SlideShare a Scribd company logo
CIO Forum:
Security, Compliance, & Cloud
February 19, 2015
JELECOS TODAY
Cloud Services
Application
Services
Strategic Advisory
Services
Managed Infrastructure
Managed Backup and
Recovery
Managed Security and
Compliance
Managed Storage
Discovery
Development
Optimization
Strategic Planning
Business/Tech Alignment
IT Governance
JELECOS – BUILT FOR COMPLIANCE
DILBERT ON SECURITY
IN THE SPOTLIGHT
Leon Thomas
President & CEO, Jelecos
OBJECTIVES
 Overview of changing cloud landscape
 Overview of changing compliance landscape (PCI-DSS 3.0)
 Evolution of hybrid cloud and compliance relationship
 New challenges have arrived
 Planning and next steps
FOOD FOR THOUGHT
 By 2020 cloud computing will cross the $270 billion mark.
 94% of managers say their business security has improved after adopting cloud
applications.
 91% of SMBs says their cloud providers made it easier to satisfy compliance
requirements.
 By 2016 36% of all data is expected to be stored in the cloud, up from 7% in 2013.
 90% of Microsoft's R&D budget is being used to improve cloud technology and
security services.
Source: http://blog.icorps.com/20-cloud-computing-facts-for-2015
CURRENT PLANS
What are your current plans?
You need more than one plan.
PCI-DSS 1…2…3
HIPAA-HITECH/Meaningful Use
Red Flag Rules
FISMA/NIST
Gramm-Leach-Bliley
Sarbanes-Oxley
FINRA
Cloud Adoption
IoT
BYOD
Storage Growth
Shadow ITITaaS
SSAE-16
Fabric
Infrastructure
Convergence
IMPACT AND COST OF BREACHES
o Malicious Breach
o 1/3 not caught by company defenses
o Average cost of $840,000 per breach
o Lost reputation and brand value
o Non-malicious Breach
o 1/3 identified accidentally
o Average cost of $470,000 per breach
o Lost reputation and brand value
WORLD’S BIGGEST DATA BREACHES
Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
SECURITY PREDICTIONS FOR 2015
0 2 4 6 8 10 12 14
Regulation, compliance & cyberinsurance
High-profile data breaches
Encryption & privacy
Mobile technology
IoT & critical infrastructure
Evolutions of existing cybersecurity solutions
New attack vectors & platforms
2015 Cybersecurity Predictions
Number of predictions
PCI DSS 3.0: COMMONLY ASKED QUESTIONS
 Why is there a new standard?
 Who does it affect?
 When is the PCI DSS 3.0 deadline?
 What does PCI DSS 3.0 mean for my business?
 How can I ensure compliance with PCI DSS 3.0?
CONTROL OF CLOUD BASED DATA
 The challenge of Cloud is data
management
 Data to a network or compute is transient
 Once data is placed in storage it has to be
managed for the long term
 Data protection, governance, security,…
 Maintain control of data
Controlled Data
Direct Connect Location
Cloud
Compute
Cloud
Storage
Controlled Data
On Premises
Customer
Provisioned
MPLS/VPN Network
Direct Connect
/
ExpressRoute
Capability
Cloud
Service
Provider
NetApp Private Storage
COMPLIANCE IN THE AGE OF BIG DATA
 Analytics derived from Big
Data becoming as valuable as
traditional enterprise data
 Often cloud solutions are the
only way to meet scalability,
performance and security
challenges posed by Big Data
COMPLIANCE IN THE AGE IOT
 IoT devices will grow from
~16B in 2014 to ~41B in 2020,
adding $10 – 15 trillion (yes,
with a “T”) to global GDP by
2035
 Guarding the gateways will be
essential to compliance and
security due to elongated and
fuzzy chain of custody
PLANNING YOUR 2015 CLOUD STRATEGY
Source: Computerworld 2015 Forecast Study
Top Five Tech Spending Increases in 2015
EVOLUTION OF THE HYBRID CLOUD
Four Steps to Ensuring Data Protection in the Hybrid Cloud
1. Ask the right questions of your cloud provider
2. Understand where you are vulnerable
3. Centralize governance and control of cloud deployments
4. Use solutions optimized for data protection
CONCEPTS TO WATCH
 PCI-DSS 3.0 Adoption – June 2015 Deadline
 VMWare vRealize suite
 Future of vCloud Director
 EVORail/Rack
SELF-ASSESSMENT
 How secure is your organization today?
 Do you consider security a competitive advantage?
 What is your organization saying (or not saying) to its current and prospective
customers and vendors about its security?
 Do you have an Incident Response Plan? If so, how current is it?
CHANGE OF MINDSET
Stop thinking
“If we get hacked”
and start thinking
“When we get hacked”.
THANKS FOR JOINING US THIS MORNING

