3. #IBMCloudTour16
3
“My team is not equipped to manage
the increased employee usage
and demand for cloud”
Are you equipped to secure the cloud?
1in 3
Fortune 1000 employees
upload corporate
data to cloud apps
50%
of millennials
use third-party
cloud apps at work
10%
of corporate data traffic
bypasses perimeter security
and flows directly from
mobile devices to the cloud
5. #IBMCloudTour16
Security in a Cloud Context
5
• Identity and access control
• Data protection
• Application security
• Network security
6. #IBMCloudTour16
Brief Cloud Security Checklist
• Get Access Under Control
• BYO- Tools, Policies and Processes
• Decide Whether to Prevent All Attacks or Detect and Respond
• Discover Rogue Web Usage, and Analyze the Threat
• Manage mobile security
• Match environment to data and security requirements
• Ensure contractual agreements that meet requirements you must meet.
• Strong provider access and compliance controls, SOC 1 and SOC 2 compliance
• Additional provider certifications: ISO 27001, PCI, HIPAA, FISMA NIST, CSA, CSCC
• Support mobile security linkage
• Cloud provider security ecosystem; integrates with security vendor products
• And Finally, Good Old Fashioned Diligence
6