Enviar búsqueda
Cargar
Clouds And Security
•
Descargar como PPT, PDF
•
1 recomendación
•
560 vistas
Predrag Mitrovic
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 64
Descargar ahora
Recomendados
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Issa 042711
Issa 042711
Erin Banks
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Edureka!
CloudPassage Overview
CloudPassage Overview
CloudPassage
AWS User Group - Security & Compliance
AWS User Group - Security & Compliance
Satish Kumar Natarajan
Security on AWS
Security on AWS
Amazon Web Services LATAM
Cloud security
Cloud security
François Boucher
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
Recomendados
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Issa 042711
Issa 042711
Erin Banks
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Edureka!
CloudPassage Overview
CloudPassage Overview
CloudPassage
AWS User Group - Security & Compliance
AWS User Group - Security & Compliance
Satish Kumar Natarajan
Security on AWS
Security on AWS
Amazon Web Services LATAM
Cloud security
Cloud security
François Boucher
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
F5 Programmability & Orchestration
F5 Programmability & Orchestration
MarketingArrowECS_CZ
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
Amazon Web Services
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
Kenny Buntinx
What is ransomware?
What is ransomware?
Francisco Diaz III
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
Modern Security for the Modern Data Center
Modern Security for the Modern Data Center
VMware
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
Amazon Web Services
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
DATA SECURITY SOLUTIONS
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
craigbalding
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Karim Hopper
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Jean-François LOMBARDO
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
Brian Andrzejewski
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
YounesChafi1
Securing Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
School Vegetable Gardening - Victory Gardens
Retractable roof greenhouse production system
Retractable roof greenhouse production system
Rajender Thakur
Más contenido relacionado
La actualidad más candente
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
F5 Programmability & Orchestration
F5 Programmability & Orchestration
MarketingArrowECS_CZ
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
Amazon Web Services
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
Kenny Buntinx
What is ransomware?
What is ransomware?
Francisco Diaz III
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
Modern Security for the Modern Data Center
Modern Security for the Modern Data Center
VMware
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
Amazon Web Services
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
DATA SECURITY SOLUTIONS
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
craigbalding
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Karim Hopper
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Jean-François LOMBARDO
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
Brian Andrzejewski
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
YounesChafi1
Securing Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
La actualidad más candente
(20)
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
F5 Programmability & Orchestration
F5 Programmability & Orchestration
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
What is ransomware?
What is ransomware?
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
Modern Security for the Modern Data Center
Modern Security for the Modern Data Center
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
ThreatStack Session: A Tale of Security & Ops Teamwork for Rapid Security Inc...
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
Securing Applications in the Cloud
Securing Applications in the Cloud
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Destacado
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
School Vegetable Gardening - Victory Gardens
Retractable roof greenhouse production system
Retractable roof greenhouse production system
Rajender Thakur
Net zero house
Net zero house
Suzanne Ga San Roman
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
Академия интернет-маркетинга «WebPromoExperts»
net house cultivation of vegetables in Punjab An Economic Analysis
net house cultivation of vegetables in Punjab An Economic Analysis
ramanraman
Plant tissue culture
Plant tissue culture
Sir Parashurambhau College, Pune
Destacado
(6)
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Net House Vegetable Production - Pest Management Successes & Challenges; Gard...
Retractable roof greenhouse production system
Retractable roof greenhouse production system
Net zero house
Net zero house
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
Основы веб-аналитики: учим сайт продавать. Вебинар WebPromoExperts #209
net house cultivation of vegetables in Punjab An Economic Analysis
net house cultivation of vegetables in Punjab An Economic Analysis
Plant tissue culture
Plant tissue culture
Similar a Clouds And Security
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story Craig Balding
craigbalding
Ampi vmware
Ampi vmware
anapelizondo
040711 webcast securing vmachine
040711 webcast securing vmachine
Erin Banks
Implementing Governance as Code
Implementing Governance as Code
Amazon Web Services
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
ICT-Partners
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
Risk Crew
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
HostedbyConfluent
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
rpark31
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
Amazon Web Services
Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
Amazon Web Services
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Morgan Simonsen
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
Amazon Web Services
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
CA Nimsoft
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
CA Technologies
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
anupriti
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
Dell Technologies
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
Virtualization presentation
Virtualization presentation
Mangesh Gunjal
Automating your AWS Security Operations
Automating your AWS Security Operations
Evident.io
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Tom Laszewski
Similar a Clouds And Security
(20)
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story Craig Balding
Ampi vmware
Ampi vmware
040711 webcast securing vmachine
040711 webcast securing vmachine
Implementing Governance as Code
Implementing Governance as Code
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Building Real-Time Serverless Data Applications With Joseph Morais and Adam W...
