SlideShare a Scribd company logo
1 of 22
Is cloud secure or not?
Jānis Bērziņš, DPA Senior Infrastructure Solutions Consultant
Aigars Jaundalders, DPA Head of Business Start up Group
Is cloud secure
or not?
Facts and
numbers
Cloud security IdentityWhat is
information
security?
Microsoft Azure
What is information security?
3
Insufficient knowledge and
risk of a security breach are
the main factors
Small and medium enterprises:
Large enterprises:
Microsoft Azure
IT security statistics don’t change
SIMPLE ATTACKS
96%
VERY FEW
SECURITY
BREACHES IN THE
PUBLIC CLOUD
«TO DATE, THERE HAVE BEEN
Gartner Inc.
- MOST BREACHES
CONTINUE TO INVOLVE
ON-PREMISES DATA
CENTER ENVIRONMENTS.»
Customer Cloud provider
On-Premises
Infrastructure
as a Service
Platform
as a Service
Software
as a Service
Networking
Hardware
Physical Security
Operating System
Middleware
Virtualization
Data
Applications
Users
Shared responsibility
REDUCES SECURITY COSTS + MAINTAINS FLEXIBILITY, ACCESS, & CONTROL
Cameras
24X7 security staff
Barriers
Fencing
Alarms
Two-factor access control:
Biometric readers & card
readers
Security operations center
Days of backup power
Seismic bracing
BuildingPerimeter Computer room
Physical security
Infrastructure security
11
Systems
management
& monitoring
Threat
defense
Physical &
logical security
Network protection
Network
Security
Groups
Cloud to
on-premises
connections
Virtual
Networks
Data security
Securing
data at rest
Data
segregation
Encryption for
data in transit
Expanded ecosystem of partner solutions
Security partners
Where my data is located?
Where my data is located?
Note: Microsoft Azure data centers, Australia – Q2 FY15
AZURE:
• Creates three copies of data in each
datacenter
• Offers geo-replication in a datacenter
hundreds of miles away
• Does not transfer Customer Data
outside of a geo (ex: from US to
Europe or from Asia to US)
CUSTOMER:
• Chooses where data resides
• Configures data replication options
Does cloud provider access my data?
18
Does cloud provider access my data?
Pre-screened Admin
requests access
Leadership grants
temporary privilege
• No standing access to the Customer Data
• Grants least privilege required to complete task
• Multi-factor authentication required for all administration
• Access requests are audited, logged, and reviewed
Just in Time
&
Role-Based
Access
Microsoft Corporate
Network
Microsoft Azure
BLOBS
TABLES QUEUES
DRIVES
I have heard that cloud is not secure. Is it?
US FedRAMP/FISMA
US CJIS
UK G-Cloud
Australia IRAP
Singapore MCTS
EU Data Privacy
Approval
ISO 27001
ISO 27018
SOC 1 Type 2
SOC 2 Type 2
PCI DSS Level 1
HIPAA/HITECH
Life Sciences GxP
Information
security
standards
Government
certifications
Industry
certifications
Is the cloud secure or not?
CONCLUSION Cloudsecurity
Delegates
responsibility
Assess risks At least the same
as on-premises
Thank you!

More Related Content

What's hot

The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...Equinix
 
Predictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environmentPredictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environmentCapgemini
 
Software panel
Software panelSoftware panel
Software panelMassTLC
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraVistara
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
bbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericatbbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericatDavid Bericat
 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draftEquinix
 
Building the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformBuilding the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformCloudera, Inc.
 
Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A AnalysisNetscribes
 
Big trends, practical implications
Big trends, practical implicationsBig trends, practical implications
Big trends, practical implicationsSchneider Electric
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteEquinix
 
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready InfrastructureGartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready InfrastructureEquinix
 
Hannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital TwinHannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital TwinIBM Internet of Things
 
I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10Jeffrey Kaplan
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Antoine Chaya
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Rahul Neel Mani
 

What's hot (20)

The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
 
Predictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environmentPredictive Maintenance by analysing acoustic data in an industrial environment
Predictive Maintenance by analysing acoustic data in an industrial environment
 
Software panel
Software panelSoftware panel
Software panel
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With Vistara
 
