SlideShare una empresa de Scribd logo
1 de 63
Descargar para leer sin conexión
Andy Malone
The Cloud:

One small step for man. One giant leap for IT
Microsoft MVP (Enterprise Security)
Microsoft Certified Trainer (18 years)
Founder: Cybercrime Security Forum!
International Event Speaker
Winner: Microsoft Speaker Idol 2006

Andy Malone
(United Kingdom)

Follow me on Twitter
@AndyMalone
Agenda

Revolution
or Evolution

What drives
the cloud

Security &
Identity

Privacy &
Surveillance

The
Snowden
Effect

The future
The Journey from Revolution to Evolution

The Industrial
Revolution

The Industrial
Internet

1760 - 1840

2005 - Present

The Internet
Revolution

1980 - 2005
Revolution or Evolution
The Mainframe Era
The Home Computer Revolution
The PC Dream
The Internet Age
The Mobile Era
The Cloud Era
The Personal Computer Revolution
Storage Driven Revolution

Punched
Tape

Magnetic
Tape

Floppy
Disk

Compact
Disk &
Variants

Hard
Drive
HDD &
Variants

USB
Portable
Storage

Cloud
Storage
The Explosion of Data
• Challenges
•

•
•

Anytime, anywhere, any
device connectivity
Explosion of data in all areas
Discover, search, and analyze
information in near real-time

• Responses
•
•
•
•

Massive build-out of data
centers
Innovations in technologies
From infrastructure-focused to
user-centric deployment
New business models

Doubling
every
2 years
What drives the cloud?

Consumerism

High Speed
Connections

Elastic Data
Storage

Data center
Reliability

99.9% SLA

Simple
Management

Safe & Secure
The magic of Smart Innovation
The magic of software
Cloud Solutions
SaaS

Applications at Scale
(Software as a Service (End
(End users)

users)

Execution Platforms at Scale

PaaS (Platform as a Service) Developers
(Developers)
Infrastructure at Scale

IaaS (Infrastructure as a Service (Administrators
(System Administrators)
Enabling Technology (Cloud Service Delivery at Scale
(Public / Private Cloud Providers)
Cloud Service Delivery at Scale (Public / Private Cloud Providers)
Cisco Confidential
Cloud Deployment Models

Public
Cloud

Private
Cloud

Hybrid
Cloud

Virtual
Private
Cloud

Personal
Cloud
Hybrid IT

Microsoft
Solutions

Private

•
•
•

Hybrid Support & the Commons
First-party Applications
Total Cost of Ownership

Public

•
•
•

Hybrid Support & the Commons
First-party Applications
Higher-level Services
In the Cloud World: Size Matters
• Firstly many vendors are moving to
cloud hosted software
• As such…
– Smaller entities expected to migrate
fully to the cloud (e.g. Office 365)
– Medium entities will typically look at a
cloud or Hybrid solutions
– Larger entities may typically use Private
or Hybrid solutions
Identity & the Microsoft Cloud

• Separate credential from on-premises
credential
• Authentication occurs via cloud
directory service
• Password policy is stored in Office 365
• Does not require on-premises server
deployment

• Same credential as on-premises
credential
• Authentication occurs via on-premises
directory service
• Password policy is stored on-premises
• Requires on-premises DirSync server
• Solutions include Dirsync & Password
Sync
• Or Dirsync & On-premises ADFS server

Single Sign On!
What is Windows Azure Active Directory?
• Customized Version of ADLDS / ADAM
• Every Office 365 Customer is an Azure AD
Tennant
• Designed primarily to meet the needs of
cloud applications
• Extends Customers Active Directory into
the cloud
• Think of it as a Fish on a Hook!
• Identity as a service: essential part of
Platform as a Service
Relationship to Windows Server AD
• On-premises and cloud Active
Directory managed as one
• Directory information
synchronized to cloud, made
available to cloud apps via
roles-based access control

• Federated authentication
enables single sign on to cloud
applications
Why is WAAD So important