More Related Content

PPTX
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
 
PDF
Trend Micro Solutions Overview
John D. Haden
 
PDF
Trend Micro 10 Minute Overview
John D. Haden
 
PDF
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
PPTX
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
PDF
Cyber security trends 2018
Ruchi Vishwakarma
 
PPTX
Business Continuity and app Security
Cristian Garcia G.
 
PDF
Windstream Managed Network Security Infographic
Ideba
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Aarkstore Enterprise
 
Trend Micro Solutions Overview
John D. Haden
 
Trend Micro 10 Minute Overview
John D. Haden
 
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
Cyber security trends 2018
Ruchi Vishwakarma
 
Business Continuity and app Security
Cristian Garcia G.
 
Windstream Managed Network Security Infographic
Ideba
 

What's hot (20)

PDF
Windstream Managed Network Security Ebook
Ideba
 
PPTX
Cybersecurity in the Era of IoT
Amy Daly
 
PDF
5 Security Trends to Watch in 2020
Dharmendra Rama
 
PDF
5 IoT challenges to be faced in 2018- Infographic
TestingXperts
 
PDF
Blockchain 101 for Financial Services
Appian
 
PDF
Security Everywhere: A Growth Engine for the Digital Economy
Cisco Russia
 
PDF
SecureMAG Volume 6 - 2014
Chin Wan Lim
 
PDF
BCS ITNow 201512 - Cyber Innovation
Gareth Niblett
 
PDF
Silicon Valley top 20
802 Secure, Inc
 
PDF
What has changed in Corporate Cybersecurity?
Nixu Corporation
 
PDF
Cybersecurity, a priority for leaders today. Not only operational and financi...
Andrea Mennillo
 
PPTX
Securing medical apps in the age of covid final
DevOps.com
 
PDF
Integrated Secure Networking - Fortinet
Harry Gunns
 
PDF
Top Cybersecurity Trends of 2021
Shawn Nutley
 
PDF
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
 
PDF
5 benefits that ai gives to cloud security venkat k - medium
usmsystem
 
PDF
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Citrix
 
PDF
Etude sur le marché de la cyber sécurité (2011)
PwC France
 
PDF
Cloud Identity
NetIQ
 
PDF
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Windstream Managed Network Security Ebook
Ideba
 
Cybersecurity in the Era of IoT
Amy Daly
 
5 Security Trends to Watch in 2020
Dharmendra Rama
 
5 IoT challenges to be faced in 2018- Infographic
TestingXperts
 
Blockchain 101 for Financial Services
Appian
 
Security Everywhere: A Growth Engine for the Digital Economy
Cisco Russia
 
SecureMAG Volume 6 - 2014
Chin Wan Lim
 
BCS ITNow 201512 - Cyber Innovation
Gareth Niblett
 
Silicon Valley top 20
802 Secure, Inc
 
What has changed in Corporate Cybersecurity?
Nixu Corporation
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Andrea Mennillo
 
Securing medical apps in the age of covid final
DevOps.com
 
Integrated Secure Networking - Fortinet
Harry Gunns
 
Top Cybersecurity Trends of 2021
Shawn Nutley
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
 
5 benefits that ai gives to cloud security venkat k - medium
usmsystem
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Citrix
 
Etude sur le marché de la cyber sécurité (2011)
PwC France
 
Cloud Identity
NetIQ
 
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Ad

Viewers also liked (15)

