SlideShare una empresa de Scribd logo
1 de 17
[object Object],[object Object],[object Object],CLOUDCAMP SYDNEY AUG 09 TMX: Real-time SaaS based Fraud Protection for eCommerce Payments, Dating/Social, Classifieds, Money Transfer, Virtual Goods
Anyone spent 10minutes with a security guy?
Anyone told Sales “its not ready to sell?”
Compromise: We’ll fix it later
Why put off until tomorrow  that you can do the day after? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
And then there is Outages
Gartner (July 2008) “ Cloud computing is the  least transparent  externally sourced delivery method,” “ [cloud] not only introduces the same risks as any externally provided service, it also includes some unique risk challenges.” reduced visibility, the complication of compliance, and the loss of control over the location of the data. Reliability and recoverability become a concern when outsourcing to a commodity provider, as does the viability of that supplier. “ assess the risks of using any cloud computing provider, and to demand greater transparency than many are currently willing to offer”
Cloud Security Alliance  wwwcloudsecurityallianceorg (I don’t speak for them, just talkin’ about them) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Activities ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is in the Guide?  (April 2009 edition is 80+ pages) ,[object Object],[object Object]
What is in the Guide?  (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So is CSA a good or bad thing? ” Yes”  if you don’t like  being pwned “ Yes”  if cloud is to be Long-term credible  Can create a perception of “one size fits all” Is this Sarbanes Oxley for service providers? “ No”  if it only benefits  big/incumbent vendors
A compliance comparison… Credit: Sense of Security and aisaorgau
Heartland was PCI Compliant
So…compliance does not always deliver what is needed but…
CSA: Call to Action ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
All your clouds must be transparent thanks! david DOT jones AT gmail DOT com @djinoz

Más contenido relacionado

La actualidad más candente

Consensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructureConsensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructureBlockchain Council
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compuANIL247048
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Wilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity CompanyWilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity Companywilsonconsulting1
 
Find the best cyebersecurity services
Find the best cyebersecurity servicesFind the best cyebersecurity services
Find the best cyebersecurity serviceswilsonconsulting1
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Mike Davis
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Trend_Micro_Collateral_Australian_Transit
Trend_Micro_Collateral_Australian_TransitTrend_Micro_Collateral_Australian_Transit
Trend_Micro_Collateral_Australian_TransitJames T. Kulig
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016Niran Seriki, CCISO, CISM
 
Braveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student ShowcaseBraveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student ShowcaseTravis McAdams
 
Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?Blockchain Council
 

La actualidad más candente (20)

Consensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructureConsensys and amd develop blockchain based cloud infrastructure
Consensys and amd develop blockchain based cloud infrastructure
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Wilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity CompanyWilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity Company
 
Find the best cyebersecurity services
Find the best cyebersecurity servicesFind the best cyebersecurity services
Find the best cyebersecurity services
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Trend_Micro_Collateral_Australian_Transit
Trend_Micro_Collateral_Australian_TransitTrend_Micro_Collateral_Australian_Transit
Trend_Micro_Collateral_Australian_Transit
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
 
Keith prabhu cloud security-public
Keith prabhu cloud security-publicKeith prabhu cloud security-public
Keith prabhu cloud security-public
 
Braveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student ShowcaseBraveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student Showcase
 
Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?Enterprise Ethereum : How It Differs From DLT?
Enterprise Ethereum : How It Differs From DLT?
 

Similar a Your clouds must be transparent - an intro to Cloud Security Alliance

Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
WP_ Five Reasons Why_Jan_2023.pdf
WP_ Five Reasons Why_Jan_2023.pdfWP_ Five Reasons Why_Jan_2023.pdf
WP_ Five Reasons Why_Jan_2023.pdfChristopher Doman
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskCloudMask inc.
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud EncryptionSamuel Borthwick
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxchristalgrieg
 
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxTrends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxwillcoxjanay
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
Five Reasons Why You Need Cloud Investigation & Response Automation
Five Reasons Why You Need Cloud Investigation & Response AutomationFive Reasons Why You Need Cloud Investigation & Response Automation
Five Reasons Why You Need Cloud Investigation & Response AutomationChristopher Doman
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 

Similar a Your clouds must be transparent - an intro to Cloud Security Alliance (20)

Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
WP_ Five Reasons Why_Jan_2023.pdf
WP_ Five Reasons Why_Jan_2023.pdfWP_ Five Reasons Why_Jan_2023.pdf
WP_ Five Reasons Why_Jan_2023.pdf
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docx
 
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxTrends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Five Reasons Why You Need Cloud Investigation & Response Automation
Five Reasons Why You Need Cloud Investigation & Response AutomationFive Reasons Why You Need Cloud Investigation & Response Automation
Five Reasons Why You Need Cloud Investigation & Response Automation
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 

