SlideShare a Scribd company logo
1 of 26
Trust & Value from Cloud Computing Why you should go for it. ISACA Cloud Computing Task Force Marc Vael, Chairman  5 August 2011 – Virtual Seminar and Tradeshow
Whostartedallthis? “What's interesting [now] is that there is an emergent new model, and you all are here because you are part of that new model. I don't think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call it cloud computing – they should be in a "cloud" somewhere. And that if you have the right kind of browser or the right kind of access, it doesn't matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what have you – or new devices still to be developed – you can get access to the cloud.” Mr. Eric Schmidt, Chairman & CEO Google Search Engine Strategies Conference,9th of August 2006 http://www.google.com/press/podium/ses2006.html  5 August 2011 – Virtual Seminar and Tradeshow
We live in a world today that is quiteradically different from the world that existed just five yearsago. Cloud Computing Task Force Marc Vael, Chairman  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
5 essentialcharacteristics  5 August 2011 – Virtual Seminar and Tradeshow
3 service models  5 August 2011 – Virtual Seminar and Tradeshow
4 deployment models  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing advantages  5 August 2011 – Virtual Seminar and Tradeshow
T R U S T V A L U E Cloud computing advantages Cloud Computing Trust & Value elements Confidentiality Privacy Integrity Availability Compliance Licensing Reliability Monitoring Integration Network centric Lower upfront investments More OPEX than CAPEX On demand Convenience Scalability Better resource pooling/usage Flexibility Business control over IT solutions Centralized data (sort of) Faster implementation Logging & Monitoring Green IT Trust creates the opportunity for Value Value is based on an expectation of Trust  5 August 2011 – Virtual Seminar and Tradeshow
53%
Cloud computing attention topics Keep 15 basic IT outsourcing lessonslearned in mind: Psychological impact IT governance model Integration withinternal IT systems Network connectivity / bandwidth Data location Shared tenancy Lock in withvendor Cloud Service Provider stability, reliabilityandviability Service portability Legal & regulatory compliance aspects (includingLicensing, Contractual arrangements) Information security management (including IAM) Incident response & crisis management Business Continuity Management & Disaster Recovery Planning Data archiving & removal (Right to) Audit (pentest, screening, monitoring,…)  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing ready?  5 August 2011 – Virtual Seminar and Tradeshow
Cloud computing auditing ,[object Object]
PO8 Manage quality
PO9 Assess & manage IT risks
AI4 Enableoperation & use
AI5 Procure IT resources
AI6 Manage change
AI7 Install & accredit solutions & changes
DS1 Design & manage service levels

More Related Content

What's hot

Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0
kimwisniewski
 

What's hot (20)

Sophos network protection 6 sep 17
Sophos network protection 6 sep 17Sophos network protection 6 sep 17
Sophos network protection 6 sep 17
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
 
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of ITWhy is hybrid cloud still so hard? 4 keys to unlock the future of IT
Why is hybrid cloud still so hard? 4 keys to unlock the future of IT
 
Cloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all IndustriesCloud Computing: A Revoluntionary for all Industries
Cloud Computing: A Revoluntionary for all Industries
 
Cisco Data Center Fabric
Cisco Data Center FabricCisco Data Center Fabric
Cisco Data Center Fabric
 
Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...Remote infrastructure management remote it infrastructure management from any...
Remote infrastructure management remote it infrastructure management from any...
 
Sutedjo - Digital Transformation for SAP
Sutedjo -  Digital Transformation for SAPSutedjo -  Digital Transformation for SAP
Sutedjo - Digital Transformation for SAP
 
Head in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceHead in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources Conference
 
Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0Fs presentation1 symposium 16 9 v5_0
Fs presentation1 symposium 16 9 v5_0
 
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
 
Why edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successWhy edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud success
 
Expert predictions for cloud 2018
Expert predictions for cloud 2018Expert predictions for cloud 2018
Expert predictions for cloud 2018
 
10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare10 Good Reasons: NetApp for Healthcare
10 Good Reasons: NetApp for Healthcare
 
Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging Technologies
 
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
An Effective Approach to Cloud Migration for Small and Medium Enterprises (SMEs)
 
Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010Bob Lozano - DoDIIS Worldwide 2010
Bob Lozano - DoDIIS Worldwide 2010
 
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
CWIN17 Singapore / Darmadi komo (microsoft)   modern data estateCWIN17 Singapore / Darmadi komo (microsoft)   modern data estate
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions
 

Viewers also liked (6)

sanju
sanjusanju
sanju
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similar to Isaca india trust & value from cloud computing (aug 2011) print

OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
mdesai005
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan Falconer
IDG Romania
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
VISIHOSTING
 

Similar to Isaca india trust & value from cloud computing (aug 2011) print (20)

IoT Connectivity & IoT Analytics
IoT Connectivity & IoT AnalyticsIoT Connectivity & IoT Analytics
IoT Connectivity & IoT Analytics
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
 
ClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshopClientSummit2010_CloudWorkshop
ClientSummit2010_CloudWorkshop
 
The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)The Vortex of Change - Digital Transformation (Presented by Intel)
The Vortex of Change - Digital Transformation (Presented by Intel)
 
CRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerCRTC Cloud- Scott Sadler
CRTC Cloud- Scott Sadler
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan Falconer
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Why Cloud Management Makes Sense
Why Cloud Management Makes SenseWhy Cloud Management Makes Sense
Why Cloud Management Makes Sense
 
