25
SECURING THE CLOUD IN A REGULATED WORLD www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors Thursday, April 24, 2014

SECURING THE CLOUD IN A REGULATED WORLD 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

Embed Size (px)

Citation preview

Page 1: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

SECURING THE CLOUD IN A REGULATED WORLD

www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

Detroit Data ConnectorsThursday, April 24, 2014

Page 2: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

WHO NEEDS CLOUD SECURITY?

Page 3: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

CLOUD TIPPING POINT SURPASSED

http://itknowledgeexchange.techtarget.com/cloud-computing-enterprise/is-a-new-journey-needed-for-business-critical-applications/

Page 4: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

2013 DATA BREACHES30% INCREASE IN THE NUMBER OF DATA BREACHES VS 2012

Identity Theft Research Center (http://www.idtheftcenter.org/)

Page 5: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

AVG BREACH COST TO A COMPANY

Ponemon Institute: 2013 Cost of Data Breach Study

Page 6: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

Ponemon Institute: 2013 Cost of Data Breach Study

DATA BREACHES COSTS/INDUSTRY

Page 7: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

• Continuous Compliance

• Defense-in-depth Security

• Enterprise-Class Data Protection

SECURE CLOUD STRATEGIES

Page 8: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

CONTINUOUS COMPLIANCE

• Culture of continuous compliance

• Auditor partnership

• Super-Audit

• Transparency

• Goal: Easing compliance burden for ourselves

and clients in regulated spaces

Page 9: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

POLL: WORST SECURITY THREAT?

• People

• Process

• Technology

Page 10: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

POLL: WORST SECURITY THREAT?

• People

• Process

• Technology

• ALL OF THE ABOVE

Page 11: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

HOLISTIC APPROACH TO SECURITY

people technology

process

Page 12: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

SECURITY: PEOPLE

Train staff

Train business associates

Page 13: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

SECURITY: PROCESS

Page 14: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

SECURITY: TECHNOLOGY

Page 15: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

HOLISTIC SECURITY

Page 16: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

SECURITY SAVINGS PER RECORD

Ponemon Institute: 2013 Cost of Data Breach Study

Page 17: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

• Establish & document your priorities–Isolation–Uptime–Performance–Scalability–Price

THE RIGHT CLOUD FOR YOU#1. KNOW THYSELF

Page 18: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

• Assess your tolerance for loss– What apps & data can you afford to lose?– How much $ does your business lose each

hour or day your cloud is down?– Does your backup plan match your risk

tolerance? Be honest!– Backing up your cloud onsite vs offsite – how

soon can you begin recovery efforts?

THE RIGHT CLOUD FOR YOU#2. WHAT ARE YOU WILLING TO LOSE?

Page 19: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

–What critical business MUST be met? • Performance?• Encryption?• Backup?• Do they work together?• Test those dependencies!

THE RIGHT CLOUD FOR YOU#3. CAN YOUR CLOUD PLAY NICE?

Page 20: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

SAMPLE CLOUD ARCHITECTURESMULTI-TENANT CLOUD

Use Cases• Designed for 99.999% uptime• Designed for live maintenance• Disaster recovery• Light to medium SaaS and E-

Commerce• Web servers• Application servers

– Including custom apps• Light to medium density Email

servers for SMB’s• Light to medium density

databases

Page 21: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

DEDICATED CLOUD

SAMPLE CLOUD ARCHITECTURES

Use Cases• Mid performance solution

optimized for isolation• Isolation conscious businesses

looking to adopt cloud• Designed for 99.99 % uptime• Designed for near-live

maintenance• Application Servers• Web servers • File Servers• Light to medium density Email

servers for SMB’s• Light to medium density databases

Page 22: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

VIRTUAL PRIVATE CLOUD

SAMPLE CLOUD ARCHITECTURES

Use Cases• Idea for Performance/elastic

conscious businesses looking to cloud

• Designed for 99.999 % uptime• Designed for live maintenance• Medium to high density SaaS and

E-Commerce• Web servers• Application servers

– Including custom apps• Medium to high density Email

servers for SMB’s• Medium to high density databases

Page 23: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

VIRTUAL DATA-CENTER-IN-A-BOX

SAMPLE CLOUD ARCHITECTURES

Use Cases• High performance solution optimized

for flexibility• Designed for 99.999% uptime• Designed for live maintenance• Disaster recovery• Web servers• Application servers

– Including custom apps• High to extreme SaaS and E-

Commerce• High to extreme density Email servers

for Enterprise• High to extreme density databases

– Including Oracle

Page 24: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

QUESTIONS?

Page 25: SECURING THE CLOUD IN A REGULATED WORLD  2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Detroit Data Connectors

www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020

Jason [email protected]

www.onlinetech.com 734-213-2020

CONTACT INFO: