We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmelia Moors
Modified about 1 year ago
Copyright © 2013 Cloud Security Alliance CSA Speed Talk: “STAR &CCSK – An Update on Provider and User Certification”
Copyright © 2013 Cloud Security Alliance Private, Community & Public Clouds Sunlight is the best disinfectant,” U.S. Supreme Court Justice Louis Brandeis
Copyright © 2013 Cloud Security Alliance 2 Registered (December 2012) 22 Registered (February 2013) Entries growing: Amazon, Box, FireHost HP, Microsoft, Solutionary, Symantec, Telecom Italia Verizon/Terremark, … STAR integrated solutions: RSA Archer, Agiliance, Qualys, Sky High Networks, … STAR practices: PwC, Verizon STAR in ecosystem: U of Phoenix, Red Hat, Sallie Mae, Gov’ts, Fin Svc
Copyright © 2013 Cloud Security Alliance The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. The CSA Open Certification Framework is a program for flexible, incremental and multi- layered cloud provider certification according to the Cloud Security Alliance’s industry leading security guidance and control objectives. The program will integrate with popular third- party assessment and attestation statements developed within the public accounting community to avoid duplication of effort and cost.
Copyright © 2013 Cloud Security Alliance OPEN CERTIFICATION FRAMEWORK CONTINUOUS ATTESTATION | CERTIFICATION SELF ASSESSMENT TRANSPERANCY ASSURANCE
Copyright © 2013 Cloud Security Alliance Now 90 Minutes Long Use purchased token for V3 Option to elect to take V.2.1 Prior to May 1 – Price is still $295
Copyright © 2013 Cloud Security Alliance Initial partners HP, Optimus Technology & Telecom Investing in global expansion of CCSK training availability
Copyright © 2013 Cloud Security Alliance ISC2 has expanded its alliance with the CSA - Global Information Security Workforce Study shows cloud skills gap Partnering in development of infosec credentials for Cloud Computing “Cloud Networking Security” first focus area Complements CISSP, CCSK
Copyright © 2013 Cloud Security Alliance For more information on the new version of CCSK visit: For more information on CSA STAR visit: Visit our CSA Booth #3020 and get $50 off a CCSK token when purchased at the booth.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
Copyright © 2011 Cloud Security Alliance Cloud Security Alliance Research & Roadmap Jim Reavis, Executive Director, CSA.
Cloud Security Alliance Research & Roadmap Jim Reavis Executive Director June 2011.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM Laura Posey, Chair CAIQ.
Copyright © 2012 Cloud Security Alliance Conference Announcements.
Cloud Security Alliance Research & Roadmap Jim Reavis Executive Director August 2011.
Copyright © 2011 Cloud Security Alliance Building Trust into the Next Generation of Information Technology.
Copyright © 2014 Cloud Security Alliance Security Certification for Cloud Services : The CSA STAR Certification Daniele Catteddu,
Cloud Security Challenges Today and Tomorrow NameTitle February 2011.
Cloud Security Alliance Overview and Organizational Plans Jim Reavis, Co-founder & Executive Director August 5, 2009.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Copyright © 2011 Cloud Security Alliance Keynote.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Microsoft Cloud Services Training and Certification Presented by Name Goes Here, Title.
Progress Report on the U.S. NSTIC Efforts Jack Suess – Delegate for Research, Development, Education & Innovation
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
TPSC Cloud™ Collaborative Governance, Risk & Compliance software Ditlev Hindkjaer TPSC International Partner Manager.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. EMC Proven Professional INFORMATION STORAGE AND MANAGEMENT V2 Course Introduction.
Copyright © 2011 Cloud Security Alliance Cloud Controls Matrix Work Group Session Sean Cordero President of Cloudwatchmen,
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
5 th ITU Green Standards Week Nassau, The Bahamas December 2015 Taming The IoT Security & Privacy Beast Craig Spiezle, Executive Director, Online.
Company Overview o Leading Provider of ‘Integrated eCommerce’ Solution o Over 450 team members with background from: Product software (e.g. Microsoft,
Cloud Architecture. SPI Model Cloud Computing Classification Model – SPI Cloud Computing Classification Model – SPI - SaaS: (Software as a Service) -
12,000 anonymized surveyed results Worldwide user base Cloud Security Readiness Tool Security trends report:
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
TFTM Deliverable Self Assessment and Attestation Program Discussion Deck TFTM Committee June 25, IDESG TFTM Committee1.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. CCSK Training Ilia Tivin.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
CloudAudit Working Group Update April CloudAudit Charter Provide a common interface and namespace that allows cloud computing providers to automate.
Copyright © 2011 Cloud Security Alliance.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
ANSI Healthcare Collaborative Convening The Future Landscape for Health Professions Workforce: Employer/Education Partnerships = Transformative.
L ASER A PP C ONFERENCE 2015 CRM for Wealth Management.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
Achieving Assurance and Compliance in the Cloud Digital Government Cyber Security Conference Cheryl Wilner, CEO Bethesda Advanced Solutions Ronald Regan.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Service Organization Controls (SOC) Overview Shared Assessment Member Forum Presentation April 10, 2012.
Industry Session Panel Discussion. Industry Session Panel Discussion QKD Ecosystem.
Mark Estberg, John Howie Senior Directors Microsoft Corporation SESSION CODE: SIA317.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
The State of Security Management By Jim Reavis January 2003.
The Future of Licensing Facing Global, Programmatic and Technological Challenges Jason Kap Senior Director, Worldwide Licensing and Pricing Microsoft Corporation.
Cloud Cellar Offers Users a Cost-Effective, Turnkey Backup and Restore Solution for Their Applications and Data Hosted in the Microsoft Azure Cloud MICROSOFT.
© 2017 SlidePlayer.com Inc. All rights reserved.