+ All Categories
Home > Technology > The Secure Path to Value in the Cloud by Denny Heaberlin

The Secure Path to Value in the Cloud by Denny Heaberlin

Date post: 13-Aug-2015
Category:
Upload: cloud-expo
View: 184 times
Download: 1 times
Share this document with a friend
Popular Tags:
22
© 2014 Windstream Communications, Inc. THE SECURE PATH TO VALUE IN THE CLOUD
Transcript

© 2014 Windstream Communications, Inc.

THE SECURE PATH TO VALUE IN THE CLOUD

Corporate Overview (Shameless Plug)

Data Breaches

Cloud for Growth

Security is a Concern

Choosing a Cloud Provider

Key Takeaways

AGENDA

14 EXPERIENCE

YEARS OF 500

BACKED BY A

FORTUNE

COMPANY

WE’RE PROVEN & STABLE

CUSTOMERS 2500 +

SMART SOLUTIONS

COMPLETE SECURITY PORTFOLIO

Managed Firewall Operating System

Hardening

Intrusion Detection DDoS Mitigation

Log Management Web Application Firewall

Threat Management Vulnerability Scanning

Monitoring VPN Services

Multi-factor Authentication

Physical Data Center Security

Anti-virus / Anti-Malware Services

Email Security

Global Load Balancing

Backed by policies and procedures that adhere to the CIA security policies model, Windstream custom delivers security solutions designed to meet your individual business needs, including:

Distributed Denial of Services Attacks – DDoS

3Gbps vs. 300Gbps

Data Breaches

2014 - Data breaches against major corporations, particularly retail

Shadow IT

FBI and Department of Homeland Security released a warning

SQL Injections

Unauthorized Database Access

TOP CYBER ATTACKS

CLOUD IS KEY FOR GROWTH

Oxford Economics conducted a national survey of 350 executives which shows that

cloud computing is fundamentally altering business processes and changing the way organizations interact with customers, partners and employees

Most say cloud is a key to their innovation strategy and is part of the long-range vision in the

next two years

Geographic expansion and new lines of business are seen as key goals enabled by the cloud

Collaboration among business units and partners, innovation, improved customer service, time to market and business agility are highly valued benefits of moving to the cloud

CLOUD MIGRATION CONCERNS

CLOUD MIGRATION CONCERNS

“Today, business is all about risk mitigation, transference, or acceptance. One of

the questions we have to constantly ask is whether we can lower our risk by

running an application in-house or in the cloud.”

– Kevin Buchanan, Director of IT Infrastructure at Randolph Hospital

CLOUD OR NO CLOUD?

COLLABORATION CONCERNS

INTERNET OF THINGS (IoT)

2003 2010 2015

By 2020 There Will Be FIFTY Billion

Source: Cisco

DURING 2008, THE NUMBER OF THINGS CONNECTED TO THE INTERNET EXCEEDED THE NUMBER OF PEOPLE ON EARTH.

“Many items, including mundane things like light bulbs and door locks, are

being hooked up to the internet by putting tiny computers into them and

adding wireless connectivity.

The problem is that these computers do not have enough processing power

to handle antivirus and other defenses found on a PC. The margins on them

are wafer-thin, so manufacturers have little scope for spending on security.

And the systems are being produced in vast quantities, so hackers finding a

flaw in one will be able to get into many others too.”

- The Economist, A Special Report on

Cyber Security, July 12, 2014

PARADIGM SHIFT

Perimeter Perimeterless

IT Silo Corporate Risk Management

Physical Virtual

On-premise Cloud, Mobile

Standalone Partnership

Static Dynamic

© Nemertes Research 2015 www.nemertes.com 1-888-241-2685 DN4047

PRIORITIZING SECURITY

CLOUD SECURITY IS DIFFERENT

“Decisions concerning the security of data

in the cloud has shifted from the IT room

to the boardroom, with 61% of companies

indicating that executives are now

involved in such decisions.”

Cloud Security Alliance, Cloud Security Alliance New Survey Finds Companies

are in the Dark on Shadow IT Usage, January 9, 2015

HOW TO CHOOSE THE RIGHT CLOUD PROVIDER

Review your network

configuration as a team prior to

the implementation of a solution.

Find a provider with the expertise

needed to implement a network security strategy.

Make sure the provider is PCI-

compliant and holds industry-

specific certifications.

Find a provider that offers

suggestions to complement your

existing network strategy.

Be sure the provider can meet or

exceed industry response times if urgent issues arise.

Avoid downtime. Choose a provider

with cloud-based services that can

bear the burden of an attack.

Obtain the full spectrum of

monitoring and reporting in order to

develop and optimize your strategy.

KEY TAKEAWAYS

Companies must ensure that Security is a top component in your IT culture

Companies must build their IT frameworks around robust and

comprehensive security

Simply ensuring that only approved programs can run on your

organization’s systems, regularly patching all software, educating

employees about cyber-risks and constantly monitoring networks would

help keep most intruders out

It is not IF, it is WHEN, and it comes down to how quickly you can respond

Leadership needs to incorporate cybersecurity considerations into product,

customer, and location decisions

Deploy and enforce effective governance and reporting for all critical data

Companies must select vendors with security in mind

Q & A SESSION


Recommended