Download presentation
Presentation is loading. Please wait.
Published byRodger Owens Modified over 9 years ago
1
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Conference Announcements
2
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance About the CSA Global, not-for-profit, 501(c)6 organization Over 31,000 individual members, 120 corporate members, 60 chapters Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research Research www.cloudsecurityalliance.org/research www.cloudsecurityalliance.org/research Education www.cloudsecurityalliance.org/education/training/ www.cloudsecurityalliance.org/education/training/ Certification CCSK (individual) www.cloudsecurityalliance.org/certifymewww.cloudsecurityalliance.org/certifyme CSA STAR (provider) www.cloudsecurityalliance.org/starwww.cloudsecurityalliance.org/star “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing
3
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance CSA Mobile CSA Innovation Initiative Asia Pacific Expansion Top Threats Cloud Controls Matrix Service Level Agreements SecureCloud 2012 CSA Congress 2012
4
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Mobile – the Portal to the Cloud BYOD, New OSes, application stores, mobile clouds… Our Initiative Security Guidance for Critical Areas of Focus in Mobile Computing Secure application stores Solutions for personal and business use of a common mobile device Cloud-based security mgt of mobile devices Security frameworks and architecture Scalable authentication and secure mobile app development Organizing meeting Wed at Parc 55 Hotel at 10:30am www.cloudsecurityalliance.org/mobile
5
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Accelerate Delivery of Trusted Cloud Ecosystem Collaboration with entrepreneurs, R&D teams, customers and investors “Crowdsource” innovative solutions in the same way we create rapid best practices research Identify key structural issues and technology gaps Create market incentives to drive secure innovation Creating task force to manage project Organizing meeting Wedneday at Parc 55 Hotel at 10am www.cloudsecurityalliance.org/innovate
6
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Trusted Cloud Computing around the Globe Q2 2012 selection of APAC Headquarters location Engaging key regional stakeholders Customizing/developing relevant best practices and standards for the APAC market Center of excellence for research and training Establishment of global standards secretariat within APAC Serving as a regional hub and operations magnet for established and emerging growth corporate members Trend Micro founding sponsor
7
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Identify Threats unique to, or magnified by Cloud First Top Threats report released RSA 2010 V.2 of the Top Threats Report will be released at the end of Q2 2012 If you are interested in getting involved with the Top Threats Working Group and downloading V.1 of the Top Threats Report visit: www.cloudsecurityalliance.org/top-threats.www.cloudsecurityalliance.org/top-threats Click on the "Get Involved" tab and submit your information for the latest V.2 updates and notification of current volunteer opportunities For additional information join our Top Threats Linked In Group www.linkedin.com/groups?gid=2810287 www.linkedin.com/groups?gid=2810287
8
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Call for Working Group Co-chairs Key research project Controls framework heart of CSA GRC Stack Thank you to previous co-chairs Becky Swain, Phil Agcaoili & Marlin Pohlman Becky Swain continuing on, to help transition Interested? Contact Becky at: bswain@cloudsecurityalliance.org bswain@cloudsecurityalliance.org
9
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance CSA SLA Survey CSA SLA Research Group SME Council meeting Monday afternoon 2pm to 4pm
10
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance SLA Survey – Obtain input from Cloud Providers and Cloud Users on Uptime definitions and methods Access: https://www.surveymonkey.com/s/CSA_UPSS
11
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Effective SLAs and their Management is a key factor in the successful adoption of the Cloud A new SLA Research Group is being formed and a charter is currently being drafted by the SME Council SME council is calling for volunteers to assist in the SLA Research Group Contact Said Tabet at said.tabet@emc.comsaid.tabet@emc.com
12
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance SecureCloud 2012 May 9-10, 2012, Frankfurt Am Main, Germany Partnership with ENISA, CASED, ISACA, Fraunhoefer Institute 100 euro “early bird” discount through March 15 www.cloudsecurityalliance.org/events/securecloud-2012/ Cloud Security Alliance Congress 2012 November 7-8, 2012, Orlando Florida www.misti.com/cloud Call for papers and sponsors coming soon
13
www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.