How to use the force in the cloud wisely, Or – have you outsourced your security to the cloud?
USE THE FORCE, CIO! How to use the force in the cloud wisely, Or - - PowerPoint PPT Presentation
USE THE FORCE, CIO! How to use the force in the cloud wisely, Or - - PowerPoint PPT Presentation
USE THE FORCE, CIO! How to use the force in the cloud wisely, Or have you outsourced your security to the cloud? TAKE-AWAYS How-tos keeping information safe regardless of where it is Other perspectives CEO, COO, CIO, CISO,
TAKE-AWAYS
➢How-to´s keeping information safe regardless of where it is ➢Other perspectives – CEO, COO, CIO, CISO, Dev/Innovation ➢Guidance and good examples based on true stories
ANNA REHNSTRÖM
- VP Infrastructure
- CSO
- CISO
- Lieutenant Swedish Airforce
- Information security consultant
- Information security Swedish
contingency agency
- Star wars fan
- Forward
- Mum of 3 teens
- Dog-mum
- Married to the same man for 20
years
- Swedish
REFERENCE CASE
- AVAILABLE
- DIGITAL
- SECURE
- EASY TO USE
- THE RIGHT PRICE
- BANG FOR THE
BUCK
The developers
APPLICATION LAYER LEGACY APPS *NIX LEGACY APPS WINDOWS LINUX LEGACY APPS IAAS PAAS SERVERLESS CLOUD NATIVE APPS OTHER MSP ON PREMISE PRIVATE CLOUD PUBLIC CLOUD
TRADITIONAL DATA STORAGE TRADITIONAL DATA STORAGE TRADITIONAL DATA STORAGE BIG DATA
IOT IDENTIFY API’s OTHER PaaS & SaaS
V P N
IOT
3 PARTY APP SERVICES
V P N V P N V P N V P N
Is there any good links?
IT operations
GARTNER BIMODAL IT
MODE 1 MODE 2
The CISO
CUSTOMER DATA PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION
SERVER-SIDE ENCRYPTION (FILE SYSTEM AND/OR DATA) CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION NETWORKING TRAFFIC PROTECTION (ENCRYPTION, INTEGRITY, IDENTITY)
HARDWARE/PUBLIC CLOUD GLOBAL INFRASTRUCTURE SOFTWARE AVAILABILITY ZONES REGIONS EDGE LOCATIONS NETWORKING DATABASE STORAGE compute
CUSTOMER PUBLIC CLOUD PROVIDER
Cloud security
“WE ARE NOT ALONE, GOOD PEOPLE WILL FIGHT IF YOU LEAD THEM”
Poe Dameron, acting General of the Resistance
CYBERHYGIENE
- 19th march 2019
- Zero day vulnerability
- Sleeper agents – ready to extort
- 3 months / 600 million NOK
BIG GAME HUNTING
Norsk Hydro
Cyber hygiene
- Culture of
accountability
- Awareness training
- Incident Response
- Communication team
- Cybersecurity team
(*link)
Manners!
- Mutually Agreed
Norms for Routing Security (MANRS)
- CERT Resilience
management model
“THERE IS NO NAVY, IT´S JUST..PEOPLE!”
First order command
HOW TO?
- WHAT IS NEEDED TO BE
PROTECTED AND WHY?
- USE REFERENCES
- USE EXPERTS FROM
CLOUD PROVIDERS
- CLASSIFY YOUR
DATA
- USE SERVICE
PROVIDERS
“IN MY EXPERIENCE THERE IS NO SUCH THING AS LUCK.”
Obi-Wan Kenobi
“I HAVE TAUGHT YOU EVERYTHING I KNOW. AND YOU HAVE BECOME A FAR GREATER JEDI THAN I COULD EVER HOPE TO BE.”
Obi-Wan
TAKE-AWAYS
➢How-to´s keeping information safe regardless of where it is ➢Other perspectives – CEO, COO, CIO, CISO, Dev/Innovation ➢Guidance and good examples based on true stories
PEOPLE, PROCESSES AND TECHNOLOGY - AND EXCELLENT LEADERSHIP