PDF
KARCHER_Katalog_Edition_1_5_GB
Valerie Wasson
 
PPTX
vishnu
gk743449
 
PDF
portfolio
Ryan Ross Jones
 
PDF
BenchmarkReportJune2014
Debbie Jowett
 
PPTX
Capston Project
Ryan Ross Jones
 
DOCX
SleepDeprivationPODDelta
Allyson Derrick
 
PPTX
Lord
gk743449
 
DOCX
Example Careplan
Allyson Derrick
 
DOCX
CV- Andy Clark 2015
Andy Clark
 
PDF
1.amalfi presentation updated
Debbie Jowett
 
PPTX
Risk based decision making - Rev 4
Julie Rodrigues Kraft
 
PPTX
Supplier Auditing
Julie Rodrigues Kraft
 
PPT
MTM Test Management System
Minu Mishra
 
DOC
ApplicationTestPlan[1]
Minu Mishra
 
DOC
QualityAssurancePlan
Minu Mishra
 
KARCHER_Katalog_Edition_1_5_GB
Valerie Wasson
 
vishnu
gk743449
 
portfolio
Ryan Ross Jones
 
BenchmarkReportJune2014
Debbie Jowett
 
Capston Project
Ryan Ross Jones
 
SleepDeprivationPODDelta
Allyson Derrick
 
Lord
gk743449
 
Example Careplan
Allyson Derrick
 
CV- Andy Clark 2015
Andy Clark
 
1.amalfi presentation updated
Debbie Jowett
 
Risk based decision making - Rev 4
Julie Rodrigues Kraft
 
Supplier Auditing
Julie Rodrigues Kraft
 
MTM Test Management System
Minu Mishra
 
ApplicationTestPlan[1]
Minu Mishra
 
QualityAssurancePlan
Minu Mishra
 
Ad

Similar to Security, Compliance and Cloud - Jelecos (20)

PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
PDF
Y20151003 IoT 資訊安全_趨勢科技分享
m12016changTIIMP
 
PDF
Cybersecurity Improvement eBook
Pablo Junco
 
PDF
IBM Spain BP Storage Day Inigo Osoro
Iñigo Osoro
 
PDF
Csa summit la transformación digital y el nuevo rol del ciso
CSA Argentina
 
PDF
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
PDF
Business with Cloud Computing
IMC Institute
 
PDF
Cybersecurity in the Cloud: Safer Than You Think
Appian
 
PPT
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
PDF
Why the cloud is a trend
MotherGuardians
 
PDF
Emerging Trends in Data Security for a Competitive Edge in 2024 and Beyond.pdf
Anil
 
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
PDF
The 5 most trusted cyber security companies to watch.
Merry D'souza
 
PDF
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
PDF
Global Cyber Security Overview | TechSci Research
TechSci Research
 
PDF
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
PDF
SMACIC_Clean
Assad Jees
 
PDF
Where Data Security and Value of Data Meet in the Cloud
Ulf Mattsson
 
PPTX
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Argyle Executive Forum
 
PDF
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
VMUG IT
 
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
Y20151003 IoT 資訊安全_趨勢科技分享
m12016changTIIMP
 
Cybersecurity Improvement eBook
Pablo Junco
 
IBM Spain BP Storage Day Inigo Osoro
Iñigo Osoro
 
Csa summit la transformación digital y el nuevo rol del ciso
CSA Argentina
 
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
Business with Cloud Computing
IMC Institute
 
Cybersecurity in the Cloud: Safer Than You Think
Appian
 
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
Why the cloud is a trend
MotherGuardians
 
Emerging Trends in Data Security for a Competitive Edge in 2024 and Beyond.pdf
Anil
 
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
The 5 most trusted cyber security companies to watch.
Merry D'souza
 
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
Global Cyber Security Overview | TechSci Research
TechSci Research
 
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
SMACIC_Clean
Assad Jees
 
Where Data Security and Value of Data Meet in the Cloud
Ulf Mattsson
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Argyle Executive Forum
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
VMUG IT
 

Recently uploaded (20)

PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 

Security, Compliance and Cloud - Jelecos

  • 1. CIO Forum: Security, Compliance, & Cloud February 19, 2015
  • 2. JELECOS TODAY Cloud Services Application Services Strategic Advisory Services Managed Infrastructure Managed Backup and Recovery Managed Security and Compliance Managed Storage Discovery Development Optimization Strategic Planning Business/Tech Alignment IT Governance
  • 3. JELECOS – BUILT FOR COMPLIANCE
  • 5. IN THE SPOTLIGHT Leon Thomas President & CEO, Jelecos
  • 6. OBJECTIVES  Overview of changing cloud landscape  Overview of changing compliance landscape (PCI-DSS 3.0)  Evolution of hybrid cloud and compliance relationship  New challenges have arrived  Planning and next steps
  • 7. FOOD FOR THOUGHT  By 2020 cloud computing will cross the $270 billion mark.  94% of managers say their business security has improved after adopting cloud applications.  91% of SMBs says their cloud providers made it easier to satisfy compliance requirements.  By 2016 36% of all data is expected to be stored in the cloud, up from 7% in 2013.  90% of Microsoft's R&D budget is being used to improve cloud technology and security services. Source: http://blog.icorps.com/20-cloud-computing-facts-for-2015
  • 8. CURRENT PLANS What are your current plans? You need more than one plan. PCI-DSS 1…2…3 HIPAA-HITECH/Meaningful Use Red Flag Rules FISMA/NIST Gramm-Leach-Bliley Sarbanes-Oxley FINRA Cloud Adoption IoT BYOD Storage Growth Shadow ITITaaS SSAE-16 Fabric Infrastructure Convergence
  • 9. IMPACT AND COST OF BREACHES o Malicious Breach o 1/3 not caught by company defenses o Average cost of $840,000 per breach o Lost reputation and brand value o Non-malicious Breach o 1/3 identified accidentally o Average cost of $470,000 per breach o Lost reputation and brand value
  • 10. WORLD’S BIGGEST DATA BREACHES Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 11. SECURITY PREDICTIONS FOR 2015 0 2 4 6 8 10 12 14 Regulation, compliance & cyberinsurance High-profile data breaches Encryption & privacy Mobile technology IoT & critical infrastructure Evolutions of existing cybersecurity solutions New attack vectors & platforms 2015 Cybersecurity Predictions Number of predictions
  • 12. PCI DSS 3.0: COMMONLY ASKED QUESTIONS  Why is there a new standard?  Who does it affect?  When is the PCI DSS 3.0 deadline?  What does PCI DSS 3.0 mean for my business?  How can I ensure compliance with PCI DSS 3.0?
  • 13. CONTROL OF CLOUD BASED DATA  The challenge of Cloud is data management  Data to a network or compute is transient  Once data is placed in storage it has to be managed for the long term  Data protection, governance, security,…  Maintain control of data Controlled Data Direct Connect Location Cloud Compute Cloud Storage Controlled Data On Premises Customer Provisioned MPLS/VPN Network Direct Connect / ExpressRoute Capability Cloud Service Provider NetApp Private Storage
  • 14. COMPLIANCE IN THE AGE OF BIG DATA  Analytics derived from Big Data becoming as valuable as traditional enterprise data  Often cloud solutions are the only way to meet scalability, performance and security challenges posed by Big Data
  • 15. COMPLIANCE IN THE AGE IOT  IoT devices will grow from ~16B in 2014 to ~41B in 2020, adding $10 – 15 trillion (yes, with a “T”) to global GDP by 2035  Guarding the gateways will be essential to compliance and security due to elongated and fuzzy chain of custody
  • 16. PLANNING YOUR 2015 CLOUD STRATEGY Source: Computerworld 2015 Forecast Study Top Five Tech Spending Increases in 2015
  • 17. EVOLUTION OF THE HYBRID CLOUD Four Steps to Ensuring Data Protection in the Hybrid Cloud 1. Ask the right questions of your cloud provider 2. Understand where you are vulnerable 3. Centralize governance and control of cloud deployments 4. Use solutions optimized for data protection
  • 18. CONCEPTS TO WATCH  PCI-DSS 3.0 Adoption – June 2015 Deadline  VMWare vRealize suite  Future of vCloud Director  EVORail/Rack
  • 19. SELF-ASSESSMENT  How secure is your organization today?  Do you consider security a competitive advantage?  What is your organization saying (or not saying) to its current and prospective customers and vendors about its security?  Do you have an Incident Response Plan? If so, how current is it?
  • 20. CHANGE OF MINDSET Stop thinking “If we get hacked” and start thinking “When we get hacked”.
  • 21. THANKS FOR JOINING US THIS MORNING