Decoding Cloud Security Matrix and Shared Responsibility in the Cloud

Logo
Presented by

Prasun Srivastava (Senior Solutions Architect – India and SAARC region, Cloud Protection and Licensing, Thales)

About this talk

Closing Keynote The latest cybersecurity incidents affecting government agencies and organizations as well as large enterprises around the world, who have invested heavily in digital and cloud initiatives, have demonstrated the urgent need for businesses to segregate their security duties from those of cloud service providers, and own their own data security to avoid cyber threats and prevent criminals. The most important security consideration is knowing exactly who is responsible for what in any given cloud project. It’s less important if any particular cloud provider offers a specific security control, as long as you know precisely what they do offer and how it works. The CSA provides two tools to help meet these requirements: The Consensus Assessments Initiative Questionnaire (CAIQ). A standard template for cloud providers to document their security and compliance controls. & the CCM, which lists cloud security controls and maps them to multiple security and compliance standards. The CCM can also be used to document security responsibilities. In this session we would take a look into the above and talk about some of the controls critical to owning you data on the cloud.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (901)
Subscribers (65575)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa