SlideShare ist ein Scribd-Unternehmen logo
1 von 23
© IBM Corporation1
Presented by:
Securing the Future
David A. Cass
VP & CISO, Cloud & SaaS
© IBM Corporation2
text
Agenda
– Threat landscape
– Evaluating the risk of cloud services
– Best practices
• Service Development
• Secure Engineering Framework
• Security policies
– Service Delivery
• Data Protection
• 3rd party accreditations, contractual obligations
– Service Consumption in a shared responsibility environment
– Wrap up
© IBM Corporation3
– IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.
– Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a
purchasing decision.
– The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or
functionality. Information about potential future products may not be incorporated into any contract.
– The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM benchmarks in a
controlled environment. The actual throughput or performance that any user will experience will vary
depending upon many factors, including considerations such as the amount of multiprogramming in the
user’s job stream, the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results similar to those stated
here.
Please Note:
© IBM Corporation4 4
Threat Landscape:
83% of CISOs say that the challenge posed by external threats has
increased in the last three years
Near Daily Leaks
of Sensitive Data
40% increase
in reported data
breaches and incidents
Relentless Use
of Multiple Methods
800,000,000+ records
were leaked, while the future
shows no sign of change
“Insane” Amounts of Records Breached
42% of CISOs
claim the risk from external threats increased
dramatically from prior years.
© IBM Corporation5
Security leaders are more accountable than ever before
Loss of market share
and reputation
Legal exposure
Business continuity
Audit failure
Fines and enforcement
impact
Financial loss
Impact to data and
systems,
(confidentiality, integrity
and /
or availability)
Violation of employee
privacy
Loss of
customer trust
Loss of brand reputation
CEO CFO / COO CIO CHRO / CDO CMO
Your board and CEO demand a strategy
© IBM Corporation6
Threat Landscape - Then
• Captive Workforce
• Desktops & Laptops
• Corporate Network with VPN for remote workers
• Corporate Owned Devices
Enterprises
• Rouge Individuals
• Motivated by the challenge
• Little or no financial gain
Attackers
• Noisy
• Server side/infrastructure vulnerabilities
• Noticeable
• Damaging & Costly but not complicated to remediate
Attacks
© IBM Corporation7
Threat Landscape - Now
• Highly Mobile Workforce
• Smartphones & Tablets
• Use of home Wi-Fi, free Wi-Fi, cellular connections
• Corporate Owned Devices
Enterprises
• Organized
• Well funded
• Highly skilled
• Organized Crime
• Financial/Political gain
Attackers
• Stealthy
• Applications, Databases, and Social Engineering
• Hard to detect
• Goal is data exfiltration
Attacks
© IBM Corporation8
Evaluating the risk of cloud services:
Identify Risk & Maturity Level Expectations By Tier - Example
Tiering Tier#
Application
Security
Network & Systems Data Security Secure OPS Security Strat & Org
Tier 1: Regulated Data (PHI, SOX,
SPII, PCI, etc.)
1 4 4 5 4 4
Tier 2: Confidential, Attorney
Client Privileged Data, Intellectual
Property and Personally
Identifiable (External)
2 3 4 4 4 4
Tier 3: Confidential, Attorney
Client Privileged Data, Intellectual
Property and Personally
Identifiable (Internal)
3 3 3 4 4 3
Tier 4: Public Data (No Distinction
between external & Internal)
4 3 4 3 3 3
Tier 5: Temporary Environment for
POC, Lab work or Testing (No Prod
or "Real" Data)
5 2 2 2 2 2
Maturity Level Expectation
© IBM Corporation9
Application Security Tiers
Requirement Level 1 Level 2 Level 3 Level 4 Level 5
Source Code Control Not using source control Source Code Control is in
place
Source Code control in
place with manual scanning
Source Code Control in place
with Automated security
scanning
Source Code Control in place
with Automated Security
scanning and remediation
results fed back into SDLC
and training efforts
SDLC No defined SDLC Documented, not always
followed
Documented and mostly
followed; Security
integration into SDLC
processes
Documented and 100%
Followed
Security Remediation feeding
back into SDLC
Team Security Awareness Not really Aware, No
dedicated security training
Aware of security
requirements, not trained
Entire team at Security
White Belt
Software Security Champions,
Team at Security Green Belt
Entire Team understands
security, team at Security
Black Belt level
Third Parties No single point of detail for
involved 3rd parties
At a minimum have an
inventory of all 3rd parties
50% of third parties have
undergone a 3rd party
security assessment
100% of third parties have
undergone a 3rd party security
assessment, Required to
validate (proof) following
appropriate security practices
Onsite verification of security
practices,
External Developers at Black
Belt
Production Releases No production release
process, releases done
whenever and however
Developers deploy
manually to Prod
Documented and
repeatable deployments,
most likely handed off to
someone else
Automated Releases Automated Releases with