While enterprises work to consolidate identity system on-premises, cloud apps
are fragmenting identity… again
Knowing where your data is stored
Know where your Data is Stored

10 – 100 Datacenters (DCs) worldwide
Multiple Content Delivery Network (CDN)
“edge nodes” around the world
Datacenter network conn
Microsoft Cloud Principles
Or the Gotcha’s you need to understand!
Microsoft Cloud compliance
ISO27001
EU Model Clauses
Data Processing Agreement
US Health Insurance Portability and Accountability Act
EU Safe Harbor
Service Level Agreements (SLAs)
• Contract between customers
and service providers of the
level of service to be provided
• Contains performance metrics
(e.g., uptime, throughput,
response time)
• Problem management details
• Documented security
capabilities
• Contains penalties for nonperformance
Privacy in Office 365 & Windows Azure
The Microsoft strategy for privacy is to set a “high bar” around privacy practices that support global
standards for data handling and transfer

No Advertising
No advertising products out of Customer Data.
No scanning of email or documents to build analytics or mine data.

Data Portability
Office 365 Customer Data belongs to the customer.
Customers can export their data at any time.

No Mingling
Choices to keep Office 365 Customer Data separate from consumer services.
Comparison to the Consumer Cloud

...Everything is Cloud
Cisco Confidential
The Consumer Cloud
The Privacy Dilemma
• Facebook, Google, Skype, Twitter, LinkedIn
etc are all US BASED Companies. Who have
access to your data?
• Social-networking sites allow seemingly
trivial gossip to be distributed to a
worldwide audience, sometimes making
people the butt of rumours shared by
millions of users across the Internet
• Public sharing of private lives has led to a
rethinking of our current conceptions of
privacy
Facebook Privacy…Confusing!
The Consumer / Public Cloud Privacy Dilemma
Linked In
Additionally, you grant LinkedIn a nonexclusive, irrevocable, worldwide,
Facebook
perpetual, unlimited, assignable, sublicenseable, fully paid up and royaltyfree right to us to copy, prepare derivative works of, improve, distribute,
“You hereby grant Facebook an irrevocable, perpetual, non-exclusive,
publish, remove, retain, add, process, analyze, use and commercialize, in any
transferable, fully paid, worldwide license (with the right to sublicense) to (a)
way now known or in the future discovered, any information you provide,
use, copy, publish, stream, store, retain, publicly perform or display, transmit,
directly or indirectly to LinkedIn, including but not limited to any user
scan, reformat, modify, edit, frame, translate, excerpt, adapt, create
generated content, ideas, concepts, techniques or data to the services, you
derivative works and distribute (through multiple tiers), any User Content you
submit to LinkedIn, without any further consent, notice and/or
(i) Post on or in connection with the Facebook Service or the promotion
compensation to you or to any third parties. Any information you submit to
thereof subject only
us is at your own risk of loss. to your privacy settings or (ii) enable a user to Post,
including by offering a Share Link on your website and (b)
to use your name, likeness and image for any purpose, including commercial
or advertising, each of (a) and (b) on or in connection with the Facebook
Service or the promotion thereof. You may remove your User Content from
the Site at any time. If you choose to remove your User Content, the license
granted above will automatically expire, however you acknowledge that the
Company may retain archived copies of your User Content.”
Government Surveillance
Edward Snowden
• Revealed classified NSA details
of a global surveillance
apparatus run by the NSA and
its Five Eyes partners, and
numerous commercial and
international partners
• Release was called the most
significant leak in US history
Room 641A
Boundless Informant
• Powerful data mining tool for
recording and analysing of
intelligence
• Uses Big Data capture technology
& provides near real time
business intelligence to tactical &
strategic decision makers
• Looks for visible trends, Deep
metadata extraction
• Raw blob data analytics & back
end processing (MapReduce,
HDFS, Cloudbase)
The Technology behind Boundless Informant
•