Más de David Jones

Pointzi Android Developers Talk - June17
Pointzi Android Developers Talk - June17Pointzi Android Developers Talk - June17
Pointzi Android Developers Talk - June17David Jones
 
Automate Mobile Growth Hacking - 6 Easy Organic Tactics you should do
Automate Mobile Growth Hacking - 6 Easy Organic Tactics you should doAutomate Mobile Growth Hacking - 6 Easy Organic Tactics you should do
Automate Mobile Growth Hacking - 6 Easy Organic Tactics you should doDavid Jones
 
Mobile Engagement Automation - a Darwinian Guide to Customer Relationships
Mobile Engagement Automation - a Darwinian Guide to Customer RelationshipsMobile Engagement Automation - a Darwinian Guide to Customer Relationships
Mobile Engagement Automation - a Darwinian Guide to Customer RelationshipsDavid Jones
 
Why Streethawk re-wrote ibeacon handling on Android
Why Streethawk re-wrote ibeacon handling on AndroidWhy Streethawk re-wrote ibeacon handling on Android
Why Streethawk re-wrote ibeacon handling on AndroidDavid Jones
 
You've got an App - now what? Implementing your Engagement Strategy
You've got an App - now what? Implementing your Engagement StrategyYou've got an App - now what? Implementing your Engagement Strategy
You've got an App - now what? Implementing your Engagement StrategyDavid Jones
 
Talk on Products for Founders Institute - July 2014
Talk on Products for Founders Institute - July 2014Talk on Products for Founders Institute - July 2014
Talk on Products for Founders Institute - July 2014David Jones
 
Your CRM is Dead: what you need to know about Mobile Marketing Automation
Your CRM is Dead: what you need to know about Mobile Marketing AutomationYour CRM is Dead: what you need to know about Mobile Marketing Automation
Your CRM is Dead: what you need to know about Mobile Marketing AutomationDavid Jones
 
ibeacons, Privacy & Customer Segmentation - StreetHawk
ibeacons, Privacy & Customer Segmentation - StreetHawkibeacons, Privacy & Customer Segmentation - StreetHawk
ibeacons, Privacy & Customer Segmentation - StreetHawkDavid Jones
 
Get Users Back Into Your App! - Retention and Engagement
Get Users Back Into Your App! - Retention and EngagementGet Users Back Into Your App! - Retention and Engagement
Get Users Back Into Your App! - Retention and EngagementDavid Jones
 
Product Market Fit - lessons from the hampster wheel
Product Market Fit - lessons from the hampster wheelProduct Market Fit - lessons from the hampster wheel
Product Market Fit - lessons from the hampster wheelDavid Jones
 
Product/Market Fit Twists and Turns
Product/Market Fit  Twists and TurnsProduct/Market Fit  Twists and Turns
Product/Market Fit Twists and TurnsDavid Jones
 
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...David Jones
 
StreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasyStreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasyDavid Jones
 
Product/Market Fit - Twists and Turns
Product/Market Fit - Twists and TurnsProduct/Market Fit - Twists and Turns
Product/Market Fit - Twists and TurnsDavid Jones
 
Setting up for Global Success
Setting up  for Global SuccessSetting up  for Global Success
Setting up for Global SuccessDavid Jones
 
assert(CPA < LTV) - the most important line of code
assert(CPA < LTV)  - the most important line of code assert(CPA < LTV)  - the most important line of code
assert(CPA < LTV) - the most important line of code David Jones
 
Startup Metrics for Convicts
Startup Metrics for ConvictsStartup Metrics for Convicts
Startup Metrics for ConvictsDavid Jones
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web FraudDavid Jones
 
Skate to where the puck will be - cliche or axiom?
Skate to where the puck will be - cliche or axiom?Skate to where the puck will be - cliche or axiom?
Skate to where the puck will be - cliche or axiom?David Jones
 
Techy Things lawyers need to know
Techy Things lawyers need to knowTechy Things lawyers need to know
Techy Things lawyers need to knowDavid Jones
 

Más de David Jones (20)

Pointzi Android Developers Talk - June17
Pointzi Android Developers Talk - June17Pointzi Android Developers Talk - June17
Pointzi Android Developers Talk - June17
 
Automate Mobile Growth Hacking - 6 Easy Organic Tactics you should do
Automate Mobile Growth Hacking - 6 Easy Organic Tactics you should doAutomate Mobile Growth Hacking - 6 Easy Organic Tactics you should do
Automate Mobile Growth Hacking - 6 Easy Organic Tactics you should do
 
