SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Eugene Dong
@Eugened
@Procurify
Edwin Frondozo:
@drgnmeme
@Slingshotvoip
Overview
 Introduction
 Format
 Security in the Cloud
 What is cloud?
 Heartbleed Bug
 Security issues (real and imagined)
 Best Practices
 Questions
Join the Conversation:
#CloudMasters
Edwin Frondozo:
@drgnmeme
@Slingshotvoip
Eugene Dong
@Eugened
@Procurify
What is the Cloud?
 Storing and accessing data and programs on the internet instead of your
computer's hard drive
 Google Drive, Apple iCloud, Samsung Chromebook, SaaS, VoIP, etc.
 Benefits (some)
 Accessibility
 Real-time vs. versioning
 Backup
 Scalability and low-cost
 Increased security
 And more….
Heartbleed Bug
 Not the norm - loophole
 How it worked:
 Scrape data from server memory
 500,000 websites
 Top 100 websites and their “patch” status: http://www.cnet.com/how-to/which-sites-have-
patched-the-heartbleed-bug/
 Don’t change your password until they have fixed the bug
 Start with banking, email
 Protect yourself
 Don’t use public Wi-Fi
 Change your passwords
 Clear browsing history and passwords
 Check your bank statement
Is the Cloud Secure?
Classic Concerns:
 Control over administration
 Geographic control of information
 Shared server space, “noisy neighbours”
 Control over virtualization
 Shared infrastructure and settings
 Collateral damage
 Blacklist of an IP in a public cloud
 Data export lock-in
Best Practices 1
 Keep up with security news!
 Keep your internal security up to date
 This can often be weaker than your cloud’s security measures
 Are your employees on the cloud?
 Rise of BYOD culture
 Have your IT team make a list of what is ok for them to use
 Baby steps in cloud migration
Best Practices 2
 Keep software testing and sensitive data off the cloud
 Investigate your cloud providers
 Back up your data
 Use a smart password
 Not “Password” or “1234”
 Letters, numbers, special characters
 Disconnect chrome extension
 Log out when you shut down your systems
http://www.slingshotvoip.com
http://www.procurify.com

Weitere ähnliche Inhalte

Ähnlich wie Cloud Security: Tips and Myths

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingDigital Shende
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentationJoan Dembowski
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingJoel May
 
Cloud Computing: What it Means/Does/Costs and Why You Should Care
Cloud Computing: What it Means/Does/Costs and Why You Should CareCloud Computing: What it Means/Does/Costs and Why You Should Care
Cloud Computing: What it Means/Does/Costs and Why You Should CareDW Nelson
 
Cloud theory and Practical.pptx
Cloud theory and Practical.pptxCloud theory and Practical.pptx
Cloud theory and Practical.pptxrubben7
 
What is 'Cloud Computing'?
What is 'Cloud Computing'?What is 'Cloud Computing'?
What is 'Cloud Computing'?CLASS Training
 
Cloud storage or computing & its working
Cloud storage or computing & its workingCloud storage or computing & its working
Cloud storage or computing & its workingpiyush mishra
 
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...CODE BLUE
 
Text cloud computing
Text cloud computingText cloud computing
Text cloud computingJeroen
 
Cloud Computing By #Manoj_Rockstar
Cloud Computing By #Manoj_RockstarCloud Computing By #Manoj_Rockstar
Cloud Computing By #Manoj_RockstarManoj Magatapalli
 
What Is Windows Azure
What Is Windows AzureWhat Is Windows Azure
What Is Windows AzureDominic Green
 
Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insightsgiorgiacaleffi
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing WorksJason Robinson
 
E2LOGY Cloud presentation
E2LOGY Cloud presentationE2LOGY Cloud presentation
E2LOGY Cloud presentationE2LOGY
 
Free lowcost may2012
Free lowcost may2012Free lowcost may2012
Free lowcost may2012Highway T
 
Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)Netcetera
 

Ähnlich wie Cloud Security: Tips and Myths (20)

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing: What it Means/Does/Costs and Why You Should Care
Cloud Computing: What it Means/Does/Costs and Why You Should CareCloud Computing: What it Means/Does/Costs and Why You Should Care
Cloud Computing: What it Means/Does/Costs and Why You Should Care
 
Cloud theory and Practical.pptx
Cloud theory and Practical.pptxCloud theory and Practical.pptx
Cloud theory and Practical.pptx
 
What is 'Cloud Computing'?
What is 'Cloud Computing'?What is 'Cloud Computing'?
What is 'Cloud Computing'?
 
Cloud storage or computing & its working
Cloud storage or computing & its workingCloud storage or computing & its working
Cloud storage or computing & its working
 
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
 
Text cloud computing
Text cloud computingText cloud computing
Text cloud computing
 
Cloud Computing By #Manoj_Rockstar
Cloud Computing By #Manoj_RockstarCloud Computing By #Manoj_Rockstar
Cloud Computing By #Manoj_Rockstar
 
What Is Windows Azure
What Is Windows AzureWhat Is Windows Azure
What Is Windows Azure
 
Cloud computing security - Insights
Cloud computing security - InsightsCloud computing security - Insights
Cloud computing security - Insights
 
Cloud 101 for Nonprofits
Cloud 101 for NonprofitsCloud 101 for Nonprofits
Cloud 101 for Nonprofits
 
Ocra 2012
Ocra 2012Ocra 2012
Ocra 2012
 
Technology update
Technology updateTechnology update
Technology update
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
E2LOGY Cloud presentation
E2LOGY Cloud presentationE2LOGY Cloud presentation
E2LOGY Cloud presentation
 
Free lowcost may2012
Free lowcost may2012Free lowcost may2012
Free lowcost may2012
 
Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)
 

Kürzlich hochgeladen

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Kürzlich hochgeladen (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Cloud Security: Tips and Myths

  • 2. Overview  Introduction  Format  Security in the Cloud  What is cloud?  Heartbleed Bug  Security issues (real and imagined)  Best Practices  Questions Join the Conversation: #CloudMasters Edwin Frondozo: @drgnmeme @Slingshotvoip Eugene Dong @Eugened @Procurify
  • 3. What is the Cloud?  Storing and accessing data and programs on the internet instead of your computer's hard drive  Google Drive, Apple iCloud, Samsung Chromebook, SaaS, VoIP, etc.  Benefits (some)  Accessibility  Real-time vs. versioning  Backup  Scalability and low-cost  Increased security  And more….
  • 4. Heartbleed Bug  Not the norm - loophole  How it worked:  Scrape data from server memory  500,000 websites  Top 100 websites and their “patch” status: http://www.cnet.com/how-to/which-sites-have- patched-the-heartbleed-bug/  Don’t change your password until they have fixed the bug  Start with banking, email  Protect yourself  Don’t use public Wi-Fi  Change your passwords  Clear browsing history and passwords  Check your bank statement
  • 5. Is the Cloud Secure? Classic Concerns:  Control over administration  Geographic control of information  Shared server space, “noisy neighbours”  Control over virtualization  Shared infrastructure and settings  Collateral damage  Blacklist of an IP in a public cloud  Data export lock-in
  • 6. Best Practices 1  Keep up with security news!  Keep your internal security up to date  This can often be weaker than your cloud’s security measures  Are your employees on the cloud?  Rise of BYOD culture  Have your IT team make a list of what is ok for them to use  Baby steps in cloud migration
  • 7. Best Practices 2  Keep software testing and sensitive data off the cloud  Investigate your cloud providers  Back up your data  Use a smart password  Not “Password” or “1234”  Letters, numbers, special characters  Disconnect chrome extension  Log out when you shut down your systems