USE THE FORCE, CIO! How to use the force in the cloud wisely, Or - - PowerPoint PPT Presentation

use the force cio
SMART_READER_LITE
LIVE PREVIEW

USE THE FORCE, CIO! How to use the force in the cloud wisely, Or - - PowerPoint PPT Presentation

USE THE FORCE, CIO! How to use the force in the cloud wisely, Or have you outsourced your security to the cloud? TAKE-AWAYS How-tos keeping information safe regardless of where it is Other perspectives CEO, COO, CIO, CISO,


slide-1
SLIDE 1

How to use the force in the cloud wisely, Or – have you outsourced your security to the cloud?

USE THE FORCE, CIO!

slide-2
SLIDE 2

TAKE-AWAYS

➢How-to´s keeping information safe regardless of where it is ➢Other perspectives – CEO, COO, CIO, CISO, Dev/Innovation ➢Guidance and good examples based on true stories

slide-3
SLIDE 3

ANNA REHNSTRÖM

  • VP Infrastructure
  • CSO
  • CISO
  • Lieutenant Swedish Airforce
  • Information security consultant
  • Information security Swedish

contingency agency

  • Star wars fan
  • Forward
  • Mum of 3 teens
  • Dog-mum
  • Married to the same man for 20

years

  • Swedish
slide-4
SLIDE 4

REFERENCE CASE

  • AVAILABLE
  • DIGITAL
  • SECURE
  • EASY TO USE
  • THE RIGHT PRICE
  • BANG FOR THE

BUCK

slide-5
SLIDE 5

The developers

slide-6
SLIDE 6

APPLICATION LAYER LEGACY APPS *NIX LEGACY APPS WINDOWS LINUX LEGACY APPS IAAS PAAS SERVERLESS CLOUD NATIVE APPS OTHER MSP ON PREMISE PRIVATE CLOUD PUBLIC CLOUD

TRADITIONAL DATA STORAGE TRADITIONAL DATA STORAGE TRADITIONAL DATA STORAGE BIG DATA

IOT IDENTIFY API’s OTHER PaaS & SaaS

V P N

IOT

3 PARTY APP SERVICES

V P N V P N V P N V P N

slide-7
SLIDE 7

Is there any good links?

IT operations

slide-8
SLIDE 8

GARTNER BIMODAL IT

MODE 1 MODE 2

slide-9
SLIDE 9

The CISO

slide-10
SLIDE 10

CUSTOMER DATA PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION

SERVER-SIDE ENCRYPTION (FILE SYSTEM AND/OR DATA) CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION NETWORKING TRAFFIC PROTECTION (ENCRYPTION, INTEGRITY, IDENTITY)

HARDWARE/PUBLIC CLOUD GLOBAL INFRASTRUCTURE SOFTWARE AVAILABILITY ZONES REGIONS EDGE LOCATIONS NETWORKING DATABASE STORAGE compute

CUSTOMER PUBLIC CLOUD PROVIDER

Cloud security

slide-11
SLIDE 11
slide-12
SLIDE 12

“WE ARE NOT ALONE, GOOD PEOPLE WILL FIGHT IF YOU LEAD THEM”

Poe Dameron, acting General of the Resistance

slide-13
SLIDE 13

CYBERHYGIENE

slide-14
SLIDE 14
  • 19th march 2019
  • Zero day vulnerability
  • Sleeper agents – ready to extort
  • 3 months / 600 million NOK

BIG GAME HUNTING

Norsk Hydro

slide-15
SLIDE 15
slide-16
SLIDE 16

Cyber hygiene

  • Culture of

accountability

  • Awareness training
  • Incident Response
  • Communication team
  • Cybersecurity team

(*link)

slide-17
SLIDE 17

Manners!

  • Mutually Agreed

Norms for Routing Security (MANRS)

  • CERT Resilience

management model

slide-18
SLIDE 18

“THERE IS NO NAVY, IT´S JUST..PEOPLE!”

First order command

slide-19
SLIDE 19

HOW TO?

  • WHAT IS NEEDED TO BE

PROTECTED AND WHY?

  • USE REFERENCES
  • USE EXPERTS FROM

CLOUD PROVIDERS

  • CLASSIFY YOUR

DATA

  • USE SERVICE

PROVIDERS

slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22

“IN MY EXPERIENCE THERE IS NO SUCH THING AS LUCK.”

Obi-Wan Kenobi

slide-23
SLIDE 23

“I HAVE TAUGHT YOU EVERYTHING I KNOW. AND YOU HAVE BECOME A FAR GREATER JEDI THAN I COULD EVER HOPE TO BE.”

Obi-Wan

slide-24
SLIDE 24

TAKE-AWAYS

➢How-to´s keeping information safe regardless of where it is ➢Other perspectives – CEO, COO, CIO, CISO, Dev/Innovation ➢Guidance and good examples based on true stories

slide-25
SLIDE 25

PEOPLE, PROCESSES AND TECHNOLOGY - AND EXCELLENT LEADERSHIP

USE THE FORCE, CIO!