VMworld Europe 2014: Insider Threat and the Cloud (Security)
1.
2. Disclaimer
• This presentation may contain product features that are currently under development.
• This overview of new technology represents no commitment from VMware to deliver these
features in any generally available product.
• Features are subject to change, and must not be included in contracts, purchase orders, or
sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery.
• Pricing and packaging for any new technologies or features discussed or presented have not
been determined.
CONFIDENTIAL 2
3. Rick Holland (@rickhholland)
Principal Analyst
George Gerchow (@georgegerchow)
Cloud/Compliance Evangelist
Eric Chiu (@emchiu)
President and Co-Founder
Noah Weisberger
Director, Cloud Practice
Davi Ottenheimer (@daviottenheimer)
Senior Director of Trust
3
Panelists
®
5. S&R Pros Must Adapt Strategies And Controls For
Virtualization, Cloud Adoption
Note: Enterprise = 1,000+ employees
Source: Forrsights Security Survey, Q2 2014, Forrsights Security Survey, Q2 2013, and Forrsights Security Survey, Q2 2012
6. Publicly Reported Sources Of Incidents Remain
Consistent Year Over Year
*Note: 2014 data is from January 1, 2014 to July 31 , 2014
Source: CyberFactors, a wholly owned subsidiary of CyberRiskPartners and sister company of
CloudInsure
7. Insiders And External Attacks Continue As Common
Sources Of Data Breach
Base: 249 global enterprise IT security decision-makers whose organizations had a data breach in the past 12 months
Source: Forrsights Security Survey, Q2 2014
9. Topics:
How do virtualization and cloud affect insider threats?
What is the potential for damage?
What role should management and administration play in security?
What should be done about incident response?
What does an insider threat attack look like?
What are the best practices to control insider threats in the cloud?
Panel Discussion
9