SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Cloud computing




Companies and
 collaboration

                    @lorievela
Who uses cloud computing?


                        22%
                   Professional
                     Services
                       and
                  21% Education
                 and Public Sector



                           @lorievela
Cloud adoption

             60% business
            think it could be
               their most
              significant IT
                operating
            method in 2014
             but Security is
              still an issue
                   (63%)

                       @lorievela
Security and Risk
➢The top five cloud applications deployed
company-wide are website hosting (24%),
emailhosting (23%), database hosting (22%),
servers (22%) and storage (20%)
➢Security is deemed an ongoing issue that goes

beyond cloud (74%) but is certainly a priority
➢in evaluating and managing IT delivered via

cloud (80%)
➢43% say it will not prevent them adopting more

cloud services

                                           @lorievela
Cloud supply
➢As in 2010 the key requirement of a cloud
supplier is that they provide data security and
privacy (73%) – having strong business continuity
and disaster recovery processes has grown in
importance (70%), whilst providing performance
SLAs (67%) remains the third biggest
consideration
➢Most prefer to use a mix of cloud suppliers (71%)

rather than relying on a single service provider
(25%) Methodology overview


                                            @lorievela
Conclusions


✔Security factors prevail
✔Risk evaluation of cloud

✔Data privacy and contract issues

✔Quality assurance and transition management

✔Infrastructure and service provider business




                                          @lorievela
Key enablers of the process
                 ➢ease of transition
                 (58%),
                 ➢quality assurance

                 (55%)
                 ➢while regulations

                 on the
                 security and
                 control of
                 customer data
                 (54%)

                             @lorievela
SaaS




Software as a
   Service




          @lorievela
Paas

  Platform as a Service


          Iaas


Infrastructure as a Service


                     @lorievela
Security sticking points




             Security is a partiuclar
             issue for companies in
                UK and Germany




                               @lorievela
Attitudes
74% of CIOs think IT security
is a concern whether IT
systems
and applications are delivered
via the cloud or not. Against
this backdrop, the fact that
80% see security issues as a
priority when evaluating and
managing IT via cloud
services may in part be simply
due diligence in coming to
terms with a new approach

                      @lorievela
Cloud and Risk
         For many companies,
         risk is synonymous with
         security: compromises
         in security (45%) and
         brand damage as a
         result of performance
         issues or security
         incidents (42%) are
         pinpointed as specific
         business risks
         associated with
         adopting cloud
         services.
                         @lorievela
Deployment of
       cloud

Private clouds are
particularly popular as an
option in Spain (58%),
Germany (57%) and the
UK (56%) Community
Cloud 13%



                    @lorievela
Cloud suppliers
           providing data security
           and privacy (73%)
           emerges as the most
           important factor,
           followed by business
           continuity and disaster
           recovery processes
           (70%) and the
           provision of
           performance
           assurances / SLAs
           (67%)
Future business use of cloud
     services providers



                 only one in four
                 companies would
                 opt for a single
                 supplier




                             @lorievela
Cloud computing




                    Risk or future?


Report: European CIO Cloud, adrdressing security,
                                                    @lorievela
               risk and transition

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
Accenture Operations
 

Was ist angesagt? (20)

The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Management
 
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introduction
 
IDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary CloudIDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary Cloud
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 

Ähnlich wie cloud computing risks

Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
Erik Ginalick
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security study
Dome9 Security
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
David Gould
 
veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016
Don Harrison
 

Ähnlich wie cloud computing risks (20)

Keys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information TechnologyKeys to Successful Cloud Migrations - General Dynamics Information Technology
Keys to Successful Cloud Migrations - General Dynamics Information Technology
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?Why businesses are moving to the Cloud?
Why businesses are moving to the Cloud?
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and Recovery
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security study
 
Cloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital TransformationCloud computing - The Trailblazer of Digital Transformation
Cloud computing - The Trailblazer of Digital Transformation
 
2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation2019 CIO Think Tank: Pathways to Multicloud Transformation
2019 CIO Think Tank: Pathways to Multicloud Transformation
 
Cloud Adoption Trends
Cloud Adoption TrendsCloud Adoption Trends
Cloud Adoption Trends
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
The Cloud Revolution
The Cloud RevolutionThe Cloud Revolution
The Cloud Revolution
 
veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016veritas-state-of-the-hybrid-cloud-report-2016
veritas-state-of-the-hybrid-cloud-report-2016
 