•
•

•

•

CloudBase is an open source data
warehouse system for upto Pb scale
analytics
Built on top of Map-Reduce
architecture
Analyses using ANSI SQL to directly
query large-scale log files arising in web
site, telecommunications or IT
operations
Allows you to query flat log files using
ANSI SQL
Visit CloudBase home page for detailshttp://cloudbase.sourceforge.net
The Technology behind Boundless Informant
• MapReduce is based upon
Intel’s Predictive Analytics
platform for the capture and
analysis of Big blob data
• Combines Hardware &
Apache Hadoop Software
• Many applications including
commercial, military, energy
management etc
Project PRSIM
A word about NSA Suite B Encryption
Current NSA / CIA Surveillance Programs
•
•
•
•
•
•
•
•
•
•
•
•
•
•

Aircap
BlackPerl
Boundless Informant
Cineplex
XKeyscore
PRISM
Creek
Crossbones
Cultwave
Cultweave
Cybertrans
Dishfire
Double Arrow
Dragonfly

•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

Wealthy Cluster
Hightide
Skywriter
Jolly Rodger
Kingfish
Liquid fire
Messiah
Night surf
Normal Run
Mailorder
Pinwale
Taperplay
Tarotcard
Twisted Path
Yellowstone
“I have nothing to hide”
“For to be free is not
merely to cast off one's
chains, but to live in a way
that respects and
enhances the freedom of
others”
Nelson Mandela
“If there is no right to
privacy then there can be
no true freedom of
expression and therefore
no true democracy”
Dilma Vana Rousseff
Finding the Correct Balance!

Is it right that the foundational Technologies of the Internet, Cryptographic
Algorithms, Domain names, IP Address backbone be dominated by the One
Nation? Perhaps Is it time for this infrastructure to be internationally managed
Independently of any one Country?
Announcing:
Microsoft Bill V2.0…

A Bill in Everyone’s Home
Now Everyone Can Have One….
"The world as we have created
it is a process of our thinking. It
cannot be changed without
changing our thinking."
“It’s not about the destination. It’s about the journey”
Join me for my other NIC sessions…

Office 365
Security
Deep Dive

The new
Office 365
for IT Pro's

Migrating
to Office
365
Thank you
Please evaluate the session before
you leave


Más contenido relacionado

La actualidad más candente

DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing Janine Sneed
 
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -finalPeter de Haas
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted CloudMicrosoft
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacytmather
 
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...TechSoup
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Azure Cloud Security
Azure Cloud SecurityAzure Cloud Security
Azure Cloud SecurityAmmar Hasayen
 
CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White Skytap Cloud
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- orgDharmalingam S
 
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10TechSoup
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overviewdaklug
 
Den moderne arbejdsplads
Den moderne arbejdspladsDen moderne arbejdsplads
Den moderne arbejdspladsMicrosoft
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud ServicesDavid J Rosenthal
 

La actualidad más candente (20)

DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing
 
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted Cloud
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Azure Cloud Security
Azure Cloud SecurityAzure Cloud Security
Azure Cloud Security
 
CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White CAMP IT Slides - Skytap - Brian White
CAMP IT Slides - Skytap - Brian White
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
 
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
Webinar - Windows Server 2016 for Nonprofits and Libraries - 2017-01-10
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
Den moderne arbejdsplads
Den moderne arbejdspladsDen moderne arbejdsplads
Den moderne arbejdsplads
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 

Destacado

CTRjosh & bibi
CTRjosh & bibiCTRjosh & bibi
CTRjosh & bibibeeatrizee
 
Non stop monitoring and automation
Non stop monitoring and automationNon stop monitoring and automation
Non stop monitoring and automationWolfgang Breidbach
 
Tata Flat Products - Matrix Rewards
Tata Flat Products -  Matrix RewardsTata Flat Products -  Matrix Rewards
Tata Flat Products - Matrix Rewardsmatrikrewards
 
How to start learning in OTLE
How to start learning in OTLEHow to start learning in OTLE
How to start learning in OTLEfonglchong
 
