Upload
vmworld
View
265
Download
2
Tags:
Embed Size (px)
Citation preview
Disclaimer
• This presentation may contain product features that are currently under development.
• This overview of new technology represents no commitment from VMware to deliver these features in any generally available product.
• Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery.
• Pricing and packaging for any new technologies or features discussed or presented have not been determined.
CONFIDENTIAL 2
Rick Holland (@rickhholland)Principal Analyst
George Gerchow (@georgegerchow) Cloud/Compliance Evangelist
Eric Chiu (@emchiu)President and Co-Founder
Noah WeisbergerDirector, Cloud Practice
Davi Ottenheimer (@daviottenheimer)Senior Director of Trust
3
Panelists
®
S&R Pros Must Adapt Strategies And Controls For
Virtualization, Cloud Adoption
Note: Enterprise = 1,000+ employees
Source: Forrsights Security Survey, Q2 2014, Forrsights Security Survey, Q2 2013, and Forrsights Security Survey, Q2 2012
Publicly Reported Sources Of Incidents Remain
Consistent Year Over Year
*Note: 2014 data is from January 1, 2014 to July 31 , 2014
Source: CyberFactors, a wholly owned subsidiary of CyberRiskPartners and sister company of
CloudInsure
Insiders And External Attacks Continue As Common
Sources Of Data Breach
Base: 249 global enterprise IT security decision-makers whose organizations had a data breach in the past 12 months
Source: Forrsights Security Survey, Q2 2014
Topics: How do virtualization and cloud affect insider threats?
What is the potential for damage?
What role should management and administration play in security?
What should be done about incident response?
What does an insider threat attack look like?
What are the best practices to control insider threats in the cloud?
Panel Discussion
9