SlideShare une entreprise Scribd logo
1  sur  26
Trust & Value from Cloud Computing Why you should go for it. ISACA Cloud Computing Task Force Marc Vael, Chairman  5 August 2011 – Virtual Seminar and Tradeshow
Whostartedallthis? “What's interesting [now] is that there is an emergent new model, and you all are here because you are part of that new model. I don't think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call it cloud computing – they should be in a "cloud" somewhere. And that if you have the right kind of browser or the right kind of access, it doesn't matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what have you – or new devices still to be developed – you can get access to the cloud.” Mr. Eric Schmidt, Chairman & CEO Google Search Engine Strategies Conference,9th of August 2006 http://www.google.com/press/podium/ses2006.html  5 August 2011 – Virtual Seminar and Tradeshow
We live in a world today that is quiteradically different from the world that existed just five yearsago. Cloud Computing Task Force Marc Vael, Chairman  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
3 service models  5 August 2011 – Virtual Seminar and Tradeshow
4 deployment models  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing advantages  5 August 2011 – Virtual Seminar and Tradeshow
T R U S T V A L U E Cloud computing advantages Cloud Computing Trust & Value elements Confidentiality Privacy Integrity Availability Compliance Licensing Reliability Monitoring Integration Network centric Lower upfront investments More OPEX than CAPEX On demand Convenience Scalability Better resource pooling/usage Flexibility Business control over IT solutions Centralized data (sort of) Faster implementation Logging & Monitoring Green IT Trust creates the opportunity for Value Value is based on an expectation of Trust  5 August 2011 – Virtual Seminar and Tradeshow
53%
Cloud computing attention topics Keep 15 basic IT outsourcing lessonslearned in mind: Psychological impact IT governance model Integration withinternal IT systems Network connectivity / bandwidth Data location Shared tenancy Lock in withvendor Cloud Service Provider stability, reliabilityandviability Service portability Legal & regulatory compliance aspects (includingLicensing, Contractual arrangements) Information security management (including IAM) Incident response & crisis management Business Continuity Management & Disaster Recovery Planning Data archiving & removal (Right to) Audit (pentest, screening, monitoring,…)  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing ready?  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing auditing ,[object Object]
PO8 Manage quality
PO9 Assess & manage IT risks
AI4 Enableoperation & use
AI5 Procure IT resources
AI6 Manage change
AI7 Install & accredit solutions & changes
DS1 Design & manage service levels

Contenu connexe

Tendances

Sophos network protection 6 sep 17
Sophos network protection 6 sep 17Sophos network protection 6 sep 17
Sophos network protection 6 sep 17Yabibo
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed ServicesThe TNS Group
 
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of ITWhy is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of ITClearSky Data
 
Cloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesCloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesRamneek Kalra
 
Cisco Data Center Fabric
Cisco Data Center FabricCisco Data Center Fabric
Cisco Data Center FabricShashi Kiran
 
Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...HEX64
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAPPT Datacomm Diangraha
 
Head in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceHead in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceDavid Terrar
 
Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0kimwisniewski
 
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...PT Datacomm Diangraha
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Citrix
 
Why edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successWhy edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successClearSky Data
 
Expert predictions for cloud 2018
Expert predictions for cloud 2018Expert predictions for cloud 2018
Expert predictions for cloud 2018ClearSky Data
 
10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for HealthcareNetApp
 
Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesRamneek Kalra
 
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)Tyrone Systems
 
Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010GovCloud Network
 
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
CWIN17 Singapore / Darmadi komo (microsoft)   modern data estateCWIN17 Singapore / Darmadi komo (microsoft)   modern data estate
CWIN17 Singapore / Darmadi komo (microsoft) modern data estateCapgemini
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheNovosco
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions NetApp
 

Tendances (20)

Sophos network protection 6 sep 17
Sophos network protection 6 sep 17Sophos network protection 6 sep 17
Sophos network protection 6 sep 17
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
 
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of ITWhy is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
 
Cloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesCloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all Industries
 
Cisco Data Center Fabric
Cisco Data Center FabricCisco Data Center Fabric
Cisco Data Center Fabric
 
Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAP
 
Head in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceHead in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources Conference
 
Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0
 
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
 
Why edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successWhy edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud success
 
Expert predictions for cloud 2018
Expert predictions for cloud 2018Expert predictions for cloud 2018
Expert predictions for cloud 2018
 
10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare
 
Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging Technologies
 
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
 
Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010
 
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
CWIN17 Singapore / Darmadi komo (microsoft)   modern data estateCWIN17 Singapore / Darmadi komo (microsoft)   modern data estate
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions
 

En vedette

Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerDavid Wallom
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

En vedette (6)

sanju
sanjusanju
sanju
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similaire à Isaca india trust & value from cloud computing (aug 2011) print

IoT Connectivity & IoT Analytics
IoT Connectivity & IoT AnalyticsIoT Connectivity & IoT Analytics
IoT Connectivity & IoT AnalyticsSarah Takforyan
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Finalmdesai005
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopRazorfish
 
The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)Cloudera, Inc.
 
CRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerCRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerKrisValerio
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computingtntsa1972
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy Jason Baker
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan FalconerIDG Romania
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes SenseRightScale
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyVISIHOSTING
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud ComputingArt Upton
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfAmazon Web Services
 
Assembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementAssembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementIBM
 

Similaire à Isaca india trust & value from cloud computing (aug 2011) print (20)

IoT Connectivity & IoT Analytics
IoT Connectivity & IoT AnalyticsIoT Connectivity & IoT Analytics
IoT Connectivity & IoT Analytics
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshop
 
The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)
 
CRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerCRTC Cloud- Scott Sadler
CRTC Cloud- Scott Sadler
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan Falconer
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes Sense
 
Jakarta keynote
Jakarta keynoteJakarta keynote
Jakarta keynote
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud Computing
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
 
Assembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementAssembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud management
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 

Plus de Marc Vael

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as cisoMarc Vael
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersMarc Vael
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationMarc Vael
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?Marc Vael
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controlsMarc Vael
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrimeMarc Vael
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeMarc Vael
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)Marc Vael
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutMarc Vael
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security todayMarc Vael
 

Plus de Marc Vael (20)

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 

Dernier

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Dernier (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Isaca india trust & value from cloud computing (aug 2011) print

  • 1. Trust & Value from Cloud Computing Why you should go for it. ISACA Cloud Computing Task Force Marc Vael, Chairman 5 August 2011 – Virtual Seminar and Tradeshow
  • 2. Whostartedallthis? “What's interesting [now] is that there is an emergent new model, and you all are here because you are part of that new model. I don't think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call it cloud computing – they should be in a "cloud" somewhere. And that if you have the right kind of browser or the right kind of access, it doesn't matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what have you – or new devices still to be developed – you can get access to the cloud.” Mr. Eric Schmidt, Chairman & CEO Google Search Engine Strategies Conference,9th of August 2006 http://www.google.com/press/podium/ses2006.html 5 August 2011 – Virtual Seminar and Tradeshow
  • 3. We live in a world today that is quiteradically different from the world that existed just five yearsago. Cloud Computing Task Force Marc Vael, Chairman 5 August 2011 – Virtual Seminar and Tradeshow
  • 4. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 5. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 6. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 7. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 8. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 9. 3 service models 5 August 2011 – Virtual Seminar and Tradeshow
  • 10. 4 deployment models 5 August 2011 – Virtual Seminar and Tradeshow
  • 11. Cloud computing advantages 5 August 2011 – Virtual Seminar and Tradeshow
  • 12. T R U S T V A L U E Cloud computing advantages Cloud Computing Trust & Value elements Confidentiality Privacy Integrity Availability Compliance Licensing Reliability Monitoring Integration Network centric Lower upfront investments More OPEX than CAPEX On demand Convenience Scalability Better resource pooling/usage Flexibility Business control over IT solutions Centralized data (sort of) Faster implementation Logging & Monitoring Green IT Trust creates the opportunity for Value Value is based on an expectation of Trust 5 August 2011 – Virtual Seminar and Tradeshow
  • 13. 53%
  • 14.
  • 15.
  • 16. Cloud computing attention topics Keep 15 basic IT outsourcing lessonslearned in mind: Psychological impact IT governance model Integration withinternal IT systems Network connectivity / bandwidth Data location Shared tenancy Lock in withvendor Cloud Service Provider stability, reliabilityandviability Service portability Legal & regulatory compliance aspects (includingLicensing, Contractual arrangements) Information security management (including IAM) Incident response & crisis management Business Continuity Management & Disaster Recovery Planning Data archiving & removal (Right to) Audit (pentest, screening, monitoring,…) 5 August 2011 – Virtual Seminar and Tradeshow
  • 17. Cloud computing ready? 5 August 2011 – Virtual Seminar and Tradeshow
  • 18.
  • 19.
  • 21. PO9 Assess & manage IT risks
  • 23. AI5 Procure IT resources
  • 25. AI7 Install & accredit solutions & changes
  • 26. DS1 Design & manage service levels
  • 30. ME2 Monitor & evaluateinternal control
  • 31. ME3 Ensure compliance withexternalrequirements 5 August 2011 – Virtual Seminar and Tradeshow
  • 32.
  • 33.
  • 34. Your cloud computing solution is as strong … … as its weakest link
  • 35. Contact information Marc VaelCISA, CISM, CISSP, CGEIT, ITIL Service Manager, Prince2 Chairman ISACA Cloud Computing Task Force ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows IL 60008 USA http://www.isaca.org/cloud marc@vael.net http://www.linkedin.com/in/marcvael http://twitter.com/marcvael 5 August 2011 – Virtual Seminar and Tradeshow
  • 36. THANK YOU FOR YOUR ATTENTION
  • 37. Cloud computing websites www.cloudsecurityalliance.org/ www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment csrc.nist.gov/groups/SNS/cloud-computing/ opencloudconsortium.org/ www.opencloudmanifesto.org/ www.cloud-standards.org/wiki/ en.wikipedia.org/wiki/Cloud_computing searchcloudcomputing.techtarget.com/ cloudcomputing.sys-con.com/ cloudsecurity.org/ www.cloudaudit.org/ www.isaca.org/cloudcomputingresources 5 August 2011 – Virtual Seminar and Tradeshow
  • 38. Cloud computing publications Executive’s Guide to Cloud Computing,Eric Marks-Bob Lozano, 304 pages, May 2010 Enterprise Cloud Computing: A Strategy Guide for Business and Technology Leaders, Andy Mulholland-Jon Pyke-Peter Fingar, 260 pages, April 2010 Cloud Computing: technologies & strategies of the ubiquitous data center, Curtis Franklin & Brian Chee, 288 pages, February 2010 Above the Clouds: managing risk in the world of cloud computing, Kevin Mcdonald, February 2010 Cloud Computing for dummies, Judith Hurwitz-Robin Bloor-Marcia Kaufman, 310 pages, November 2009 Cloud Security,Ronald Krutz Russell Dean Vines, 384 pages, July 2010 Management strategies for the Cloud Revolution,Charles Babcock, 272 pages, June 2010 5 August 2011 – Virtual Seminar and Tradeshow