Bucataria fara foc_-hrana_vie_in_238_de_retete
Bucataria fara foc_-hrana_vie_in_238_de_reteteBucataria fara foc_-hrana_vie_in_238_de_retete
Bucataria fara foc_-hrana_vie_in_238_de_reteteZoe Popescu
 
Ståle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeStåle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeNordic Infrastructure Conference
 
The impact of minimally invasive surgery on complex drg assignments
The impact of minimally invasive surgery on complex drg assignmentsThe impact of minimally invasive surgery on complex drg assignments
The impact of minimally invasive surgery on complex drg assignmentsVojislav Valcic MBA
 
Presentation1
Presentation1Presentation1
Presentation1jman0242
 
Ottimizzazione non lineare,Teorema di Lagrange e applicazione economica
Ottimizzazione non lineare,Teorema di Lagrange e applicazione economicaOttimizzazione non lineare,Teorema di Lagrange e applicazione economica
Ottimizzazione non lineare,Teorema di Lagrange e applicazione economicaAngela Berardinelli
 
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungleFredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungleNordic Infrastructure Conference
 
Tiscon - Matrix Rewards
Tiscon - Matrix RewardsTiscon - Matrix Rewards
Tiscon - Matrix Rewardsmatrikrewards
 
Manipulation techniques in journalism - Thesis by Maria Chiara Stefanelli
Manipulation techniques in journalism - Thesis by Maria Chiara StefanelliManipulation techniques in journalism - Thesis by Maria Chiara Stefanelli
Manipulation techniques in journalism - Thesis by Maria Chiara StefanelliMaria Chiara Stefanelli
 
Tata Tubes - Matrix Rewards
Tata Tubes - Matrix RewardsTata Tubes - Matrix Rewards
Tata Tubes - Matrix Rewardsmatrikrewards
 
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Nordic Infrastructure Conference
 
Advantage Edge - Matrix Rewards
Advantage Edge - Matrix RewardsAdvantage Edge - Matrix Rewards
Advantage Edge - Matrix Rewardsmatrikrewards
 

Destacado (20)

CTRjosh & bibi
CTRjosh & bibiCTRjosh & bibi
CTRjosh & bibi
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
Film Opening Conventions
Film Opening ConventionsFilm Opening Conventions
Film Opening Conventions
 
Non stop monitoring and automation
Non stop monitoring and automationNon stop monitoring and automation
Non stop monitoring and automation
 
Tata Flat Products - Matrix Rewards
Tata Flat Products -  Matrix RewardsTata Flat Products -  Matrix Rewards
Tata Flat Products - Matrix Rewards
 
How to start learning in OTLE
How to start learning in OTLEHow to start learning in OTLE
How to start learning in OTLE
 
Bucataria fara foc_-hrana_vie_in_238_de_retete
Bucataria fara foc_-hrana_vie_in_238_de_reteteBucataria fara foc_-hrana_vie_in_238_de_retete
Bucataria fara foc_-hrana_vie_in_238_de_retete
 
Ståle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchangeStåle Hansen - Understand how lync integrates with exchange
Ståle Hansen - Understand how lync integrates with exchange
 
Evaluation Question Two
Evaluation Question TwoEvaluation Question Two
Evaluation Question Two
 
The impact of minimally invasive surgery on complex drg assignments
The impact of minimally invasive surgery on complex drg assignmentsThe impact of minimally invasive surgery on complex drg assignments
The impact of minimally invasive surgery on complex drg assignments
 
dsreer
dsreerdsreer
dsreer
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ottimizzazione non lineare,Teorema di Lagrange e applicazione economica
Ottimizzazione non lineare,Teorema di Lagrange e applicazione economicaOttimizzazione non lineare,Teorema di Lagrange e applicazione economica
Ottimizzazione non lineare,Teorema di Lagrange e applicazione economica
 
AZ Fitness Brno
AZ Fitness Brno AZ Fitness Brno
AZ Fitness Brno
 
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungleFredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
 
Tiscon - Matrix Rewards
Tiscon - Matrix RewardsTiscon - Matrix Rewards
Tiscon - Matrix Rewards
 
