Enviar búsqueda
Cargar
Cloud Security Alliance NZ Chapter Research and Standards Proposal
•
1 recomendación
•
582 vistas
Título mejorado por IA
CloudSecurityAllianceAustralia
Seguir
Cloud Security Alliance
Leer menos
Leer más
Tecnología
Noticias y política
Empresariales
Vista de diapositivas
Denunciar
Compartir
Vista de diapositivas
Denunciar
Compartir
1 de 32
Descargar ahora
Descargar para leer sin conexión
Recomendados
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
Doug Newdick
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_Capstone
Cecil Sellars
Legal update 21 september 2012
Legal update 21 september 2012
Rachel Aldighieri
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
ARMA International
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
INSPIRIT BRASIL
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
Learning from History
Learning from History
Brian Honan
Recomendados
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
Doug Newdick
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_Capstone
Cecil Sellars
Legal update 21 september 2012
Legal update 21 september 2012
Rachel Aldighieri
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
ARMA International
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
INSPIRIT BRASIL
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
Learning from History
Learning from History
Brian Honan
The GDPR and What It Means to You
The GDPR and What It Means to You
Delphix
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
Delphix
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
A rede como um sensor de segurança
A rede como um sensor de segurança
Cisco do Brasil
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
EnergySec
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Cyber supply chain risk management ASDE
Cyber supply chain risk management ASDE
Engineers Australia
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
Internet of everything
Internet of everything
Jayesh Pai
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
Cloud security and cloud adoption public
Cloud security and cloud adoption public
John Mathon
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Más contenido relacionado
La actualidad más candente
The GDPR and What It Means to You
The GDPR and What It Means to You
Delphix
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
Delphix
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
A rede como um sensor de segurança
A rede como um sensor de segurança
Cisco do Brasil
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
EnergySec
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Cyber supply chain risk management ASDE
Cyber supply chain risk management ASDE
Engineers Australia
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
Internet of everything
Internet of everything
Jayesh Pai
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
Cloud security and cloud adoption public
Cloud security and cloud adoption public
John Mathon
La actualidad más candente
(20)
The GDPR and What It Means to You
The GDPR and What It Means to You
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
A rede como um sensor de segurança
A rede como um sensor de segurança
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
Cyber supply chain risk management ASDE
Cyber supply chain risk management ASDE
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Internet of everything
Internet of everything
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Cloud security and cloud adoption public
Cloud security and cloud adoption public
Similar a Cloud Security Alliance NZ Chapter Research and Standards Proposal
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
Paul Hogan
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
CipherCloud
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
Seclore
Cloud security - Publication
Cloud security - Publication
Bianca Mueller, LL.M.
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
Cyren, Inc
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Cyren, Inc
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
CloudMask inc.
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
Why CSA Australia
Why CSA Australia
CloudSecurityAllianceAustralia
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
Martin von Haller Groenbaek
Cloud security management by newvem
Cloud security management by newvem
Newvewm
Secure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
ZitaAdlTrk
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
Cyren, Inc
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
HarshitParkar6677
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
Sentronex
Similar a Cloud Security Alliance NZ Chapter Research and Standards Proposal
(20)
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
Cloud security - Publication
Cloud security - Publication
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Why CSA Australia
Why CSA Australia
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
Cloud security management by newvem
Cloud security management by newvem
Secure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
Último
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Sujit Pal
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Último
(20)
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Cloud Security Alliance NZ Chapter Research and Standards Proposal
1.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Rizwan Ahmad Chair Data Governance, CSA, CEO NZCSA, Senior Lecturer MIT
2.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Global, not-for-profit organization Members Over 49,000 individual members 200 corporate members 70 chapters worldwide Established with the aim of bringing trust to the cloud 30 research groups with 25 research projects
3.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Over 300 hundred members Main focus is research in Data governance Privacy Cloud Assurance Cloud Auditing
4.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Sir Winston Churchill
5.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Preservation of sovereignty is a Noble cause Enshrined in constitutions, Legislation and Patriotism To preserve peace To protect territory against the hostile elements To protect its citizens To guarantee freedom