automated change detection
and verification
Testing If it compiles and builds, its
good to go
Manual adhoc testing
performed by
Development team
Manual scheduled security
scanning
Automated security scanning,
QA in place, Documented
tests and captured testing
results
Automated Testing / Test
driven Development
© IBM Corporation10
Best Practices:
We see three sets of security capabilities to help enterprise clients …
Cloud Security Capabilities
Manage Access
Protect Data
Gain Visibility
Protect infrastructure,
applications, and data from
threats
Auditable intelligence on cloud
access, activity, cost and
compliance
Manage identities
and govern user access
IaaS: Securing infrastructure and workloads
SaaS: Secure usage of business applications
PaaS: Secure service composition and apps
Bluemix
© IBM Corporation11
… delivered via cloud-enabled technologies and managed services
IaaS: Securing infrastructure and workloads
SaaS: Secure usage of business applications
PaaS: Secure service composition and apps
Bluemix
Client Consumption
Models
Security SaaS
Virtual Appliances
ManagedSecurityServices
APIs
ProfessionalSecurityServices
Cloud Security Capabilities
Manage Access
Protect Data
Gain Visibility
Protect infrastructure,
applications, and data from
threats
Auditable intelligence on cloud
access, activity, cost and
compliance
Manage identities
and govern user access
© IBM Corporation12
Comprehensive portfolio across platform security capabilities and cloud
security products and services
SaaSPaaSIaaS
IBM Cloud Security
Optimize Security Operations
Manage
Access
Protect
Data
Gain
Visibility
IBM Cloud Security Portfolio
© IBM Corporation13
IBM Secure Engineering Portal
– www.ibm.com/security/secure-engineering
13
© IBM Corporation14
SaaS - Cloud Security
– 140+ SaaS Offerings.
– Executive (Macro) level chain of support
• CIO Office
• Cloud Operations
• CISO Cloud
– We know:
• Who has access to data?
• Where the data is accessed from?
– Security requirements addressed in deployment checklist before going to market.
14
© IBM Corporation15
SaaS Security
– Clients hand data and trust to IBM.
• IBM partners with the client.
– IBM delivers SaaS but assures we take care of individuals needs.
• Pen testing
• Separation of Duties
• Shared operating services – Malware / IPS / IDS
• Encryption
• Logging and Monitoring
– All offerings going through ISO 27001 certification.
– Leadership on new standards; ISO 20243 (supply chain risk)
– Standardization on SoftLayer platform with more Geo’s and local data centers than others to
support privacy requirements.
15
© IBM Corporation1616
Teams apply the Secure Engineering practices across the Lifecycle as
demonstrated by key project milestones.
Development Process
and Lifecycle
Development
Supply Chain Service Deployment
COTS Deployment
Lifecycle
Catalog & Scan
Components
Create Assurance Plan based
on Risks &Threats
Protect & Monitor
Source Code
Complete Assurance Tasks,
Security Scans & Remediation
Security Compliance Review
before initial Service
Activation
Security defenses
operational with periodic
rescan
Review Completed Projects and
gain approval for Release
Scan Software Images for
Viruses and Malware
A
B
C D
E
F
G
H
© IBM Corporation17
Service Delivery – How IBM Protects Client Data
– Governance focused on continuous assessment & enhancement
– Shared services for vulnerability scanning, intrusion detection, penetration testing, log storage, X-
Force threat intel, and more …
– Architectural separation of data stores, key storage, logs, etc
– Encryption
– Over 2000 pages of authoritative internal security policies. Not suitable for external consumption,
as it could help attackers!
– External collateral:
• www.ibm.com/saas/security for the IBM SaaS Trust web site
• www.ibm.com/privacy for privacy practices
• Core Security Practices Document (NDA, controlled copy)
• Offering specific security practices documents (acquisitions)
17
Physical / Logical / Organizational / Engineering controls
© IBM Corporation18
Compliance regimes
18
Offerings  Regimes  Industries  Clients  Countries
+
CJIS
FFIEC
SSAE16
O-TTPS /
ISO 20243
EU Safe Harbor
….
© IBM Corporation19
Service Consumption – How Clients Protect Data
19
– Classify data correctly
– Configure service correctly
– Train workforce sufficiently
– Leverage controls as intended to restrict data access
– Verify cloud service provider’s audit posture
– Review log analytics and related usage attributes
© IBM Corporation20
IBM Cloud Trust web site - for more information
– www.ibm.com/saas/security
20
© IBM Corporation21
Wrap Up
21
– Understand your risk tolerance
– Review what best practices are in use
– Understand steps clients need to take in a shared responsibility environment
– IBM is a cyber-security & data protection thought & practice leader
– IBM is exposing practices only to an extent that won’t aid hackers
– IBM is pursuing accreditations selectively to control your cost
© IBM Corporation22
Questions?
David Cass
CISO, IBM Cloud & SaaS Operations
E-mail: dcass@us.ibm.com
Twitter: @dcass001
Linkedin: www.linkedin.com/in/dcass001/
© IBM Corporation23© IBM Corporation23
Accelerating Digital Business

