Securing Buy-in Step 5: Securing Buy-in. Securing Buy-in Securing Buy-in Our Roadmap.
Discover - Securing Your Hybrid Cloud
-
Upload
laurenwendler -
Category
Technology
-
view
51 -
download
0
Transcript of Discover - Securing Your Hybrid Cloud
Securing Your Hybrid Cloud
#HybridCloudTour
• Dan Wolff – Program Director, Cloud Security Offering ManagementIBM Security
#IBMCloudTour16
2
Cloud
Computing…
ElasticRapid Innovation
Less Costly
Secure?
#IBMCloudTour16
3
“My team is not equipped to manage
the increased employee usage
and demand for cloud”
Are you equipped to secure the cloud?
1 in3Fortune 1000 employees
upload corporate data to cloud apps
50%of millennials
use third-party cloud apps at work
10%of corporate data traffic
bypasses perimeter security and flows directly from
mobile devices to the cloud
#IBMCloudTour16
Cloud Specific Threats
4
• Lack of visibility• Shadow IT• Mobile• Data Loss
#IBMCloudTour16
Security in a Cloud Context
5
• Identity and access control• Data protection• Application security• Network security
#IBMCloudTour16
Brief Cloud Security Checklist• Get Access Under Control
• BYO- Tools, Policies and Processes
• Decide Whether to Prevent All Attacks or Detect and Respond
• Discover Rogue Web Usage, and Analyze the Threat
• Manage mobile security
• Match environment to data and security requirements
• Ensure contractual agreements that meet requirements you must meet.
• Strong provider access and compliance controls, SOC 1 and SOC 2 compliance
• Additional provider certifications: ISO 27001, PCI, HIPAA, FISMA NIST, CSA, CSCC
• Support mobile security linkage
• Cloud provider security ecosystem; integrates with security vendor products
• And Finally, Good Old Fashioned Diligence
6
#IBMCloudTour16
Don’t let security become a dead end for Cloud
7
#IBMCloudTour16
Learn More
• CISO's Guide to Enabling a Cloud Security Strategy (IDC white paper)
• Cyber Crime: Keeping Data Safe from Security Incursion (On-demand webinar)
• Security Intelligence https://securityintelligence.com
8