6.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Countries take various steps to preserve sovereignty of the state without infringing the rights of his/her own citizens through Proactive actions Reactive actions
7.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Legal or not Legal? Sovereignty of State Reactive Police Military Proactive Intelligence Agencies Counter Operational
8.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Government develops legislative measures to enhance these agencies by National security laws meant to protect citizen’s Fundamental rights Freedom Democracy Country
9.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance
10.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Various covert and overt operations are under fire These operations reflect national security but overrides fundamental rights (Globalization) Operations take strength from legislation
11.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter These programs and legislations are not new
12.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country National Security Laws Tolerance USA Foreign Intelligence Security Act (FISA) PATRIOT ACT Justifies PRISM Zero tolerance for Foreigners US Citizens safe UK Regulation of Investigatory Powers Act 2000 section 22(2) Telecommunications Act 1984 section 94 Tempora Program targets Citizens and Non Citizens Sweden Act 2008:717 on signals intelligence within defence intelligence operations Act 2009:966 on the Intelligence Court Decree 2009:968 Gathering information Has some weakness France Code de la Sécurité Intérieure Book 2, Title IV of this Code. Anti-Terror Act 2006 CNCIS Targeted surveillance Extends powers to gather telecom data directly from providers
13.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country National Security Laws Tolerance Germany G-10 Law Warrantless automated wiretaps of domestic and international Communications Netherlands Dutch Intelligence and Security Act 2002 Does not permit wiretap European Union Directive 95/46/EC, Article 13 Exemption to data protection European Union Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data Exemption in Article 9 and Article 16 International Convention on Cybercrime Article 27 and 30
14.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country User Data Requests Percentage of requests where some data produced Users/Accounts Specified Total > 27477 64% > 42648 United States 10,574 83% 18,254 France 2,750 51% 3,378 Germany 2,660 40% 3,255 India 2,513 66% 4,401 United Kingdom 1,397 69% 3,142 Brazil 1,085 49% 1,471 Italy 896 42% 1,084 Australia 780 70% 944 Singapore 755 68% 847 Spain 545 53% 761 Poland 502 23% 740
15.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Survey on PRISM
16.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 56%31% 10% 3% Survey 207 responses Less No impact Cancelled More
17.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 47% 32% 11% 10% Survey Results of 440 responses Poor Fair No Idea Excellent
18.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 36% 64% Survey Results 220 responses Yes No
19.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 41% 46% 13% Survey Results 423 responses Patriot Act Repealed Patriot Act Modified Patriot Act is Fine
20.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 91% 9% Survey Results 438 Yes No
21.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter User rights are aggravated by Lack of transparency manifested by the cloud service providers and governments Inadequate cloud security standards Evolving nature of cloud computing Risks Jurisdictional laws and conflicts
22.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Universal principles
23.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Article II 3(b), (c), (d) and (e) United Nations Guidelines for Consumer Protection (b) The promotion and protection of the economic interests of consumers; (c) Access of consumers to adequate information to enable them to make informed choices according to individual wishes and needs; (d) Consumer education, including education on the environmental, social and economic impacts of consumer choice (e) Availability of effective consumer redress.
24.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Transparency • What information is disclosed by CSP Legal Protection • What legal protection is offered? Compliance • What standards and laws? Accountability • How grievance is addressed? Cloud Governance
25.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Right to know reforms….. Disclosure of information to inform cloud user that impact his data rights related to Jurisdiction Legal issues Data protection laws Compliance to relevant policies, law enforcement Redress, complains
26.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Assess legal and jurisdictional risks Contracts must be enforceable Flexible contracts to allow cloud user requirements Choice of court Arbitration Ensure data protection under cloud user laws
27.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Cloud Service provider displays compliance to Relevant provisions of laws Security standards, best practices Legal protection not to show data to third party Transparency, legal protection and compliance to standards show accountability
28.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Cloud service provider displays information to show Accountability processes Breach of security Electronic dispute resolution Liability Choice of court
29.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Four Elements Transparency ISO 27001 CCM SSAE 16 SOC2 Type 2/ ISAE 3402 STAR Registry (CAIQ, CCM) Disclosure of laws Breach notification Legal Protection Choice of court Flexible contracts Enforceable contracts Compliance Standards Contracts User laws Accountability Liability Dispute resolution
30.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Foundation for data governance Need your cooperation to build strong research Presenting a proposal for new standards on data sovereignity
31.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter r.ahmad@cloudsecurityalliance.org.nz Join Hands for Cloud and Cyber Security to Secure Community
32.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Thankyou
Descargar ahora