Weitere ähnliche Inhalte

Was ist angesagt?

Building Your Own Watson Powered Application on Bluemix
Building Your Own Watson Powered Application on BluemixBuilding Your Own Watson Powered Application on Bluemix
Building Your Own Watson Powered Application on BluemixIBM
 
IBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM
 
Discover the Linux on z Systems Effect
Discover the Linux on z Systems EffectDiscover the Linux on z Systems Effect
Discover the Linux on z Systems EffectIBM
 
Bluemix the digital innovation platform
Bluemix   the digital innovation platformBluemix   the digital innovation platform
Bluemix the digital innovation platformJose Pena
 
How Bluemix Helps NASA Innovate
How Bluemix Helps NASA InnovateHow Bluemix Helps NASA Innovate
How Bluemix Helps NASA InnovateIBM
 
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open StackHybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open Stackgjuljo
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupJon Marshall
 
IBM Bluemix Dedicated – GitHub Enterprise
IBM Bluemix Dedicated – GitHub EnterpriseIBM Bluemix Dedicated – GitHub Enterprise
IBM Bluemix Dedicated – GitHub EnterpriseIBM DevOps
 
Developing for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixDeveloping for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixRoberto Pozzi
 
IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry)
IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry) IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry)
IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry) Animesh Singh
 
IBM Bluemix Workshop version 3
IBM Bluemix Workshop version 3IBM Bluemix Workshop version 3
IBM Bluemix Workshop version 3Nguyen Tai Dzung
 
IBM Bluemix Garage in London
IBM Bluemix Garage in LondonIBM Bluemix Garage in London
IBM Bluemix Garage in LondonSonia Cyrus
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical trainingAjit Yohannan
 
L105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aL105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aTony Pearson
 
IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)Simon Baker
 
Bluemix presentation IBM Cloud Briefing in San Jose
Bluemix presentation IBM Cloud Briefing in San JoseBluemix presentation IBM Cloud Briefing in San Jose
Bluemix presentation IBM Cloud Briefing in San JoseSergio Loza
 
IBM Cloud Services Portfolio
IBM Cloud Services Portfolio IBM Cloud Services Portfolio
IBM Cloud Services Portfolio Bernd Thomsen
 
Bluemix overview v1.4
Bluemix overview v1.4Bluemix overview v1.4
Bluemix overview v1.4Jose Pena
 

Was ist angesagt? (20)

IBM Bluemix Overview
IBM Bluemix OverviewIBM Bluemix Overview
IBM Bluemix Overview
 
Building Your Own Watson Powered Application on Bluemix
Building Your Own Watson Powered Application on BluemixBuilding Your Own Watson Powered Application on Bluemix
Building Your Own Watson Powered Application on Bluemix
 
IBM RTP Dojo Launch
IBM RTP Dojo LaunchIBM RTP Dojo Launch
IBM RTP Dojo Launch
 
Discover the Linux on z Systems Effect
Discover the Linux on z Systems EffectDiscover the Linux on z Systems Effect
Discover the Linux on z Systems Effect
 
Bluemix the digital innovation platform
Bluemix   the digital innovation platformBluemix   the digital innovation platform
Bluemix the digital innovation platform
 
How Bluemix Helps NASA Innovate
How Bluemix Helps NASA InnovateHow Bluemix Helps NASA Innovate
How Bluemix Helps NASA Innovate
 
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open StackHybrid Cloud with IBM Bluemix, Docker and Open Stack
Hybrid Cloud with IBM Bluemix, Docker and Open Stack
 
Bluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User GroupBluemix overview - UK WebSphere Integration User Group
Bluemix overview - UK WebSphere Integration User Group
 
IBM Bluemix Dedicated – GitHub Enterprise
IBM Bluemix Dedicated – GitHub EnterpriseIBM Bluemix Dedicated – GitHub Enterprise
IBM Bluemix Dedicated – GitHub Enterprise
 
