SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance
Rizwan Ahmad
Chair Data Governance, CSA, CEO NZCSA, Senior Lecturer MIT
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Global, not-for-profit organization
Members
Over 49,000 individual members
200 corporate members
70 chapters worldwide
Established with the aim of bringing trust to
the cloud
30 research groups with 25 research
projects
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Over 300 hundred members
Main focus is research in
Data governance
Privacy
Cloud Assurance
Cloud Auditing
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance
Sir Winston Churchill
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Preservation of sovereignty is a Noble
cause
Enshrined in constitutions, Legislation and
Patriotism
To preserve peace
To protect territory against the hostile elements
To protect its citizens
To guarantee freedom
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Countries take various steps to preserve
sovereignty of the state without infringing
the rights of his/her own citizens through
Proactive actions
Reactive actions
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Legal or not Legal?
Sovereignty of State
Reactive
Police Military
Proactive
Intelligence
Agencies
Counter Operational
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Government develops legislative measures
to enhance these agencies by National
security laws meant to protect citizen’s
Fundamental rights
Freedom
Democracy
Country
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Various covert and overt operations are
under fire
These operations reflect national security
but overrides fundamental rights
(Globalization)
Operations take strength from legislation
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
These programs and legislations are not
new
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Country National Security Laws Tolerance
USA Foreign Intelligence Security Act (FISA)
PATRIOT ACT
Justifies PRISM
Zero tolerance for Foreigners
US Citizens safe
UK Regulation of Investigatory Powers Act
2000 section 22(2)
Telecommunications Act 1984 section 94
Tempora Program targets Citizens and
Non Citizens
Sweden Act 2008:717 on signals intelligence
within defence intelligence operations
Act 2009:966 on the Intelligence Court
Decree 2009:968
Gathering information
Has some weakness
France Code de la Sécurité Intérieure Book 2,
Title IV of this Code.
Anti-Terror Act 2006
CNCIS
Targeted surveillance
Extends powers to gather telecom
data directly from providers
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Country National Security Laws Tolerance
Germany G-10 Law Warrantless automated wiretaps of
domestic and international
Communications
Netherlands Dutch Intelligence and Security Act 2002 Does not permit wiretap
European
Union
Directive 95/46/EC, Article 13 Exemption to data protection
European
Union
Convention for the Protection of
Individuals with regard to Automatic
Processing of Personal Data
Exemption in Article 9 and Article
16
International Convention on Cybercrime Article 27 and 30
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Country User Data
Requests
Percentage of
requests where
some data
produced
Users/Accounts
Specified
Total > 27477 64% > 42648
United States 10,574 83% 18,254
France 2,750 51% 3,378
Germany 2,660 40% 3,255
India 2,513 66% 4,401
United Kingdom 1,397 69% 3,142
Brazil 1,085 49% 1,471
Italy 896 42% 1,084
Australia 780 70% 944
Singapore 755 68% 847
Spain 545 53% 761
Poland 502 23% 740
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance
Survey on PRISM
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
56%31%
10%
3%
Survey 207 responses
Less
No impact
Cancelled
More
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
47%
32%
11%
10%
Survey Results of 440 responses
Poor
Fair
No Idea
Excellent
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
36%
64%
Survey Results 220 responses
Yes
No
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
41%
46%
13%
Survey Results 423 responses
Patriot Act Repealed
Patriot Act Modified
Patriot Act is Fine
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
91%
9%
Survey Results 438
Yes
No
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
User rights are aggravated by
Lack of transparency manifested by the cloud
service providers and governments
Inadequate cloud security standards
Evolving nature of cloud computing
Risks
Jurisdictional laws and conflicts
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance
Universal principles
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Article II 3(b), (c), (d) and (e) United Nations
Guidelines for Consumer Protection
(b) The promotion and protection of the economic
interests of consumers;
(c) Access of consumers to adequate information to
enable them to make informed choices according to
individual wishes and needs;
(d) Consumer education, including education on the
environmental, social and economic impacts of
consumer choice
(e) Availability of effective consumer redress.
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Transparency
• What information is
disclosed by CSP
Legal Protection
• What legal protection
is offered?
Compliance
• What standards and
laws?
Accountability
• How grievance is
addressed?
Cloud
Governance
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Right to know reforms…..
Disclosure of information to inform cloud
user that impact his data rights related to
Jurisdiction
Legal issues
Data protection laws
Compliance to relevant policies, law enforcement
Redress, complains
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Assess legal and jurisdictional risks
Contracts must be enforceable
Flexible contracts to allow cloud user
requirements
Choice of court
Arbitration
Ensure data protection under cloud user
laws
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Cloud Service provider displays compliance
to
Relevant provisions of laws
Security standards, best practices
Legal protection not to show data to third party
Transparency, legal protection and compliance to
standards show accountability
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Cloud service provider displays information
to show
Accountability processes
Breach of security
Electronic dispute resolution
Liability
Choice of court
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Four Elements
Transparency
ISO 27001 CCM
SSAE 16 SOC2 Type 2/ ISAE 3402
STAR Registry (CAIQ, CCM)
Disclosure of laws
Breach notification
Legal
Protection
Choice of court
Flexible contracts
Enforceable contracts
Compliance
Standards
Contracts
User laws
Accountability
Liability
Dispute resolution
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
Foundation for data governance
Need your cooperation to build strong
research
Presenting a proposal for new standards
on data sovereignity
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter
 r.ahmad@cloudsecurityalliance.org.nz
Join Hands for Cloud and
Cyber Security to Secure
Community
www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance
Thankyou

