12

Sec2296 final emea

  • Upload
    vmworld

  • View
    265

  • Download
    2

Embed Size (px)

Citation preview

Disclaimer

• This presentation may contain product features that are currently under development.

• This overview of new technology represents no commitment from VMware to deliver these features in any generally available product.

• Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind.

• Technical feasibility and market demand will affect final delivery.

• Pricing and packaging for any new technologies or features discussed or presented have not been determined.

CONFIDENTIAL 2

Rick Holland (@rickhholland)Principal Analyst

George Gerchow (@georgegerchow) Cloud/Compliance Evangelist

Eric Chiu (@emchiu)President and Co-Founder

Noah WeisbergerDirector, Cloud Practice

Davi Ottenheimer (@daviottenheimer)Senior Director of Trust

3

Panelists

®

Introductions

Market Trends and Overview

Panel Discussion

4

Agenda

S&R Pros Must Adapt Strategies And Controls For

Virtualization, Cloud Adoption

Note: Enterprise = 1,000+ employees

Source: Forrsights Security Survey, Q2 2014, Forrsights Security Survey, Q2 2013, and Forrsights Security Survey, Q2 2012

Publicly Reported Sources Of Incidents Remain

Consistent Year Over Year

*Note: 2014 data is from January 1, 2014 to July 31 , 2014

Source: CyberFactors, a wholly owned subsidiary of CyberRiskPartners and sister company of

CloudInsure

Insiders And External Attacks Continue As Common

Sources Of Data Breach

Base: 249 global enterprise IT security decision-makers whose organizations had a data breach in the past 12 months

Source: Forrsights Security Survey, Q2 2014

Code Spaces is a Prime Example

Topics: How do virtualization and cloud affect insider threats?

What is the potential for damage?

What role should management and administration play in security?

What should be done about incident response?

What does an insider threat attack look like?

What are the best practices to control insider threats in the cloud?

Panel Discussion

9

Q & A

10