SlideShare a Scribd company logo
1 of 46
 
Choosing the Right Security Strategy for Cloud Computing Harold Moss CTO/Chief Architect Cloud Security Strategy
Introduction to Cloud Computing
[object Object]
What’s Important?
Can you identify your  Important Data?
http://creativecommons.org/licenses/by/2.5/
There are Multiple Delivery Models for Clouds
And Multiple Deployment Paths…
What Other Vendors Tell People About their Clouds and Their Security
Our Perspective
Our Approach to the Cloud
Security by Design:  “Building Security into the fabric of the Cloud”
Just Like there are different Clouds, there are different workloads
Workload Driven:  “Relevant security not just Fluff”
Service Enabled:  “Building Better Walls”
Innovation Powered:  “Creating Security for tomorrow”
The IBM Security Portfolio
Applying Workload Driven Security to a Private Cloud Intrusion Prevention Monitoring Access Management Data Security Application Evaluation Database Design/Test Virtual Server Protection Security Event Monitoring Provisioning
Example: Cloud Security in the Public Space Firewall IPS Data Protection Access Identity Federated Identity VM Protection Patch Mgmt. Configuration Mgmt. Security Event Log Mgmt. Audit Vulnerability Mgmt.
Hybrid Cloud Scenario
New Security Capabilities for 2011
Preparing to Move to the Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IBM Cloud Security Guidance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Security Whitepaper ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www-03.ibm.com/press/us/en/attachment/32799.wss?fileId=ATTACH_FILE1&fileName=10-0861_US%20Cloud%20Computing%20White%20Paper_Final_LR.pdf
Why IBM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security cloud forum_2011

More Related Content

What's hot

Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Mamta Saxena
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Moshe Ferber
 

What's hot (20)

Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Cloud computing for SMBs
Cloud computing for SMBsCloud computing for SMBs
Cloud computing for SMBs
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Xerox Secure X 060711 Tg
Xerox Secure X 060711 TgXerox Secure X 060711 Tg
Xerox Secure X 060711 Tg
 
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”Lee Newcombe, Capgemini “Security threats associated with cloud computing”
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Risk Management in the Cloud
Risk Management in the CloudRisk Management in the Cloud
Risk Management in the Cloud
 
Cloud Security Webinar
Cloud Security WebinarCloud Security Webinar
Cloud Security Webinar
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud Infrastructure
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.
 

Viewers also liked

Cloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-finalCloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-final
Mauricio Godoy
 
Water Quality Testing
Water Quality TestingWater Quality Testing
Water Quality Testing
Joy Hoeffler
 
Moultrie
MoultrieMoultrie
Moultrie
coalcar
 
CMAP Regional Water Supply Planning Group
CMAP Regional Water Supply Planning GroupCMAP Regional Water Supply Planning Group
CMAP Regional Water Supply Planning Group
Joy Hoeffler
 

Viewers also liked (13)

Powerpoint Technology
Powerpoint TechnologyPowerpoint Technology
Powerpoint Technology
 
Cloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-finalCloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-final
 
SNHY PPT
SNHY PPTSNHY PPT
SNHY PPT
 
Water Quality Testing
Water Quality TestingWater Quality Testing
Water Quality Testing
 
Hospitality Frying Pan
Hospitality Frying PanHospitality Frying Pan
Hospitality Frying Pan
 
Moultrie
MoultrieMoultrie
Moultrie
 
Manual de matematicas
Manual de matematicasManual de matematicas
Manual de matematicas
 
Pl Group1
Pl Group1Pl Group1
Pl Group1
 
Mate any
Mate anyMate any
Mate any
 
A Guide to the BAGIS Program
A Guide to the BAGIS ProgramA Guide to the BAGIS Program
A Guide to the BAGIS Program
 
CMAP Regional Water Supply Planning Group
CMAP Regional Water Supply Planning GroupCMAP Regional Water Supply Planning Group
CMAP Regional Water Supply Planning Group
 
Financial Market Know How
Financial Market Know HowFinancial Market Know How
Financial Market Know How
 
Imk ergonomi komputer
Imk ergonomi komputerImk ergonomi komputer
Imk ergonomi komputer
 

Similar to Security cloud forum_2011

The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
Glenn Ambler
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
Arun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
Accenture
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
 