Más contenido relacionado

La actualidad más candente

The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to YouDelphix
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateDelphix
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationNetworkCollaborators
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPEnergySec
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynoteNetworkCollaborators
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & CybersecurityDavid Sweigert
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDEEngineers Australia
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Internet of everything
Internet of everything Internet of everything
Internet of everything Jayesh Pai
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 

La actualidad más candente (20)

The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDE
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 

Similar a Cloud Security Alliance NZ Chapter Research and Standards Proposal

Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing InnoTech
 
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingIRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingPaul Hogan
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecuritySeclore
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryMartin von Haller Groenbaek
 
Cloud security management by newvem
Cloud security management by newvemCloud security management by newvem
Cloud security management by newvemNewvewm
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsZitaAdlTrk
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedHarshitParkar6677
 
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businessesUnderstanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businessesSentronex
 

Similar a Cloud Security Alliance NZ Chapter Research and Standards Proposal (20)

Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingIRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
 
Cloud security - Publication
Cloud security - Publication Cloud security - Publication
Cloud security - Publication
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Why CSA Australia
Why CSA AustraliaWhy CSA Australia
Why CSA Australia
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
 
Cloud security management by newvem
Cloud security management by newvemCloud security management by newvem
Cloud security management by newvem
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
 
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businessesUnderstanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cloud Security Alliance NZ Chapter Research and Standards Proposal