Developing for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixDeveloping for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with Bluemix
 
IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry)
IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry) IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry)
IBM BlueMix Architecture and Deep Dive (Powered by CloudFoundry)
 
IBM Bluemix Workshop version 3
IBM Bluemix Workshop version 3IBM Bluemix Workshop version 3
IBM Bluemix Workshop version 3
 
IBM Bluemix Garage in London
IBM Bluemix Garage in LondonIBM Bluemix Garage in London
IBM Bluemix Garage in London
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical training
 
L105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aL105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902a
 
IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)
 
Bluemix presentation IBM Cloud Briefing in San Jose
Bluemix presentation IBM Cloud Briefing in San JoseBluemix presentation IBM Cloud Briefing in San Jose
Bluemix presentation IBM Cloud Briefing in San Jose
 
IBM Cloud Services Portfolio
IBM Cloud Services Portfolio IBM Cloud Services Portfolio
IBM Cloud Services Portfolio
 
Bluemix overview v1.4
Bluemix overview v1.4Bluemix overview v1.4
Bluemix overview v1.4
 
IBM Bluemix
IBM BluemixIBM Bluemix
IBM Bluemix
 

Andere mochten auch

IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond IBM
 
Barriers to Data Sharing
Barriers to Data SharingBarriers to Data Sharing
Barriers to Data SharingCatherine Giffi
 
Hybrid Cloud with IBM Bluemix
Hybrid Cloud with IBM BluemixHybrid Cloud with IBM Bluemix
Hybrid Cloud with IBM BluemixRoberto Pozzi
 
Node on Guard
Node on GuardNode on Guard
Node on GuardIBM
 
End-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBMEnd-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBMIBM_Info_Management
 
Scalability 09262012
Scalability 09262012Scalability 09262012
Scalability 09262012Mike Miller
 
SQL to NoSQL: Top 6 Questions
SQL to NoSQL: Top 6 QuestionsSQL to NoSQL: Top 6 Questions
SQL to NoSQL: Top 6 QuestionsMike Broberg
 
Birmingham Meetup
Birmingham MeetupBirmingham Meetup
Birmingham MeetupIBM
 
Offline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM Bluemix
Offline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM BluemixOffline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM Bluemix
Offline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM BluemixIBM
 
Mobile App Development With IBM Cloudant
Mobile App Development With IBM CloudantMobile App Development With IBM Cloudant
Mobile App Development With IBM CloudantIBM Cloud Data Services
 
Security best practices for informix
Security best practices for informixSecurity best practices for informix
Security best practices for informixIBM_Info_Management
 
I See NoSQL Document Stores in Geospatial Applications
I See NoSQL Document Stores in Geospatial ApplicationsI See NoSQL Document Stores in Geospatial Applications
I See NoSQL Document Stores in Geospatial ApplicationsIBM Cloud Data Services
 
Sistemas Integrados Multimodales: Santiago de Chile - Oscar Velasquez
Sistemas Integrados Multimodales: Santiago de Chile - Oscar VelasquezSistemas Integrados Multimodales: Santiago de Chile - Oscar Velasquez
Sistemas Integrados Multimodales: Santiago de Chile - Oscar VelasquezFagner Glinski
 
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15Dave Stokes
 
Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...
Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...
Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...NoSQLmatters
 
Cloud Data Services: A Brand New Ballgame for Business
Cloud Data Services: A  Brand New Ballgame for BusinessCloud Data Services: A  Brand New Ballgame for Business
Cloud Data Services: A Brand New Ballgame for BusinessIBM Cloud Data Services
 
La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...
La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...
La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...Fagner Glinski
 
Choosing the right platform for your Internet -of-Things solution
Choosing the right platform for your Internet -of-Things solutionChoosing the right platform for your Internet -of-Things solution
Choosing the right platform for your Internet -of-Things solutionIBM_Info_Management
 
IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)Girish Srivastava
 

Andere mochten auch (20)

IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
 
Barriers to Data Sharing
Barriers to Data SharingBarriers to Data Sharing
Barriers to Data Sharing
 
Hybrid Cloud with IBM Bluemix
Hybrid Cloud with IBM BluemixHybrid Cloud with IBM Bluemix
Hybrid Cloud with IBM Bluemix
 
Node on Guard
Node on GuardNode on Guard
Node on Guard
 
End-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBMEnd-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBM
 
Scalability 09262012
Scalability 09262012Scalability 09262012
Scalability 09262012
 
SQL to NoSQL: Top 6 Questions
SQL to NoSQL: Top 6 QuestionsSQL to NoSQL: Top 6 Questions
SQL to NoSQL: Top 6 Questions
 