Similar to Security cloud forum_2011 (20)

Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
The 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud SecurityThe 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud Security
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
 

More from Mauricio Godoy

Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition StrategyPund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Mauricio Godoy
 
BusinessWeek: The Presentation Secrets of Steve Jobs
BusinessWeek: The Presentation Secrets of Steve JobsBusinessWeek: The Presentation Secrets of Steve Jobs
BusinessWeek: The Presentation Secrets of Steve Jobs
Mauricio Godoy
 
Martin Wildberger Presentation
Martin Wildberger PresentationMartin Wildberger Presentation
Martin Wildberger Presentation
Mauricio Godoy
 
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Big Data Whitepaper  - Streams and Big Insights Integration PatternsBig Data Whitepaper  - Streams and Big Insights Integration Patterns
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Mauricio Godoy
 
Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?
Mauricio Godoy
 
Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation
Mauricio Godoy
 
The client defined cloud final clementi
The client defined cloud final clementiThe client defined cloud final clementi
The client defined cloud final clementi
Mauricio Godoy
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
Mauricio Godoy
 
Mdr cloud 040611_v4_final
Mdr cloud 040611_v4_finalMdr cloud 040611_v4_final
Mdr cloud 040611_v4_final
Mauricio Godoy
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
Mauricio Godoy
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
Mauricio Godoy
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
Mauricio Godoy
 
Ibm cloud forum april - blue insight final
Ibm cloud forum  april - blue insight finalIbm cloud forum  april - blue insight final
Ibm cloud forum april - blue insight final
Mauricio Godoy
 
Cloud forum platform - from sap to new applications final a
Cloud forum   platform - from sap to new applications final aCloud forum   platform - from sap to new applications final a
Cloud forum platform - from sap to new applications final a
Mauricio Godoy
 
Marie and Beth AR Presentation - IMPACT
Marie and Beth AR Presentation - IMPACTMarie and Beth AR Presentation - IMPACT
Marie and Beth AR Presentation - IMPACT
Mauricio Godoy
 
Marie and Beth AR Presentation
Marie and Beth AR PresentationMarie and Beth AR Presentation
Marie and Beth AR Presentation
Mauricio Godoy
 
Welcome letter from phil gilbert with list of bpm customer speakers
Welcome letter from phil gilbert with list of bpm customer speakersWelcome letter from phil gilbert with list of bpm customer speakers
Welcome letter from phil gilbert with list of bpm customer speakers
Mauricio Godoy
 

More from Mauricio Godoy (20)

Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition StrategyPund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
 
BusinessWeek: The Presentation Secrets of Steve Jobs
BusinessWeek: The Presentation Secrets of Steve JobsBusinessWeek: The Presentation Secrets of Steve Jobs
BusinessWeek: The Presentation Secrets of Steve Jobs
 
Martin Wildberger Presentation
Martin Wildberger PresentationMartin Wildberger Presentation
Martin Wildberger Presentation
 
Big Data Whitepaper - Streams and Big Insights Integration Patterns
Big Data Whitepaper  - Streams and Big Insights Integration PatternsBig Data Whitepaper  - Streams and Big Insights Integration Patterns
Big Data Whitepaper - Streams and Big Insights Integration Patterns
 
Yahoo & Hadoop
Yahoo & HadoopYahoo & Hadoop
Yahoo & Hadoop
 
Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?
 
Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation Robert LeBlanc - Cloud Forum Presentation
Robert LeBlanc - Cloud Forum Presentation
 
The client defined cloud final clementi
The client defined cloud final clementiThe client defined cloud final clementi
The client defined cloud final clementi
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
 
Mdr cloud 040611_v4_final
Mdr cloud 040611_v4_finalMdr cloud 040611_v4_final
Mdr cloud 040611_v4_final
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 
Ibm cloud forum april - blue insight final
Ibm cloud forum  april - blue insight finalIbm cloud forum  april - blue insight final
Ibm cloud forum april - blue insight final
 
Cloud forum platform - from sap to new applications final a
Cloud forum   platform - from sap to new applications final aCloud forum   platform - from sap to new applications final a
Cloud forum platform - from sap to new applications final a
 