Manipulation techniques in journalism - Thesis by Maria Chiara Stefanelli
Manipulation techniques in journalism - Thesis by Maria Chiara StefanelliManipulation techniques in journalism - Thesis by Maria Chiara Stefanelli
Manipulation techniques in journalism - Thesis by Maria Chiara Stefanelli
 
Tata Tubes - Matrix Rewards
Tata Tubes - Matrix RewardsTata Tubes - Matrix Rewards
Tata Tubes - Matrix Rewards
 
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
 
Advantage Edge - Matrix Rewards
Advantage Edge - Matrix RewardsAdvantage Edge - Matrix Rewards
Advantage Edge - Matrix Rewards
 

Similar a Andy Malone - Keynote: the cloud one small step for man one giant leap for it

Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project Ayush Mukherjee
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computingtntsa1972
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackLaurenWendler
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackLaurenWendler
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudInside Analysis
 
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Precisely
 
Keith Prabhu - Big Data Cloud Computing
Keith Prabhu - Big Data Cloud ComputingKeith Prabhu - Big Data Cloud Computing
Keith Prabhu - Big Data Cloud Computingadministrator_confidis
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Pres cloud computing
Pres cloud computingPres cloud computing
Pres cloud computingAdnan Malak
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingWilliam Pourmajidi
 
Cloud Innovation Tour - Design Track
Cloud Innovation Tour - Design TrackCloud Innovation Tour - Design Track
Cloud Innovation Tour - Design TrackLaurenWendler
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Microsoft Azure - Planning your move to the cloud
Microsoft Azure - Planning your move to the cloudMicrosoft Azure - Planning your move to the cloud
Microsoft Azure - Planning your move to the cloudScott Cameron
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxMuhammadArslan799356
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arcrajramab
 

Similar a Andy Malone - Keynote: the cloud one small step for man one giant leap for it (20)

Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
 
Keith Prabhu - Big Data Cloud Computing
Keith Prabhu - Big Data Cloud ComputingKeith Prabhu - Big Data Cloud Computing
Keith Prabhu - Big Data Cloud Computing
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Pres cloud computing
Pres cloud computingPres cloud computing
Pres cloud computing
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
 
Cloud Innovation Tour - Design Track
Cloud Innovation Tour - Design TrackCloud Innovation Tour - Design Track
Cloud Innovation Tour - Design Track
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
A journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercializationA journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercialization
 
Microsoft Azure - Planning your move to the cloud
Microsoft Azure - Planning your move to the cloudMicrosoft Azure - Planning your move to the cloud
Microsoft Azure - Planning your move to the cloud
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 

Más de Nordic Infrastructure Conference

Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Nordic Infrastructure Conference
 
Wally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerWally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerNordic Infrastructure Conference
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Nordic Infrastructure Conference
 
Scott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practicesScott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practicesNordic Infrastructure Conference
 
Scott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilienceScott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilienceNordic Infrastructure Conference
 
Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...Nordic Infrastructure Conference
 
Robert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occurRobert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occurNordic Infrastructure Conference
 
Peter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plusPeter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plusNordic Infrastructure Conference
 
Kåre Rude Andersen - Be a hero – optimize scom and present your services
Kåre Rude Andersen - Be a hero – optimize scom and present your servicesKåre Rude Andersen - Be a hero – optimize scom and present your services
Kåre Rude Andersen - Be a hero – optimize scom and present your servicesNordic Infrastructure Conference
 

Más de Nordic Infrastructure Conference (20)

Mike Resseler - Using hyper-v replica in your environment
Mike Resseler - Using hyper-v replica in your environmentMike Resseler - Using hyper-v replica in your environment
Mike Resseler - Using hyper-v replica in your environment
 
Mike Resseler - Deduplication in windows server 2012 r2
Mike Resseler - Deduplication in windows server 2012 r2Mike Resseler - Deduplication in windows server 2012 r2
Mike Resseler - Deduplication in windows server 2012 r2
 
Andy Malone - The new office 365 for it pro's
Andy Malone - The new office 365 for it pro'sAndy Malone - The new office 365 for it pro's
Andy Malone - The new office 365 for it pro's
 
Andy Malone - Migrating to office 365
Andy Malone - Migrating to office 365Andy Malone - Migrating to office 365
Andy Malone - Migrating to office 365
 
Andy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep diveAndy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep dive
 
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
Kent Agerlund - Via monstra part 4 become the hero of the day, master configm...
 
