SlideShare a Scribd company logo
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
CHARTING THE COURSE
THROUGH DISRUPTION WITH
CSA RESEARCH
J.R. SANTOS, EXECUTIVE VICE PRESIDENT OF RESEARCH
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
I O T C O N N E C T E D
D E V I C E S B Y 2 0 2 0
The total number of “things” in the Internet of Things
(IoT) is forecast to reach 20.4 billion in 2020, which is
lower than Gartner’s previous prediction of 20.8 billion,
published in 2015.

The consumer segment is tipped to make up 63 per cent
of the total IoT application market in 2017 with 5.2
billion units. Businesses are on pace to employ 3.1
billion connected things in 2017.
20.4B
3 1 %
UP FROM 2016
8 . 4 B
FOR EC AST IN 2017
TITLE GOES H ER E
Quis nostrud exercitation.
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
T HE ZET TABYTE
E RA
The document presents some of the
main findings of Cisco’s global IP
traffic forecast and explores the
implications of IP traffic growth for
service providers.
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
“The cyber security industry faces a
massive problem: there are simply not
enough highly-skilled cyber security
professionals. This is already a massive
issue, but fast-forward to 2020 and the
shortfall is expected to reach 1.5 million”
- ISC2 Workforce Study
EX IST ING EMPLOYEES CAN’ T KEEP UP
WIT H T HE CHANG ES IN OUR INDUST RY
COLLEG E G RADUAT ES LACK T HE SKILL
AND EX PERIENCE
1 .5 M ILLION C Y BE R
SE C U RITY
P RO FE SSIONA LS
NE E D E D BY 2020
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
O UR ENVIRO NMENT IN C HANG ING
TH E R EGU LATOR Y & STAN D AR D S
LAN D SC APE W ILL C H AN GE AN D BEC OME
MOR E C OMPLEX
N EW ATTAC K SU R FAC ES
TEC H N OLOGY LAN D SC APE
C H AN GES R APID LY
D ATA W ILL C ON TIN U E TO EXPLOD E
9 9 %
TH R OU GH 2020, 99% OF
VU LN ER ABILITIES EXPLOITED W ILL
C ON TIN U E TO BE ON ES KN OW N BY
SEC U R ITY AN D IT PR OFESSION ALS
FOR AT LEAST ON E YEAR .
33.3 % BY 2020, A TH IR D OF
SU C C ESSFU L ATTAC KS
EXPER IEN C ED BY
EN TER PR ISES W ILL BE ON
TH EIR SH AD OW IT
R ESOU R C ES
8 . 3 %
GR OW TH R ATE FOR
IN FOR MATION SEC U R ITY
SPEN D . FOR C ASTED TO
BR EAK 101 B BY 2020
2 5 %
BY 2020, MOR E TH AN 25%
OF ID EN TIFIED
EN TER PR ISE ATTAC KS
WILL INVOLVE IOT
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
CLOUDSECURITYALLIANCE
SE C U RITY
P RO FE SSIONA LS
NE E D T O E VO LVE
1 9
ACT IVE WORKING
G ROUPS
2009
CSA FOUNDED
SIN GAPOR E //
ASIA PAC IFIC
H EAD QU AR TER S
ED IN BU R GH //
UK HEADQUARTERS
SEATTLE/BELLIN GH AM, W A //
U S H EAD QU AR TER S
9 0 , 0 0 0 +
INDIVIDUAL
MEMBERS
300+
CORPORAT E
MEMBERS
75+
CHAPT ERS
Strategic partnerships with
governments, research
institutions, professional
associations and industry
CSA research is
FREE!
OUR COMMUNITY
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
8
RESEARCH FOR THE INDUSTRY
• CSA HAS PRODUCED OVER 165 RESEARCH
ARTIFACTS
• WE HAVE A TOTAL OF 34 RESEARCH WORKING
GROUPS (26 CURRENTLY ACTIVE)
• OVER 4500 SUBJECT MATTER EXPERTS PARTICIPATE
HAVE BEEN INVOLVED
• 50+ CONFERENCES IN 2018
* DOES NOT INCLUDED SOME REGIONAL RESEARCH,
CCM MAPPINGS ACTIVITIES, GRANT DELIVERABLES,
COMMISSIONED PROJECTS,
9
INDUSTRY
COLLABORATION
FORMAL:
• ISO/IEC JTC 1 – IT AND CLOUD SECURITY TECHNIQUES
• ITU-T – PROCEDURES AND STANDARDS IN TELECOM
• IEEE – CYBERSECURITY AND PRIVACY STANDARDS COMMITTEE
• NIST – CLOUD SECURITY WORKING GROUP
• FCC - TECHNOLOGICAL ADVISORY COMMITTEE ON IOT
• DISA DODIN (GIG) – CLOUD COMPUTING SERVICES GUIDANCE
• DOD IC - CLOUD COMPUTING STANDARDS FOCUS GROUP
• ATIS - PACKET TECHNOLOGY AND SYSTEMS COMMITTEE ON 5G
• CIS – CLOUD SECURITY BENCHMARKS
• CLOUD SECURITY INDUSTRY SUMMIT – EXECUTIVE COUNCIL OF CLOUD
