discover - securing your hybrid cloud

8
Securing Your Hybrid Cloud #HybridCloudTour Dan Wolff Program Director, Cloud Security Offering Management IBM Security [email protected]

Upload: laurenwendler

Post on 05-Jan-2017

51 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Discover - Securing Your Hybrid Cloud

Securing Your Hybrid Cloud

#HybridCloudTour

• Dan Wolff – Program Director, Cloud Security Offering ManagementIBM Security

[email protected]

Page 2: Discover - Securing Your Hybrid Cloud

#IBMCloudTour16

2

Cloud

Computing…

ElasticRapid Innovation

Less Costly

Secure?

Page 3: Discover - Securing Your Hybrid Cloud

#IBMCloudTour16

3

“My team is not equipped to manage

the increased employee usage

and demand for cloud”

Are you equipped to secure the cloud?

1 in3Fortune 1000 employees

upload corporate data to cloud apps

50%of millennials

use third-party cloud apps at work

10%of corporate data traffic

bypasses perimeter security and flows directly from

mobile devices to the cloud

Page 4: Discover - Securing Your Hybrid Cloud

#IBMCloudTour16

Cloud Specific Threats

4

• Lack of visibility• Shadow IT• Mobile• Data Loss

Page 5: Discover - Securing Your Hybrid Cloud

#IBMCloudTour16

Security in a Cloud Context

5

• Identity and access control• Data protection• Application security• Network security

Page 6: Discover - Securing Your Hybrid Cloud

#IBMCloudTour16

Brief Cloud Security Checklist• Get Access Under Control

• BYO- Tools, Policies and Processes

• Decide Whether to Prevent All Attacks or Detect and Respond

• Discover Rogue Web Usage, and Analyze the Threat

• Manage mobile security

• Match environment to data and security requirements

• Ensure contractual agreements that meet requirements you must meet.

• Strong provider access and compliance controls, SOC 1 and SOC 2 compliance

• Additional provider certifications: ISO 27001, PCI, HIPAA, FISMA NIST, CSA, CSCC

• Support mobile security linkage

• Cloud provider security ecosystem; integrates with security vendor products

• And Finally, Good Old Fashioned Diligence

6

Page 7: Discover - Securing Your Hybrid Cloud

#IBMCloudTour16

Don’t let security become a dead end for Cloud

7

Page 8: Discover - Securing Your Hybrid Cloud

#IBMCloudTour16

Learn More

• CISO's Guide to Enabling a Cloud Security Strategy (IDC white paper)

• Cyber Crime: Keeping Data Safe from Security Incursion (On-demand webinar)

• Security Intelligence https://securityintelligence.com

8