Jakarta keynote
Jakarta keynoteJakarta keynote
Jakarta keynote
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud Computing
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
 
Assembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementAssembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud management
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 

More from Marc Vael

More from Marc Vael (20)

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Isaca india trust & value from cloud computing (aug 2011) print

  • 1. Trust & Value from Cloud Computing Why you should go for it. ISACA Cloud Computing Task Force Marc Vael, Chairman 5 August 2011 – Virtual Seminar and Tradeshow
  • 2. Whostartedallthis? “What's interesting [now] is that there is an emergent new model, and you all are here because you are part of that new model. I don't think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call it cloud computing – they should be in a "cloud" somewhere. And that if you have the right kind of browser or the right kind of access, it doesn't matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what have you – or new devices still to be developed – you can get access to the cloud.” Mr. Eric Schmidt, Chairman & CEO Google Search Engine Strategies Conference,9th of August 2006 http://www.google.com/press/podium/ses2006.html 5 August 2011 – Virtual Seminar and Tradeshow
  • 3. We live in a world today that is quiteradically different from the world that existed just five yearsago. Cloud Computing Task Force Marc Vael, Chairman 5 August 2011 – Virtual Seminar and Tradeshow
  • 4. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 5. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 6. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 7. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 8. 5 essentialcharacteristics 5 August 2011 – Virtual Seminar and Tradeshow
  • 9. 3 service models 5 August 2011 – Virtual Seminar and Tradeshow
  • 10. 4 deployment models 5 August 2011 – Virtual Seminar and Tradeshow
  • 11. Cloud computing advantages 5 August 2011 – Virtual Seminar and Tradeshow
  • 12. T R U S T V A L U E Cloud computing advantages Cloud Computing Trust & Value elements Confidentiality Privacy Integrity Availability Compliance Licensing Reliability Monitoring Integration Network centric Lower upfront investments More OPEX than CAPEX On demand Convenience Scalability Better resource pooling/usage Flexibility Business control over IT solutions Centralized data (sort of) Faster implementation Logging & Monitoring Green IT Trust creates the opportunity for Value Value is based on an expectation of Trust 5 August 2011 – Virtual Seminar and Tradeshow
  • 13. 53%
  • 14.
  • 15.
  • 16. Cloud computing attention topics Keep 15 basic IT outsourcing lessonslearned in mind: Psychological impact IT governance model Integration withinternal IT systems Network connectivity / bandwidth Data location Shared tenancy Lock in withvendor Cloud Service Provider stability, reliabilityandviability Service portability Legal & regulatory compliance aspects (includingLicensing, Contractual arrangements) Information security management (including IAM) Incident response & crisis management Business Continuity Management & Disaster Recovery Planning Data archiving & removal (Right to) Audit (pentest, screening, monitoring,…) 5 August 2011 – Virtual Seminar and Tradeshow
  • 17. Cloud computing ready? 5 August 2011 – Virtual Seminar and Tradeshow
  • 18.
  • 19.
  • 21. PO9 Assess & manage IT risks
  • 23. AI5 Procure IT resources
  • 25. AI7 Install & accredit solutions & changes
  • 26. DS1 Design & manage service levels
  • 30. ME2 Monitor & evaluateinternal control
  • 31. ME3 Ensure compliance withexternalrequirements 5 August 2011 – Virtual Seminar and Tradeshow
  • 32.
  • 33.
  • 34. Your cloud computing solution is as strong … … as its weakest link
  • 35. Contact information Marc VaelCISA, CISM, CISSP, CGEIT, ITIL Service Manager, Prince2 Chairman ISACA Cloud Computing Task Force ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows IL 60008 USA http://www.isaca.org/cloud marc@vael.net http://www.linkedin.com/in/marcvael http://twitter.com/marcvael 5 August 2011 – Virtual Seminar and Tradeshow
  • 36. THANK YOU FOR YOUR ATTENTION
  • 37. Cloud computing websites www.cloudsecurityalliance.org/ www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment csrc.nist.gov/groups/SNS/cloud-computing/ opencloudconsortium.org/ www.opencloudmanifesto.org/ www.cloud-standards.org/wiki/ en.wikipedia.org/wiki/Cloud_computing searchcloudcomputing.techtarget.com/ cloudcomputing.sys-con.com/ cloudsecurity.org/ www.cloudaudit.org/ www.isaca.org/cloudcomputingresources 5 August 2011 – Virtual Seminar and Tradeshow
  • 38. Cloud computing publications Executive’s Guide to Cloud Computing,Eric Marks-Bob Lozano, 304 pages, May 2010 Enterprise Cloud Computing: A Strategy Guide for Business and Technology Leaders, Andy Mulholland-Jon Pyke-Peter Fingar, 260 pages, April 2010 Cloud Computing: technologies & strategies of the ubiquitous data center, Curtis Franklin & Brian Chee, 288 pages, February 2010 Above the Clouds: managing risk in the world of cloud computing, Kevin Mcdonald, February 2010 Cloud Computing for dummies, Judith Hurwitz-Robin Bloor-Marcia Kaufman, 310 pages, November 2009 Cloud Security,Ronald Krutz Russell Dean Vines, 384 pages, July 2010 Management strategies for the Cloud Revolution,Charles Babcock, 272 pages, June 2010 5 August 2011 – Virtual Seminar and Tradeshow