Birmingham Meetup
Birmingham MeetupBirmingham Meetup
Birmingham Meetup
 
Offline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM Bluemix
Offline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM BluemixOffline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM Bluemix
Offline-First Mobile Web Apps with PouchDB, IBM Cloudant, and IBM Bluemix
 
Mobile App Development With IBM Cloudant
Mobile App Development With IBM CloudantMobile App Development With IBM Cloudant
Mobile App Development With IBM Cloudant
 
Security best practices for informix
Security best practices for informixSecurity best practices for informix
Security best practices for informix
 
I See NoSQL Document Stores in Geospatial Applications
I See NoSQL Document Stores in Geospatial ApplicationsI See NoSQL Document Stores in Geospatial Applications
I See NoSQL Document Stores in Geospatial Applications
 
Sistemas Integrados Multimodales: Santiago de Chile - Oscar Velasquez
Sistemas Integrados Multimodales: Santiago de Chile - Oscar VelasquezSistemas Integrados Multimodales: Santiago de Chile - Oscar Velasquez
Sistemas Integrados Multimodales: Santiago de Chile - Oscar Velasquez
 
Practical Use of a NoSQL
Practical Use of a NoSQLPractical Use of a NoSQL
Practical Use of a NoSQL
 
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
MySQL for Oracle DBA -- Rocky Mountain Oracle User Group Training Days '15
 
Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...
Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...
Nathan Ford- Divination of the Defects (Graph-Based Defect Prediction through...
 
Cloud Data Services: A Brand New Ballgame for Business
Cloud Data Services: A  Brand New Ballgame for BusinessCloud Data Services: A  Brand New Ballgame for Business
Cloud Data Services: A Brand New Ballgame for Business
 
La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...
La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...
La Importancia de la Calidad en el Servicio de Transporte - Laura Ballesteros...
 
Choosing the right platform for your Internet -of-Things solution
Choosing the right platform for your Internet -of-Things solutionChoosing the right platform for your Internet -of-Things solution
Choosing the right platform for your Internet -of-Things solution
 
IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)
 

Ähnlich wie IBM Relay 2015: Securing the Future

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 

Ähnlich wie IBM Relay 2015: Securing the Future (20)

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 

Mehr von IBM

Microservices - Choosing the Right Cloud Services and Tools
Microservices - Choosing the Right Cloud Services and ToolsMicroservices - Choosing the Right Cloud Services and Tools
Microservices - Choosing the Right Cloud Services and ToolsIBM
 
Digital Innovation in the Cognitive Era
Digital Innovation in the Cognitive EraDigital Innovation in the Cognitive Era
Digital Innovation in the Cognitive EraIBM
 
Exploring the Open Source Linux Ecosystem
Exploring the Open Source Linux EcosystemExploring the Open Source Linux Ecosystem
Exploring the Open Source Linux EcosystemIBM
 
Open Source Centers of Gravity
Open Source Centers of GravityOpen Source Centers of Gravity
Open Source Centers of GravityIBM
 
Meetupslides 150409100501-conversion-gate01
Meetupslides 150409100501-conversion-gate01Meetupslides 150409100501-conversion-gate01
Meetupslides 150409100501-conversion-gate01IBM
 
Integrating MongoDB into Cloud Foundry App
Integrating MongoDB into Cloud Foundry AppIntegrating MongoDB into Cloud Foundry App
Integrating MongoDB into Cloud Foundry AppIBM
 
Bluemix Girls Night Out
Bluemix Girls Night Out Bluemix Girls Night Out
Bluemix Girls Night Out IBM
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantIBM
 
Using Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixUsing Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixIBM
 
Watson on Bluemix
Watson on BluemixWatson on Bluemix
Watson on BluemixIBM
 
PHP Buildpacks in the Cloud on Bluemix
PHP Buildpacks in the Cloud on BluemixPHP Buildpacks in the Cloud on Bluemix
PHP Buildpacks in the Cloud on BluemixIBM
 
Introduction: Watson Services on IBM Bluemix Webcast
Introduction: Watson Services on IBM Bluemix Webcast Introduction: Watson Services on IBM Bluemix Webcast
Introduction: Watson Services on IBM Bluemix Webcast IBM
 
Connecting Xamarin Apps with IBM Worklight in Bluemix
Connecting Xamarin Apps with IBM Worklight in BluemixConnecting Xamarin Apps with IBM Worklight in Bluemix
Connecting Xamarin Apps with IBM Worklight in BluemixIBM
 
Automate the Application Deployment Process
Automate the Application Deployment ProcessAutomate the Application Deployment Process
Automate the Application Deployment ProcessIBM
 