Wally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration managerWally Mead - Overview of system center 2012 r2 configuration manager
Wally Mead - Overview of system center 2012 r2 configuration manager
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Travis Wright - PS WF SMA SCSM SP
Travis Wright - PS WF SMA SCSM SPTravis Wright - PS WF SMA SCSM SP
Travis Wright - PS WF SMA SCSM SP
 
Travis Wright - Complete it service management
Travis Wright - Complete it service managementTravis Wright - Complete it service management
Travis Wright - Complete it service management
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
Scott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practicesScott Schnoll - Exchange server 2013 virtualization best practices
Scott Schnoll - Exchange server 2013 virtualization best practices
 
Scott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilienceScott Schnoll - Exchange server 2013 high availability and site resilience
Scott Schnoll - Exchange server 2013 high availability and site resilience
 
Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...Ståle Hansen - Understand how video works in lync and how video interoperabil...
Ståle Hansen - Understand how video works in lync and how video interoperabil...
 
Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1
 
Robert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occurRobert Waldinger - How to recover active directory if disaster should occur
Robert Waldinger - How to recover active directory if disaster should occur
 
Peter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plusPeter De Tender - The roadmap to deploying office365 pro plus
Peter De Tender - The roadmap to deploying office365 pro plus
 
Peter De Tender - How to efficiently license office 365
Peter De Tender - How to efficiently license office 365Peter De Tender - How to efficiently license office 365
Peter De Tender - How to efficiently license office 365
 
Sami Laiho - Black belt troubleshooting windows 8.1
Sami Laiho - Black belt troubleshooting windows 8.1Sami Laiho - Black belt troubleshooting windows 8.1
Sami Laiho - Black belt troubleshooting windows 8.1
 
Kåre Rude Andersen - Be a hero – optimize scom and present your services
Kåre Rude Andersen - Be a hero – optimize scom and present your servicesKåre Rude Andersen - Be a hero – optimize scom and present your services
Kåre Rude Andersen - Be a hero – optimize scom and present your services
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Andy Malone - Keynote: the cloud one small step for man one giant leap for it