Mobile Engagement Automation - a Darwinian Guide to Customer Relationships
Mobile Engagement Automation - a Darwinian Guide to Customer RelationshipsMobile Engagement Automation - a Darwinian Guide to Customer Relationships
Mobile Engagement Automation - a Darwinian Guide to Customer Relationships
 
Why Streethawk re-wrote ibeacon handling on Android
Why Streethawk re-wrote ibeacon handling on AndroidWhy Streethawk re-wrote ibeacon handling on Android
Why Streethawk re-wrote ibeacon handling on Android
 
You've got an App - now what? Implementing your Engagement Strategy
You've got an App - now what? Implementing your Engagement StrategyYou've got an App - now what? Implementing your Engagement Strategy
You've got an App - now what? Implementing your Engagement Strategy
 
Talk on Products for Founders Institute - July 2014
Talk on Products for Founders Institute - July 2014Talk on Products for Founders Institute - July 2014
Talk on Products for Founders Institute - July 2014
 
Your CRM is Dead: what you need to know about Mobile Marketing Automation
Your CRM is Dead: what you need to know about Mobile Marketing AutomationYour CRM is Dead: what you need to know about Mobile Marketing Automation
Your CRM is Dead: what you need to know about Mobile Marketing Automation
 
ibeacons, Privacy & Customer Segmentation - StreetHawk
ibeacons, Privacy & Customer Segmentation - StreetHawkibeacons, Privacy & Customer Segmentation - StreetHawk
ibeacons, Privacy & Customer Segmentation - StreetHawk
 
Get Users Back Into Your App! - Retention and Engagement
Get Users Back Into Your App! - Retention and EngagementGet Users Back Into Your App! - Retention and Engagement
Get Users Back Into Your App! - Retention and Engagement
 
Product Market Fit - lessons from the hampster wheel
Product Market Fit - lessons from the hampster wheelProduct Market Fit - lessons from the hampster wheel
Product Market Fit - lessons from the hampster wheel
 
Product/Market Fit Twists and Turns
Product/Market Fit  Twists and TurnsProduct/Market Fit  Twists and Turns
Product/Market Fit Twists and Turns
 
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...assert(CPA < LTV)  - the most important line of code (AKA Startup Metrics ...
assert(CPA < LTV) - the most important line of code (AKA Startup Metrics ...
 
StreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasyStreetHawk for ISV SpeakEasy
StreetHawk for ISV SpeakEasy
 
Product/Market Fit - Twists and Turns
Product/Market Fit - Twists and TurnsProduct/Market Fit - Twists and Turns
Product/Market Fit - Twists and Turns
 
Setting up for Global Success
Setting up  for Global SuccessSetting up  for Global Success
Setting up for Global Success
 
assert(CPA < LTV) - the most important line of code
assert(CPA < LTV)  - the most important line of code assert(CPA < LTV)  - the most important line of code
assert(CPA < LTV) - the most important line of code
 
Startup Metrics for Convicts
Startup Metrics for ConvictsStartup Metrics for Convicts
Startup Metrics for Convicts
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
 
Skate to where the puck will be - cliche or axiom?
Skate to where the puck will be - cliche or axiom?Skate to where the puck will be - cliche or axiom?
Skate to where the puck will be - cliche or axiom?
 
Techy Things lawyers need to know
Techy Things lawyers need to knowTechy Things lawyers need to know
Techy Things lawyers need to know
 

Último

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Your clouds must be transparent - an intro to Cloud Security Alliance

  • 1.
  • 2. Anyone spent 10minutes with a security guy?
  • 3. Anyone told Sales “its not ready to sell?”
  • 5.
  • 6. And then there is Outages
  • 7. Gartner (July 2008) “ Cloud computing is the least transparent externally sourced delivery method,” “ [cloud] not only introduces the same risks as any externally provided service, it also includes some unique risk challenges.” reduced visibility, the complication of compliance, and the loss of control over the location of the data. Reliability and recoverability become a concern when outsourcing to a commodity provider, as does the viability of that supplier. “ assess the risks of using any cloud computing provider, and to demand greater transparency than many are currently willing to offer”
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. So is CSA a good or bad thing? ” Yes” if you don’t like being pwned “ Yes” if cloud is to be Long-term credible Can create a perception of “one size fits all” Is this Sarbanes Oxley for service providers? “ No” if it only benefits big/incumbent vendors
  • 13. A compliance comparison… Credit: Sense of Security and aisaorgau
  • 14. Heartland was PCI Compliant
  • 15. So…compliance does not always deliver what is needed but…
  • 16.
  • 17. All your clouds must be transparent thanks! david DOT jones AT gmail DOT com @djinoz

Notas del editor

  1. Maybe I need a random comment on slide #1 to get slideshare to see slidenotes 08/28/09