Scalable apps
Scalable appsScalable apps
Scalable appsIBM
 
Webcast Four: Ruby Business Intelligence and Analytics on Bluemix
Webcast Four: Ruby Business Intelligence and Analytics on BluemixWebcast Four: Ruby Business Intelligence and Analytics on Bluemix
Webcast Four: Ruby Business Intelligence and Analytics on BluemixIBM
 

Mehr von IBM (16)

Microservices - Choosing the Right Cloud Services and Tools
Microservices - Choosing the Right Cloud Services and ToolsMicroservices - Choosing the Right Cloud Services and Tools
Microservices - Choosing the Right Cloud Services and Tools
 
Digital Innovation in the Cognitive Era
Digital Innovation in the Cognitive EraDigital Innovation in the Cognitive Era
Digital Innovation in the Cognitive Era
 
Exploring the Open Source Linux Ecosystem
Exploring the Open Source Linux EcosystemExploring the Open Source Linux Ecosystem
Exploring the Open Source Linux Ecosystem
 
Open Source Centers of Gravity
Open Source Centers of GravityOpen Source Centers of Gravity
Open Source Centers of Gravity
 
Meetupslides 150409100501-conversion-gate01
Meetupslides 150409100501-conversion-gate01Meetupslides 150409100501-conversion-gate01
Meetupslides 150409100501-conversion-gate01
 
Integrating MongoDB into Cloud Foundry App
Integrating MongoDB into Cloud Foundry AppIntegrating MongoDB into Cloud Foundry App
Integrating MongoDB into Cloud Foundry App
 
Bluemix Girls Night Out
Bluemix Girls Night Out Bluemix Girls Night Out
Bluemix Girls Night Out
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
 
Using Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixUsing Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on Bluemix
 
Watson on Bluemix
Watson on BluemixWatson on Bluemix
Watson on Bluemix
 
PHP Buildpacks in the Cloud on Bluemix
PHP Buildpacks in the Cloud on BluemixPHP Buildpacks in the Cloud on Bluemix
PHP Buildpacks in the Cloud on Bluemix
 
Introduction: Watson Services on IBM Bluemix Webcast
Introduction: Watson Services on IBM Bluemix Webcast Introduction: Watson Services on IBM Bluemix Webcast
Introduction: Watson Services on IBM Bluemix Webcast
 
Connecting Xamarin Apps with IBM Worklight in Bluemix
Connecting Xamarin Apps with IBM Worklight in BluemixConnecting Xamarin Apps with IBM Worklight in Bluemix
Connecting Xamarin Apps with IBM Worklight in Bluemix
 
Automate the Application Deployment Process
Automate the Application Deployment ProcessAutomate the Application Deployment Process
Automate the Application Deployment Process
 
Scalable apps
Scalable appsScalable apps
Scalable apps
 
Webcast Four: Ruby Business Intelligence and Analytics on Bluemix
Webcast Four: Ruby Business Intelligence and Analytics on BluemixWebcast Four: Ruby Business Intelligence and Analytics on Bluemix
Webcast Four: Ruby Business Intelligence and Analytics on Bluemix
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