  • 1.
  • 2. Andy Malone The Cloud: One small step for man. One giant leap for IT
  • 3.
  • 4. Microsoft MVP (Enterprise Security) Microsoft Certified Trainer (18 years) Founder: Cybercrime Security Forum! International Event Speaker Winner: Microsoft Speaker Idol 2006 Andy Malone (United Kingdom) Follow me on Twitter @AndyMalone
  • 5. Agenda Revolution or Evolution What drives the cloud Security & Identity Privacy & Surveillance The Snowden Effect The future
  • 6.
  • 7. The Journey from Revolution to Evolution The Industrial Revolution The Industrial Internet 1760 - 1840 2005 - Present The Internet Revolution 1980 - 2005
  • 8. Revolution or Evolution The Mainframe Era The Home Computer Revolution The PC Dream The Internet Age The Mobile Era The Cloud Era
  • 10. Storage Driven Revolution Punched Tape Magnetic Tape Floppy Disk Compact Disk & Variants Hard Drive HDD & Variants USB Portable Storage Cloud Storage
  • 11. The Explosion of Data • Challenges • • • Anytime, anywhere, any device connectivity Explosion of data in all areas Discover, search, and analyze information in near real-time • Responses • • • • Massive build-out of data centers Innovations in technologies From infrastructure-focused to user-centric deployment New business models Doubling every 2 years
  • 12. What drives the cloud? Consumerism High Speed Connections Elastic Data Storage Data center Reliability 99.9% SLA Simple Management Safe & Secure
  • 13. The magic of Smart Innovation
  • 14. The magic of software
  • 15. Cloud Solutions SaaS Applications at Scale (Software as a Service (End (End users) users) Execution Platforms at Scale PaaS (Platform as a Service) Developers (Developers) Infrastructure at Scale IaaS (Infrastructure as a Service (Administrators (System Administrators) Enabling Technology (Cloud Service Delivery at Scale (Public / Private Cloud Providers) Cloud Service Delivery at Scale (Public / Private Cloud Providers) Cisco Confidential
  • 17. Hybrid IT Microsoft Solutions Private • • • Hybrid Support & the Commons First-party Applications Total Cost of Ownership Public • • • Hybrid Support & the Commons First-party Applications Higher-level Services
  • 18. In the Cloud World: Size Matters • Firstly many vendors are moving to cloud hosted software • As such… – Smaller entities expected to migrate fully to the cloud (e.g. Office 365) – Medium entities will typically look at a cloud or Hybrid solutions – Larger entities may typically use Private or Hybrid solutions
  • 19.
  • 20. Identity & the Microsoft Cloud • Separate credential from on-premises credential • Authentication occurs via cloud directory service • Password policy is stored in Office 365 • Does not require on-premises server deployment • Same credential as on-premises credential • Authentication occurs via on-premises directory service • Password policy is stored on-premises • Requires on-premises DirSync server • Solutions include Dirsync & Password Sync • Or Dirsync & On-premises ADFS server Single Sign On!
  • 21. What is Windows Azure Active Directory? • Customized Version of ADLDS / ADAM • Every Office 365 Customer is an Azure AD Tennant • Designed primarily to meet the needs of cloud applications • Extends Customers Active Directory into the cloud • Think of it as a Fish on a Hook! • Identity as a service: essential part of Platform as a Service
  • 22. Relationship to Windows Server AD • On-premises and cloud Active Directory managed as one • Directory information synchronized to cloud, made available to cloud apps via roles-based access control • Federated authentication enables single sign on to cloud applications
  • 23. Why is WAAD So important While enterprises work to consolidate identity system on-premises, cloud apps are fragmenting identity… again
  • 24.
  • 25. Knowing where your data is stored
  • 26. Know where your Data is Stored 10 – 100 Datacenters (DCs) worldwide Multiple Content Delivery Network (CDN) “edge nodes” around the world Datacenter network conn
  • 27. Microsoft Cloud Principles Or the Gotcha’s you need to understand!
  • 28. Microsoft Cloud compliance ISO27001 EU Model Clauses Data Processing Agreement US Health Insurance Portability and Accountability Act EU Safe Harbor
  • 29. Service Level Agreements (SLAs) • Contract between customers and service providers of the level of service to be provided • Contains performance metrics (e.g., uptime, throughput, response time) • Problem management details • Documented security capabilities • Contains penalties for nonperformance
  • 30.
  • 31. Privacy in Office 365 & Windows Azure The Microsoft strategy for privacy is to set a “high bar” around privacy practices that support global standards for data handling and transfer No Advertising No advertising products out of Customer Data. No scanning of email or documents to build analytics or mine data. Data Portability Office 365 Customer Data belongs to the customer. Customers can export their data at any time. No Mingling Choices to keep Office 365 Customer Data separate from consumer services.