World of Watson IoT Journey Map
World of Watson IoT Journey MapWorld of Watson IoT Journey Map
World of Watson IoT Journey Map
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
bbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericatbbva_redhat-theAPIHour_IoT_Day-DavidBericat
bbva_redhat-theAPIHour_IoT_Day-DavidBericat
 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draft
 
Building the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformBuilding the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics Platform
 
Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A Analysis
 
Big trends, practical implications
Big trends, practical implicationsBig trends, practical implications
Big trends, practical implications
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance Infobite
 
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready InfrastructureGartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
Gartner IO 2018 Keynote Presentation: Architect a Digital-Ready Infrastructure
 
Hannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital TwinHannover Messe: Evolution of a cognitive Digital Twin
Hannover Messe: Evolution of a cognitive Digital Twin
 
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
 
Digital Transformation Seminar
Digital Transformation SeminarDigital Transformation Seminar
Digital Transformation Seminar
 
IoT13: Thingworx showcase
IoT13: Thingworx showcaseIoT13: Thingworx showcase
IoT13: Thingworx showcase
 
I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 

Similar to Is cloud secure or not

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Microsoft Österreich
 
Fortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFrancisco Ferreira
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachCloudPassage
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 

Similar to Is cloud secure or not (20)

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365
 
Fortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft AzureFortaleça seu Nível de Segurança com Microsoft Azure
Fortaleça seu Nível de Segurança com Microsoft Azure
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Dstca
DstcaDstca
Dstca
 

More from ebuc

Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends ebuc
 
Mobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlMobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlebuc
 
Launching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionLaunching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionebuc
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
CSDD case study
CSDD case studyCSDD case study
CSDD case studyebuc
 
Meistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamMeistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamebuc
 
Pieredzes stāsti
Pieredzes stāstiPieredzes stāsti
Pieredzes stāstiebuc
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
Smart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionSmart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionebuc
 
CITY UP iniciatīva
CITY UP iniciatīvaCITY UP iniciatīva
CITY UP iniciatīvaebuc
 
Programmatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaProgrammatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaebuc
 
Start up iniciatīva 2014
Start up iniciatīva 2014Start up iniciatīva 2014
Start up iniciatīva 2014ebuc
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365ebuc
 
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.ebuc
 
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAProgrammatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAebuc
 
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...ebuc
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...ebuc
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...ebuc
 
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.ebuc
 
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...ebuc
 

More from ebuc (20)

Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends
 
Mobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerlMobile biometric device trends joe hoerl
Mobile biometric device trends joe hoerl
 
Launching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competitionLaunching great enterprise mobile apps that beat the competition
Launching great enterprise mobile apps that beat the competition
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
CSDD case study
CSDD case studyCSDD case study
CSDD case study
 
Meistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbamMeistarklase efektīvam ikdienas darbam
Meistarklase efektīvam ikdienas darbam
 
Pieredzes stāsti
Pieredzes stāstiPieredzes stāsti
Pieredzes stāsti
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Smart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solutionSmart business - is cloud part of the problem or part of the solution
Smart business - is cloud part of the problem or part of the solution
 
CITY UP iniciatīva
CITY UP iniciatīvaCITY UP iniciatīva
CITY UP iniciatīva
 
Programmatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācijaProgrammatūras resursu pārvaldība un optimizācija
Programmatūras resursu pārvaldība un optimizācija
 
Start up iniciatīva 2014
Start up iniciatīva 2014Start up iniciatīva 2014
Start up iniciatīva 2014
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
Programmatūras licencēšana. Izaicinājums un iespējas. Kārlis Nīlanders, SIA DPA.
 
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPAProgrammatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
 
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
Web lietojumu biežāk pieļautās kļūdas un to risinājumi. Didzis Balodis. DPA K...
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
 
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
Kā organizācijas gūs labumu no datu analīzes rīku lietošanas? Aldis Ērglis. D...
 
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
Kas ir HPC? Augstas veiktspējas skaitļošana. Leo Trukšāns. DPA Konference 2014.
 
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
Vai Tu esi tas, par ko uzdodies? Identitātes pārbaude šodien un rīt. Edgars...
 

Recently uploaded

Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 

Recently uploaded (20)

Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 

Is cloud secure or not