IBM Relay 2015: Securing the Future

  • 1. © IBM Corporation1 Presented by: Securing the Future David A. Cass VP & CISO, Cloud & SaaS
  • 2. © IBM Corporation2 text Agenda – Threat landscape – Evaluating the risk of cloud services – Best practices • Service Development • Secure Engineering Framework • Security policies – Service Delivery • Data Protection • 3rd party accreditations, contractual obligations – Service Consumption in a shared responsibility environment – Wrap up
  • 3. © IBM Corporation3 – IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. – Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. – The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. – The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. Please Note:
  • 4. © IBM Corporation4 4 Threat Landscape: 83% of CISOs say that the challenge posed by external threats has increased in the last three years Near Daily Leaks of Sensitive Data 40% increase in reported data breaches and incidents Relentless Use of Multiple Methods 800,000,000+ records were leaked, while the future shows no sign of change “Insane” Amounts of Records Breached 42% of CISOs claim the risk from external threats increased dramatically from prior years.
  • 5. © IBM Corporation5 Security leaders are more accountable than ever before Loss of market share and reputation Legal exposure Business continuity Audit failure Fines and enforcement impact Financial loss Impact to data and systems, (confidentiality, integrity and / or availability) Violation of employee privacy Loss of customer trust Loss of brand reputation CEO CFO / COO CIO CHRO / CDO CMO Your board and CEO demand a strategy
  • 6. © IBM Corporation6 Threat Landscape - Then • Captive Workforce • Desktops & Laptops • Corporate Network with VPN for remote workers • Corporate Owned Devices Enterprises • Rouge Individuals • Motivated by the challenge • Little or no financial gain Attackers • Noisy • Server side/infrastructure vulnerabilities • Noticeable • Damaging & Costly but not complicated to remediate Attacks
  • 7. © IBM Corporation7 Threat Landscape - Now • Highly Mobile Workforce • Smartphones & Tablets • Use of home Wi-Fi, free Wi-Fi, cellular connections • Corporate Owned Devices Enterprises • Organized • Well funded • Highly skilled • Organized Crime • Financial/Political gain Attackers • Stealthy • Applications, Databases, and Social Engineering • Hard to detect • Goal is data exfiltration Attacks
  • 8. © IBM Corporation8 Evaluating the risk of cloud services: Identify Risk & Maturity Level Expectations By Tier - Example Tiering Tier# Application Security Network & Systems Data Security Secure OPS Security Strat & Org Tier 1: Regulated Data (PHI, SOX, SPII, PCI, etc.) 1 4 4 5 4 4 Tier 2: Confidential, Attorney Client Privileged Data, Intellectual Property and Personally Identifiable (External) 2 3 4 4 4 4 Tier 3: Confidential, Attorney Client Privileged Data, Intellectual Property and Personally Identifiable (Internal) 3 3 3 4 4 3 Tier 4: Public Data (No Distinction between external & Internal) 4 3 4 3 3 3 Tier 5: Temporary Environment for POC, Lab work or Testing (No Prod or "Real" Data) 5 2 2 2 2 2 Maturity Level Expectation
  • 9. © IBM Corporation9 Application Security Tiers Requirement Level 1 Level 2 Level 3 Level 4 Level 5 Source Code Control Not using source control Source Code Control is in place Source Code control in place with manual scanning Source Code Control in place with Automated security scanning Source Code Control in place with Automated Security scanning and remediation results fed back into SDLC and training efforts SDLC No defined SDLC Documented, not always followed Documented and mostly followed; Security integration into SDLC processes Documented and 100% Followed Security Remediation feeding back into SDLC Team Security Awareness Not really Aware, No dedicated security training Aware of security requirements, not trained Entire team at Security White Belt Software Security Champions, Team at Security Green Belt Entire Team understands security, team at Security Black Belt level Third Parties No single point of detail for involved 3rd parties At a minimum have an inventory of all 3rd parties 50% of third parties have undergone a 3rd party security assessment 100% of third parties have undergone a 3rd party security assessment, Required to validate (proof) following appropriate security practices Onsite verification of security practices, External Developers at Black Belt Production Releases No production release process, releases done whenever and however Developers deploy manually to Prod Documented and repeatable deployments, most likely handed off to someone else Automated Releases Automated Releases with automated change detection and verification Testing If it compiles and builds, its good to go Manual adhoc testing performed by Development team Manual scheduled security scanning Automated security scanning, QA in place, Documented tests and captured testing results Automated Testing / Test driven Development
  • 10. © IBM Corporation10 Best Practices: We see three sets of security capabilities to help enterprise clients … Cloud Security Capabilities Manage Access Protect Data Gain Visibility Protect infrastructure, applications, and data from threats Auditable intelligence on cloud access, activity, cost and compliance Manage identities and govern user access IaaS: Securing infrastructure and workloads SaaS: Secure usage of business applications PaaS: Secure service composition and apps Bluemix
  • 11. © IBM Corporation11 … delivered via cloud-enabled technologies and managed services IaaS: Securing infrastructure and workloads SaaS: Secure usage of business applications PaaS: Secure service composition and apps Bluemix Client Consumption Models Security SaaS Virtual Appliances ManagedSecurityServices APIs ProfessionalSecurityServices Cloud Security Capabilities Manage Access Protect Data Gain Visibility Protect infrastructure, applications, and data from threats Auditable intelligence on cloud access, activity, cost and compliance Manage identities and govern user access
  • 12. © IBM Corporation12 Comprehensive portfolio across platform security capabilities and cloud security products and services SaaSPaaSIaaS IBM Cloud Security Optimize Security Operations Manage Access Protect Data Gain Visibility IBM Cloud Security Portfolio
  • 13. © IBM Corporation13 IBM Secure Engineering Portal – www.ibm.com/security/secure-engineering 13
  • 14. © IBM Corporation14 SaaS - Cloud Security – 140+ SaaS Offerings. – Executive (Macro) level chain of support • CIO Office • Cloud Operations • CISO Cloud – We know: • Who has access to data? • Where the data is accessed from? – Security requirements addressed in deployment checklist before going to market. 14
  • 15. © IBM Corporation15 SaaS Security – Clients hand data and trust to IBM. • IBM partners with the client. – IBM delivers SaaS but assures we take care of individuals needs. • Pen testing • Separation of Duties • Shared operating services – Malware / IPS / IDS • Encryption • Logging and Monitoring – All offerings going through ISO 27001 certification. – Leadership on new standards; ISO 20243 (supply chain risk) – Standardization on SoftLayer platform with more Geo’s and local data centers than others to support privacy requirements. 15
  • 16. © IBM Corporation1616 Teams apply the Secure Engineering practices across the Lifecycle as demonstrated by key project milestones. Development Process and Lifecycle Development Supply Chain Service Deployment COTS Deployment Lifecycle Catalog & Scan Components Create Assurance Plan based on Risks &Threats Protect & Monitor Source Code Complete Assurance Tasks, Security Scans & Remediation Security Compliance Review before initial Service Activation Security defenses operational with periodic rescan Review Completed Projects and gain approval for Release Scan Software Images for Viruses and Malware A B C D E F G H
  • 17. © IBM Corporation17 Service Delivery – How IBM Protects Client Data – Governance focused on continuous assessment & enhancement – Shared services for vulnerability scanning, intrusion detection, penetration testing, log storage, X- Force threat intel, and more … – Architectural separation of data stores, key storage, logs, etc – Encryption – Over 2000 pages of authoritative internal security policies. Not suitable for external consumption, as it could help attackers! – External collateral: • www.ibm.com/saas/security for the IBM SaaS Trust web site • www.ibm.com/privacy for privacy practices • Core Security Practices Document (NDA, controlled copy) • Offering specific security practices documents (acquisitions) 17 Physical / Logical / Organizational / Engineering controls
  • 18. © IBM Corporation18 Compliance regimes 18 Offerings  Regimes  Industries  Clients  Countries + CJIS FFIEC SSAE16 O-TTPS / ISO 20243 EU Safe Harbor ….
  • 19. © IBM Corporation19 Service Consumption – How Clients Protect Data 19 – Classify data correctly – Configure service correctly – Train workforce sufficiently – Leverage controls as intended to restrict data access – Verify cloud service provider’s audit posture – Review log analytics and related usage attributes
  • 20. © IBM Corporation20 IBM Cloud Trust web site - for more information – www.ibm.com/saas/security 20
  • 21. © IBM Corporation21 Wrap Up 21 – Understand your risk tolerance – Review what best practices are in use – Understand steps clients need to take in a shared responsibility environment – IBM is a cyber-security & data protection thought & practice leader – IBM is exposing practices only to an extent that won’t aid hackers – IBM is pursuing accreditations selectively to control your cost
  • 22. © IBM Corporation22 Questions? David Cass CISO, IBM Cloud & SaaS Operations E-mail: dcass@us.ibm.com Twitter: @dcass001 Linkedin: www.linkedin.com/in/dcass001/
  • 23. © IBM Corporation23© IBM Corporation23 Accelerating Digital Business