  • 32. Comparison to the Consumer Cloud ...Everything is Cloud Cisco Confidential
  • 33. The Consumer Cloud The Privacy Dilemma • Facebook, Google, Skype, Twitter, LinkedIn etc are all US BASED Companies. Who have access to your data? • Social-networking sites allow seemingly trivial gossip to be distributed to a worldwide audience, sometimes making people the butt of rumours shared by millions of users across the Internet • Public sharing of private lives has led to a rethinking of our current conceptions of privacy
  • 35. The Consumer / Public Cloud Privacy Dilemma Linked In Additionally, you grant LinkedIn a nonexclusive, irrevocable, worldwide, Facebook perpetual, unlimited, assignable, sublicenseable, fully paid up and royaltyfree right to us to copy, prepare derivative works of, improve, distribute, “You hereby grant Facebook an irrevocable, perpetual, non-exclusive, publish, remove, retain, add, process, analyze, use and commercialize, in any transferable, fully paid, worldwide license (with the right to sublicense) to (a) way now known or in the future discovered, any information you provide, use, copy, publish, stream, store, retain, publicly perform or display, transmit, directly or indirectly to LinkedIn, including but not limited to any user scan, reformat, modify, edit, frame, translate, excerpt, adapt, create generated content, ideas, concepts, techniques or data to the services, you derivative works and distribute (through multiple tiers), any User Content you submit to LinkedIn, without any further consent, notice and/or (i) Post on or in connection with the Facebook Service or the promotion compensation to you or to any third parties. Any information you submit to thereof subject only us is at your own risk of loss. to your privacy settings or (ii) enable a user to Post, including by offering a Share Link on your website and (b) to use your name, likeness and image for any purpose, including commercial or advertising, each of (a) and (b) on or in connection with the Facebook Service or the promotion thereof. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.”
  • 37.
  • 38.
  • 39. Edward Snowden • Revealed classified NSA details of a global surveillance apparatus run by the NSA and its Five Eyes partners, and numerous commercial and international partners • Release was called the most significant leak in US history
  • 41. Boundless Informant • Powerful data mining tool for recording and analysing of intelligence • Uses Big Data capture technology & provides near real time business intelligence to tactical & strategic decision makers • Looks for visible trends, Deep metadata extraction • Raw blob data analytics & back end processing (MapReduce, HDFS, Cloudbase)
  • 42. The Technology behind Boundless Informant • • • • • CloudBase is an open source data warehouse system for upto Pb scale analytics Built on top of Map-Reduce architecture Analyses using ANSI SQL to directly query large-scale log files arising in web site, telecommunications or IT operations Allows you to query flat log files using ANSI SQL Visit CloudBase home page for detailshttp://cloudbase.sourceforge.net
  • 43. The Technology behind Boundless Informant • MapReduce is based upon Intel’s Predictive Analytics platform for the capture and analysis of Big blob data • Combines Hardware & Apache Hadoop Software • Many applications including commercial, military, energy management etc
  • 45.
  • 46.
  • 47. A word about NSA Suite B Encryption
  • 48. Current NSA / CIA Surveillance Programs • • • • • • • • • • • • • • Aircap BlackPerl Boundless Informant Cineplex XKeyscore PRISM Creek Crossbones Cultwave Cultweave Cybertrans Dishfire Double Arrow Dragonfly • • • • • • • • • • • • • • • Wealthy Cluster Hightide Skywriter Jolly Rodger Kingfish Liquid fire Messiah Night surf Normal Run Mailorder Pinwale Taperplay Tarotcard Twisted Path Yellowstone
  • 49. “I have nothing to hide”
  • 50.
  • 51.
  • 52. “For to be free is not merely to cast off one's chains, but to live in a way that respects and enhances the freedom of others” Nelson Mandela
  • 53.
  • 54. “If there is no right to privacy then there can be no true freedom of expression and therefore no true democracy” Dilma Vana Rousseff
  • 55. Finding the Correct Balance! Is it right that the foundational Technologies of the Internet, Cryptographic Algorithms, Domain names, IP Address backbone be dominated by the One Nation? Perhaps Is it time for this infrastructure to be internationally managed Independently of any one Country?
  • 56.
  • 57.
  • 58. Announcing: Microsoft Bill V2.0… A Bill in Everyone’s Home Now Everyone Can Have One….
  • 59. "The world as we have created it is a process of our thinking. It cannot be changed without changing our thinking."
  • 60.
  • 61. “It’s not about the destination. It’s about the journey”
  • 62. Join me for my other NIC sessions… Office 365 Security Deep Dive The new Office 365 for IT Pro's Migrating to Office 365
  • 63. Thank you Please evaluate the session before you leave 