options and Implications
Moving Ahead With the Cloud—Enterprise Options and ImplicationsMoving Ahead With the Cloud—Enterprise Options and Implications
Moving Ahead With the Cloud—Enterprise Options and Implications
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 

Similaire à Why Should the Financial Community Care About Cloud - Cobis2020

Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
Asheem Chandna
 

Similaire à Why Should the Financial Community Care About Cloud - Cobis2020 (20)

Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...Cloud computing for Department of Transportation Federal Motor Carrier Safety...
Cloud computing for Department of Transportation Federal Motor Carrier Safety...
 
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systemsSolutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
 
AWS O&G Day - Ambyint and AWS
AWS O&G Day - Ambyint and AWSAWS O&G Day - Ambyint and AWS
AWS O&G Day - Ambyint and AWS
 
Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach
 
The IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for businessThe IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for business
 
Become a Machine Learning Developer with AWS Services
Become a Machine Learning Developer with AWS ServicesBecome a Machine Learning Developer with AWS Services
Become a Machine Learning Developer with AWS Services
 
Become a Machine Learning developer with AWS (Avril 2019)
Become a Machine Learning developer with AWS (Avril 2019)Become a Machine Learning developer with AWS (Avril 2019)
Become a Machine Learning developer with AWS (Avril 2019)
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
AI in the enterprise
AI in the enterprise AI in the enterprise
AI in the enterprise
 
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
Offre Cloud IBM Software [Rational] - Atelier - Forum SaaS et Cloud IBM - Clu...
 
AWS re:Invent 2018 - AIM302 - Machine Learning at the Edge
AWS re:Invent 2018 - AIM302  - Machine Learning at the Edge AWS re:Invent 2018 - AIM302  - Machine Learning at the Edge
AWS re:Invent 2018 - AIM302 - Machine Learning at the Edge
 
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
Cloud Computing and the Next-Generation of Enterprise Architecture - Cloud Co...
 
Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)Ippeis Cloud Computing Presentation(Tokyo2.0)
Ippeis Cloud Computing Presentation(Tokyo2.0)
 
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
 
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
Perform Machine Learning at the IoT Edge using AWS Greengrass and Amazon Sage...
 
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
Machine Learning at the Edge (AIM302) - AWS re:Invent 2018
 
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
Dennis Hills - Top 5 Ways to Build Machine Learning Prediction on the Edge fo...
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud Computing
 
Building an Edge Computing Strategy - Distributed infrastructure.pptx
Building an Edge Computing Strategy - Distributed infrastructure.pptxBuilding an Edge Computing Strategy - Distributed infrastructure.pptx
Building an Edge Computing Strategy - Distributed infrastructure.pptx
 
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)
 

Plus de GovCloud Network

Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
GovCloud Network
 

Plus de GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easy
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Why Should the Financial Community Care About Cloud - Cobis2020

  • 1. Cloud Computing: Why should the Finance Community Care? Kevin L. Jackson Vice President General Manager NJVC Cloud Services Kevin.jackson@njvc.com
  • 2. The New IT Era IDC September 2008 rev date 3/25/2012
  • 4. Cloud Computing  Not a new technology but a new approach in the provisioning and consumption of information technology  A services oriented architecture (SOA) implemented typically on a virtualized infrastructure (compute, storage, networks) using commodity components coupled with highly automated controls enable the five essential characteristics of cloud computing. Key Benefits Key Concerns  Significant cost reductions  Standards  Reduced time to capability  Portability  Increased flexibility  Control/Availability  Elastic scalability  Security  Increase service quality  IT Policy  Increased security  Management /  Ease of technology refresh Monitoring  Ease of collaboration  Ecosystem  Increased efficiency
  • 5. Cloud Computing: Value and Capabilities  Time  Reduce time to deliver/execute mission  Increased responsiveness/flexibility/availability  Cost  Optimizing cost to deliver/execute mission  Optimizing cost of ownership (lifecycle cost)  Increased efficiencies in capital/operational expenditures  Quality  Environmental improvements  Experiential improvements
  • 6. Relational Databases and the Cloud German, BMW, Truck Truck The economics of data storage led to the use of BMW Car content addressable German, BMW, Car storage, flat storage SUV architectures and internet German, BMW, scaling. SUV Germany … Volkswagen … German Volkswagen, Truck Audi … Search … Toyota Country Japan Honda … Mazda Database design, Ford database tuning no … longer required with US Chrysler infinite scalability and consistent … GM … responsiveness US, GM, SUV 3t 1t 6
  • 7. Traditional Analytics Traditionally, lexical searches, filtering or Boolean search attributes are used to ••••••••••• reduce data to a “working set”. Analytical tools are then applied to this “working set”. ••••••••••• ••••••••••• ••••••••••• ••••••••••• Tools/Analysis Reports/Conclusions ••••••••••• All Data Sources / Types 7
  • 8. Cloud Enables Searching All the Data, All the Time ••••••••••• ••••••••••• ••••••••••• ••••••••••• ••••••••••• Reports/Conclusions ••••••••••• 8
  • 9. Computing Malicious Insiders Data Loss or Leakage Unknown Risk Profile Shared Technology Issues Insecure Interfaces and APIs Account or Service Hijacking Abuse and Nefarious Use of Cloud Top Threats to Cloud Computing Governance and Enterprise Risk Management Legal and Electronic Discovery Compliance and Audit Governance Information Lifecycle Management Portability and Interoperability Traditional Security, Business Continuity, Data Center and Disaster Recovery Operations Incident Response, Notification and Remediation Application Security Operational Encryption and Key Management Identity and Access Management Virtualization
  • 10. IT Auditing Collecting and evaluating evidence to determine weather a computer system (information system) safeguards asset, maintains data integrity, achieves organizational goals effectively and consumes resources efficiently.  Finance and Commercial  PCI  Gramm-Leach-Bliley Act  Social and Labor  Sarbanes-Oxley (SOX)  SAS70  HIPAA  Public Safety  Data Protection Act (UK)  Federal Information Security Management Act (FISMA)  Security  ISO27000
  • 11. Auditing the Cloud Areas for Audit  Compliance  Governance and Risk  Security Auditing Challenges  1:1 mapping no longer exists  Dynamic, global environments  Requirement to retrieve, correlate and extract meaningful data from an ever increasing number of data sources  Auditing as a service spreads the audit trail across multiple domains
  • 12. Data Confidentiality, Privacy, Integrity Data stored, transmitted and processed outside of the organization Shared computing environments No physical control of data Physical and logical access managed by provider No controls to prevent data modification No logging events on data (access, modification, transmission)
  • 13. Regulation and Compliance Data subject to new laws Exposure to foreign governments and subpoenas Retention requirements vay among jurisdictions Audit of provider’s environment Increased complexity to comply with standards
  • 16. Summary  Cloud computing is a technological evolution  “Drive for scale” (Internet) and “Drive for cheap” (Commodity components, Extensive automation) and the economics of Moore’s Law (Cheap storage) led to a business model revolution  Fiscal realities and business model economics are driving rapid adoption of cloud computing  Cloud computing can enable significant application enhancements  Security: Same threat vectors. Same attacks but faster, broader and automated using “resource concentration  Audit issues still need to be addressed.  A Prediction: “FedRAMP for Finance” is coming 16
  • 17. Thank You ! Kevin L. Jackson Vice President General Manager NJVC Cloud Services (703) 335-0830 Kevin.jackson@NJVC.com http://www.NJVC.com http://kevinljackson.blogspot.com http://govcloud.ulitzer.com