  • 1. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance Rizwan Ahmad Chair Data Governance, CSA, CEO NZCSA, Senior Lecturer MIT
  • 2. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Global, not-for-profit organization Members Over 49,000 individual members 200 corporate members 70 chapters worldwide Established with the aim of bringing trust to the cloud 30 research groups with 25 research projects
  • 3. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Over 300 hundred members Main focus is research in Data governance Privacy Cloud Assurance Cloud Auditing
  • 4. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance Sir Winston Churchill
  • 5. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Preservation of sovereignty is a Noble cause Enshrined in constitutions, Legislation and Patriotism To preserve peace To protect territory against the hostile elements To protect its citizens To guarantee freedom
  • 6. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Countries take various steps to preserve sovereignty of the state without infringing the rights of his/her own citizens through Proactive actions Reactive actions
  • 7. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Legal or not Legal? Sovereignty of State Reactive Police Military Proactive Intelligence Agencies Counter Operational
  • 8. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Government develops legislative measures to enhance these agencies by National security laws meant to protect citizen’s Fundamental rights Freedom Democracy Country
  • 9. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance
  • 10. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Various covert and overt operations are under fire These operations reflect national security but overrides fundamental rights (Globalization) Operations take strength from legislation
  • 11. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter These programs and legislations are not new
  • 12. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country National Security Laws Tolerance USA Foreign Intelligence Security Act (FISA) PATRIOT ACT Justifies PRISM Zero tolerance for Foreigners US Citizens safe UK Regulation of Investigatory Powers Act 2000 section 22(2) Telecommunications Act 1984 section 94 Tempora Program targets Citizens and Non Citizens Sweden Act 2008:717 on signals intelligence within defence intelligence operations Act 2009:966 on the Intelligence Court Decree 2009:968 Gathering information Has some weakness France Code de la Sécurité Intérieure Book 2, Title IV of this Code. Anti-Terror Act 2006 CNCIS Targeted surveillance Extends powers to gather telecom data directly from providers
  • 13. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country National Security Laws Tolerance Germany G-10 Law Warrantless automated wiretaps of domestic and international Communications Netherlands Dutch Intelligence and Security Act 2002 Does not permit wiretap European Union Directive 95/46/EC, Article 13 Exemption to data protection European Union Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data Exemption in Article 9 and Article 16 International Convention on Cybercrime Article 27 and 30
  • 14. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country User Data Requests Percentage of requests where some data produced Users/Accounts Specified Total > 27477 64% > 42648 United States 10,574 83% 18,254 France 2,750 51% 3,378 Germany 2,660 40% 3,255 India 2,513 66% 4,401 United Kingdom 1,397 69% 3,142 Brazil 1,085 49% 1,471 Italy 896 42% 1,084 Australia 780 70% 944 Singapore 755 68% 847 Spain 545 53% 761 Poland 502 23% 740
  • 15. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance Survey on PRISM
  • 16. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 56%31% 10% 3% Survey 207 responses Less No impact Cancelled More
  • 17. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 47% 32% 11% 10% Survey Results of 440 responses Poor Fair No Idea Excellent
  • 18. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 36% 64% Survey Results 220 responses Yes No
  • 19. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 41% 46% 13% Survey Results 423 responses Patriot Act Repealed Patriot Act Modified Patriot Act is Fine
  • 20. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 91% 9% Survey Results 438 Yes No
  • 21. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter User rights are aggravated by Lack of transparency manifested by the cloud service providers and governments Inadequate cloud security standards Evolving nature of cloud computing Risks Jurisdictional laws and conflicts
  • 22. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance Universal principles
  • 23. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Article II 3(b), (c), (d) and (e) United Nations Guidelines for Consumer Protection (b) The promotion and protection of the economic interests of consumers; (c) Access of consumers to adequate information to enable them to make informed choices according to individual wishes and needs; (d) Consumer education, including education on the environmental, social and economic impacts of consumer choice (e) Availability of effective consumer redress.
  • 24. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Transparency • What information is disclosed by CSP Legal Protection • What legal protection is offered? Compliance • What standards and laws? Accountability • How grievance is addressed? Cloud Governance
  • 25. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Right to know reforms….. Disclosure of information to inform cloud user that impact his data rights related to Jurisdiction Legal issues Data protection laws Compliance to relevant policies, law enforcement Redress, complains
  • 26. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Assess legal and jurisdictional risks Contracts must be enforceable Flexible contracts to allow cloud user requirements Choice of court Arbitration Ensure data protection under cloud user laws
  • 27. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Cloud Service provider displays compliance to Relevant provisions of laws Security standards, best practices Legal protection not to show data to third party Transparency, legal protection and compliance to standards show accountability
  • 28. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Cloud service provider displays information to show Accountability processes Breach of security Electronic dispute resolution Liability Choice of court
  • 29. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Four Elements Transparency ISO 27001 CCM SSAE 16 SOC2 Type 2/ ISAE 3402 STAR Registry (CAIQ, CCM) Disclosure of laws Breach notification Legal Protection Choice of court Flexible contracts Enforceable contracts Compliance Standards Contracts User laws Accountability Liability Dispute resolution
  • 30. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Foundation for data governance Need your cooperation to build strong research Presenting a proposal for new standards on data sovereignity
  • 31. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter  r.ahmad@cloudsecurityalliance.org.nz Join Hands for Cloud and Cyber Security to Secure Community
  • 32. www.cloudsecurityalliance.orgCopyright © 2012 New Zealand Cloud Security Alliance Thankyou