Hinweis der Redaktion

  1. We know security has long been a top priority for CISOs and CIOs. Increasingly sophisticated and costly advanced attacks, along with deteriorating security perimeters have raised the issue to the view of CEOs and Boards. The adoption of cloud, mobile and big data technologies has increased the potential attack surface. These trends combine to create an acute, growing need for comprehensive, integrated security solutions. 13,000 C-Suite executive were included in the IBM study. Source: IBM C-Suite Study
  2. With an emphasis on access, control, and visibility, IBM Cloud Security helps meet regulatory compliance efficiently and defend against the latest threats. We help lay the groundwork for success by establishing a clear roadmap with the right mix of capabilities to securely migrate data and applications. We also help clients achieve a robust, security-rich cloud tuned to their specific needs. This is achieved through a four pronged approach. Manage Access: Your employees are impatient and want access to cloud applications now. Quickly and securely manage access to cloud resources wherever they’re located. Protect Workloads: Developers and LOBs are composing apps and using infrastructure with speed. Identify vulnerabilities and prevent attacks against cloud workloads and applications. Gain Visibility: Security teams don’t know who is using the cloud and what’s going on inside them. Monitor cloud usage, attack activity, compliance violations, etc. Create a Secure Foundation: (to be determined) ------------------ Visual Suggestion: IBM Cloud Security framework in the middle. Details for each domain surrounding the picture (could be an explanation of what each is) or client example of doing this now (manage access: FIM, protect workloads: MSS, gain visibility: QRadar, secure foundation: Softlayer). In the background, let’s bring back the hybrid cloud “concept car” from the first slide. ------------------