Press releases
Press releasesPress releases
Press releases
 
Cloud Update
Cloud UpdateCloud Update
Cloud Update
 
Marie and Beth AR Presentation - IMPACT
Marie and Beth AR Presentation - IMPACTMarie and Beth AR Presentation - IMPACT
Marie and Beth AR Presentation - IMPACT
 
Marie and Beth AR Presentation
Marie and Beth AR PresentationMarie and Beth AR Presentation
Marie and Beth AR Presentation
 
Welcome letter from phil gilbert with list of bpm customer speakers
Welcome letter from phil gilbert with list of bpm customer speakersWelcome letter from phil gilbert with list of bpm customer speakers
Welcome letter from phil gilbert with list of bpm customer speakers
 

Security cloud forum_2011

Editor's Notes

  1. Discuss 5 Attributes of Cloud and Impacts which they pose for Security
  2. Discuss initial phase of Cloud Computing
  3. How its focus shifted from cool technology to Cost Reduction Efforts
  4. How organizations begin to see the cloud as a means of increasing revenues
  5. Then seen as a transformative element, Shift of perception particularly by non IT organizations to leverage the cloud as a opportunity
  6. Focus on Competitive, Non Cloud vendors leveraging the cloud to convert internal APIs from Expenses to assets. Highlight Brinks Cloud based money management offering and fact that this shift has resulted in a change to how organizations operate.
  7. Introduce Network Workload Story and How perceptions changed (Angry Villagers Torches->agreement)
  8. Highlight the results of IBM network world tech debate, initial perceptions we lost then we ended up building momentum and more than 2/3 agreed with arguments, then lead to the 4 arguments used in the article.
  9. First those who adopt cloud based technologies do so in a deliberate way they start with individual workloads, we know from customers, market data etc that customers typically adopt one cloud then move to another etc.
  10. Currently organizations have no clue where there critical data is and as data grows exponentially its harder and harder for organizations to keep track of that data
  11. When we ask executives what their critical data is they cant tell us in fact the boundaries for what’s important and what is not important is completely lost, making it that much harder to really secure.
  12. As a result Security Personnel become great wall builders, the issue is that we continue to build walls and lose focus on what we are protecting and the various ways it can be exploited. We also lose the ability to granularly track information. This means we poke holes in ports for multiple applications etc meaning we degrade overall security
  13. Once an organization gains clarity of their information they can identify what really matters and leverage that asset
  14. Financially organizations benefit from cloud
  15. Organizations are spending less than in past, As a result there is less money to spend
  16. Inversely Cloud Vendors have money allocated for competitive reasons. Ultimately Security remains the only competitive lever most vendors can pull so it’ s a priority
  17. Organizations have to keep up with security
  18. Security requires vigilance organizations already are overloaded (tell story of startup from past history)
  19. Services allows them to ease the burden (Security as a Service Argument)
  20. Security skills are hard to find and security is hard
  21. Is this who you want doing your security
  22. Or do you want a professional
  23. Clouds have multiple delivery models – Note Gartner wants us to play this up more because they believe confusion on this topic and following slides. My approach is forget concepts of “The Cloud” its not a single entity but much more complex and interesting
  24. Play to Gartner and their args multiple deployment paths, talk security in context here. May need to cut short this is a long preso already
  25. The Message One Size doesn’ t fit all and btw there are lots of types of clouds. We need to hammer this home because we keep highlighting Public hosted not private.
  26. IBM is different, may update image to show lots of fishbowls moving back on horizon?
  27. Our 4 stage approach to cloud security.
  28. Standard secure by design refer to our experiences. We need to promote this more once we nail foundational controls tie to Rational/WebSphere/Information Management and Tivoli Cloud story. We have assets just need to cauterize story right now I seem to be only one giving it.
  29. This is where we engage in workload discussion, talk to each type of workload and how security varies ( actually only a couple otherwise takes wayy too long) Discuss Healthcare->Education->Development?
  30. LotusLive its easy and how security themes and our foundational strategy apply
  31. Explain Service Enabled,
  32. Researchy things like Lotus work the IPS stuff and Mobile work, we might want to include trusted domain and some of the other services we are exploring for example those in IM
  33. Our portfolio, WE have breadth and depth only vendor
  34. How we can focus on a private scenario
  35. Public example
  36. Whats new – TEMS, Juniper Partnership, WebSphere Virtuoso…
  37. Talk about challenges encourage consultative services Trusted Guide my usual blah blah