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
Virtualization presentation
Virtualization presentation
Automating your AWS Security Operations
Automating your AWS Security Operations
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Building a Hybrid Cloud Architecture Utilizing AWS Landing Zones
Más de Predrag Mitrovic
Nygammalt om molnlöftet
Nygammalt om molnlöftet
Predrag Mitrovic
Personlig vision och skapande
Personlig vision och skapande
Predrag Mitrovic
Strategi, kompetens och utveckling
Strategi, kompetens och utveckling
Predrag Mitrovic
Information om e-grannar
Information om e-grannar
Predrag Mitrovic
Identiteter nordic edge april 2011
Identiteter nordic edge april 2011
Predrag Mitrovic
Agility computing itarc2011
Agility computing itarc2011
Predrag Mitrovic
Agility computing itarc2011
Agility computing itarc2011
Predrag Mitrovic
Sig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & Molnsäkerhet
Predrag Mitrovic
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till höger
Predrag Mitrovic
Cloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till höger
Predrag Mitrovic
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTX
Predrag Mitrovic
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPT
Predrag Mitrovic
Cloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-format
Predrag Mitrovic
Dokumenthantering i molnet
Dokumenthantering i molnet
Predrag Mitrovic
Cloud strategy briefing 101
Cloud strategy briefing 101
Predrag Mitrovic
Predrag cv short english
Predrag cv short english
Predrag Mitrovic
Cloud Sweden Charter English
Cloud Sweden Charter English
Predrag Mitrovic
Cloud Sweden Charter English
Cloud Sweden Charter English
Predrag Mitrovic
Cloud Sweden Kick-off
Cloud Sweden Kick-off
Predrag Mitrovic
Cloud Sweden Kick-Off
Cloud Sweden Kick-Off
Predrag Mitrovic
Más de Predrag Mitrovic
(20)
Nygammalt om molnlöftet
Nygammalt om molnlöftet
Personlig vision och skapande
Personlig vision och skapande
Strategi, kompetens och utveckling
Strategi, kompetens och utveckling
Information om e-grannar
Information om e-grannar
Identiteter nordic edge april 2011
Identiteter nordic edge april 2011
Agility computing itarc2011
Agility computing itarc2011
Agility computing itarc2011
Agility computing itarc2011
Sig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & Molnsäkerhet
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till höger
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-format
Dokumenthantering i molnet
Dokumenthantering i molnet
Cloud strategy briefing 101
Cloud strategy briefing 101
Predrag cv short english
Predrag cv short english
Cloud Sweden Charter English
Cloud Sweden Charter English
Cloud Sweden Charter English
Cloud Sweden Charter English
Cloud Sweden Kick-off
Cloud Sweden Kick-off
Cloud Sweden Kick-Off
Cloud Sweden Kick-Off
Último
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Último
(20)
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Clouds And Security
1.
Cloud Computing =
.COM 2.0? Predrag Mitrovic, CISSP, CISM, Author [email_address]
2.
2 minute bio
www.cloudadvisor.se
3.
www.cloudadvisor.se
4.
www.cloudadvisor.se
5.
1990 Botkyrka kommun
www.cloudadvisor.se
6.
www.cloudadvisor.se 1995 IDG
Nätverk & Kommunikation
7.
1997 NetHouse Konsult
& Media www.cloudadvisor.se
8.
www.cloudadvisor.se 1999 Novell
EMEA
9.
2000 Microsoft www.cloudadvisor.se
10.
www.cloudadvisor.se 2007 LabCenter
11.
www.cloudadvisor.se October 1st
MyNethouse
12.
www.cloudadvisor.se
13.
www.cloudadvisor.se
14.
15.
www.cloudadvisor.se
16.
Security-as-a-Service Storage-as-a-Service Integration-as-a-Service
Database-as-a-Service Information-as-a-Service Process-as-a-Service Application-as-a-Service Platform-as-a-Service Management/Governance-as-a-Service Testing-as-a-Service
17.
18.
19.
20.
The idea Shared
infrastructure www.cloudadvisor.se Server OS Database App Server Storage Network App 1 Server OS Database App Server Storage Network App 2 Server OS Database App Server Storage Network App 100
21.
22.
23.
24.
IaaS example www.cloudadvisor.se
25.
PaaS examples www.cloudadvisor.se
26.
SaaS examples www.cloudadvisor.se
27.
www.cloudadvisor.se
28.
www.cloudadvisor.se
29.
www.cloudadvisor.se
30.
Security in the
clouds
31.
Storage Virtualized resources
Virtuell Image 1 Virtual Image.. n Virtual Image 1 Security www.cloudadvisor.se CPU, RAM, Networking SW Kernel (OS & VM) Cloud applications Risk Governance Lifecycle mgmt AAA Auditing Security in- depth Incident mgmt
32.
33.
34.
35.
36.
37.
38.
39.
Risk management www.cloudadvisor.se
40.
41.
Governance www.cloudadvisor.se
42.
43.
Legal www.cloudadvisor.se
44.
45.
Compliance & Audit
www.cloudadvisor.se
46.
47.
ILM www.cloudadvisor.se
48.
49.
Portability & Interoperability
www.cloudadvisor.se
50.
51.
Identity www.cloudadvisor.se
52.
53.
Datacenter operations www.cloudadvisor.se
54.
55.
Incident handling www.cloudadvisor.se
56.
57.
Conclusions www.cloudadvisor.se
58.
Cloud Computing is
built on known technology – but the risks are definitively virgin territory! www.cloudadvisor.se
59.
There are loads
of exciting opportunities – open to all! www.cloudadvisor.se
60.
Business demands results
without ”whining and but´s” – handle it or be bypassed and marginalized! www.cloudadvisor.se
61.
Why not implement
the philosophy of the cloud in your IT? www.cloudadvisor.se
62.
63.
64.
Descargar ahora