The future of cloud computing infographic
The future of cloud computing infographicThe future of cloud computing infographic
The future of cloud computing infographic
 
Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1
 
Enterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey ResultsEnterprise Cloud Adoption Survey Results
Enterprise Cloud Adoption Survey Results
 
Cloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de UglyCloud for Busieness Managers: the Good, the Bad and de Ugly
Cloud for Busieness Managers: the Good, the Bad and de Ugly
 

Mehr von Lorie Vela (7)

Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010Informe el trabajador_autonomo_y_si_2010
Informe el trabajador_autonomo_y_si_2010
 
Guideteamworkcollaboration
GuideteamworkcollaborationGuideteamworkcollaboration
Guideteamworkcollaboration
 
The collaborative enterprise
The collaborative enterpriseThe collaborative enterprise
The collaborative enterprise
 
How important is collaboration
How important is collaborationHow important is collaboration
How important is collaboration
 
Aprendizaje colaborativo
Aprendizaje colaborativo Aprendizaje colaborativo
Aprendizaje colaborativo
 
Teamwork conflict management survey
Teamwork conflict management surveyTeamwork conflict management survey
Teamwork conflict management survey
 
Redes sociales y enseñanza
Redes sociales y enseñanzaRedes sociales y enseñanza
Redes sociales y enseñanza
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

cloud computing risks

  • 1. Cloud computing Companies and collaboration @lorievela
  • 2. Who uses cloud computing? 22% Professional Services and 21% Education and Public Sector @lorievela
  • 3. Cloud adoption 60% business think it could be their most significant IT operating method in 2014 but Security is still an issue (63%) @lorievela
  • 4. Security and Risk ➢The top five cloud applications deployed company-wide are website hosting (24%), emailhosting (23%), database hosting (22%), servers (22%) and storage (20%) ➢Security is deemed an ongoing issue that goes beyond cloud (74%) but is certainly a priority ➢in evaluating and managing IT delivered via cloud (80%) ➢43% say it will not prevent them adopting more cloud services @lorievela
  • 5. Cloud supply ➢As in 2010 the key requirement of a cloud supplier is that they provide data security and privacy (73%) – having strong business continuity and disaster recovery processes has grown in importance (70%), whilst providing performance SLAs (67%) remains the third biggest consideration ➢Most prefer to use a mix of cloud suppliers (71%) rather than relying on a single service provider (25%) Methodology overview @lorievela
  • 6. Conclusions ✔Security factors prevail ✔Risk evaluation of cloud ✔Data privacy and contract issues ✔Quality assurance and transition management ✔Infrastructure and service provider business @lorievela
  • 7. Key enablers of the process ➢ease of transition (58%), ➢quality assurance (55%) ➢while regulations on the security and control of customer data (54%) @lorievela
  • 8. SaaS Software as a Service @lorievela
  • 9. Paas Platform as a Service Iaas Infrastructure as a Service @lorievela
  • 10. Security sticking points Security is a partiuclar issue for companies in UK and Germany @lorievela
  • 11. Attitudes 74% of CIOs think IT security is a concern whether IT systems and applications are delivered via the cloud or not. Against this backdrop, the fact that 80% see security issues as a priority when evaluating and managing IT via cloud services may in part be simply due diligence in coming to terms with a new approach @lorievela
  • 12. Cloud and Risk For many companies, risk is synonymous with security: compromises in security (45%) and brand damage as a result of performance issues or security incidents (42%) are pinpointed as specific business risks associated with adopting cloud services. @lorievela
  • 13. Deployment of cloud Private clouds are particularly popular as an option in Spain (58%), Germany (57%) and the UK (56%) Community Cloud 13% @lorievela
  • 14. Cloud suppliers providing data security and privacy (73%) emerges as the most important factor, followed by business continuity and disaster recovery processes (70%) and the provision of performance assurances / SLAs (67%)
  • 15. Future business use of cloud services providers only one in four companies would opt for a single supplier @lorievela
  • 16. Cloud computing Risk or future? Report: European CIO Cloud, adrdressing security, @lorievela risk and transition