• ENISA – EU FUNDED RESEARCH ON RISK, INTEROPERABILITY, SLAS, AND MORE
• ISC2 – TRAINING AND EDUCATION PARTNER FOR CLOUD SECURITY
CERTIFICATION
• ISACA – CONTINUING EDUCATION PARTNER FOR IT CERTIFICATION
• CSA CORPORATE MEMBERS – COMMISSIONED WORK TO EXPLORE TRENDING
TOPICS
• AND MANY OTHERS
INFORMAL:
MPAA, SECURITY SMART CITIES, US FEDERAL HIGHWAY ADMINISTRATION,
HIMSS, HC3, FFIEC, FDIC, OCC, EBA, AND MORE
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
• COMMON FRAMEWORK FOR TECHNOLOGY, IS
MANAGEMENT
• ASSESSES THE OVERALL SECURITY RISK OF A CLOUD
SERVICE
• PROVIDES STANDARDIZED SECURITY, OPERATIONAL RISK
MANAGEMENT
• HARMONIZES TO SECURITY STANDARDS AND COMPLIANCE
FRAMEWORKS
CLOUD SECURITY CONTROLS
• QUESTIONS TO ENABLE CLOUD COMPUTING
ASSESSMENTS
• ESTABLISH THE PRESENCE AND TESTING OF SECURITY
CONTROLS
• DISCOVER PRESENCE OF SECURITY CAPABILITIES AND
GAPS
• DOCUMENT SECURITY CONTROLS IN IAAS, PAAS, SAAS
PROVIDER ASSESSMENT QUESTIONS
• PROVIDER LISTING OF SECURITY CONTROLS
• TRANSPARENCY, AUDITING, AND HARMONIZATION OF
STANDARDS
• LEVEL OF ASSURANCE MEETING REQUIREMENTS
• INDUSTRY ACCEPTABLE
PROVIDER ASSESSMENT REPORTS
• SOLUTION TO HELP ORGANIZATIONS MANAGE
COMPLIANCE
• ASSIGN MATURITY AND RELEVANCE SCORING
• PROVISION AND MANAGE USER ACCESS TO
ASSESSMENTS
• COMPARE ASSESSMENTS BASED ON COMMON CRITERIA
CLOUD SOLUTIONS MANAGEMENT
DASHBOARD
T O O L S F O R D U E D I L I G E N C E
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
About Security Guidance V4• FUNDAMENTAL CLOUD SECURITY RESEARCHTHAT STARTED
CSA
• 4TH VERSION, RELEASED JULY 2017
• ARCHITECTURE
• GOVERNING INTHE CLOUD
• GOVERNANCE AND ENTERPRISE RISK MANAGEMENT
• LEGAL
• COMPLIANCE & AUDIT MANAGEMENT
• INFORMATION GOVERNANCE
• OPERATING INTHE CLOUD
• MANAGEMENT PLANE & BUSINESS CONTINUITY
• INFRASTRUCTURE SECURITY
• VIRTUALIZATION & CONTAINERS
• INCIDENT RESPONSE
• APPLICATION SECURITY
• DATA SECURITY & ENCRYPTION
• IDENTITY MANAGEMENT
• SECURITY AS A SERVICE
• RELATEDTECHNOLOGIES
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCECOPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
Active Working Groups
• BLOCKCHAIN/DISTRIBUTED LEDGER
• CLOUD CYBER INCIDENT SHARING
• CLOUD COMPONENT SPECIFICATIONS
• CLOUD CONTROLS MATRIX
• CLOUD SECURITY SERVICES MANAGEMENT
• CONSENSUS ASSESSMENTS
• CONTAINERS AND MICROSERVICES
• ENTERPRISE ARCHITECTURE
• ERP SECURITY
• FINANCIAL SERVICES
• INTERNET OF THINGS
• MOBILE
• OPEN CERTIFICATION
• PRIVACY LEVEL AGREEMENT
• QUANTUM-SAFE SECURITY
• SECURITY AS A SERVICE
• SECURITY GUIDANCE
• SOFTWARE DEFINED PERIMETER
• TOP THREATS
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCECOPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
Paused Working Groups
• BIG DATA
• CLOUD DATA CENTER SECURITY
• CLOUD DATA GOVERNANCE
• HEALTH INFORMATION MANAGEMENT
• INCIDENT MANAGEMENT AND FORENSICS
• SAAS GOVERNANCE
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCECOPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
Dormant Working Groups
• CLOUDAUDIT
• CLOUDTRUST
• CLOUDTRUST PROTOCOL
• CLOUD VULNERABILITIES
• INNOVATION
• LEGAL
• OPEN API
• TELECOM
• VIRTUALIZATION
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
1 5
CREATING GUIDANCE AND
SECURITY CONTROLS FOR
NEW TYPES OF DEVICES,
SYSTEMS, AND DATA.
INTERNET OF
THINGS
STRIVES TO AUTOMATE
SECURITY TASKS BY
EMBEDDING SECURITY
INTO THE DEVOPS
WORKFLOW.
DEV(SEC)OPS
PROMISES TO
TRANSFORM SOCIETY ON
THE SCALE OF THE
INDUSTRIAL REVOLUTION
BEFORE IT.
BIG DATA, AI,
AUTOMATION
ORCHESTRATION,
INTEROPERABILITY,
CONNECTIVITY AND
ANALYTICS AT THE EDGE..
FOG
COMPUTING
TO SOLVE THE PROBLEM OF STOPPING
NETWORK ATTACKS ON APPLICATION
INFRASTRUCTURE THE SDP
WORKGROUP DEVELOPED A CLEAN
SHEET APPROACH THAT COMBINES ON
DEVICE AUTHENTICATION, IDENTITY-
BASED ACCESS AND DYNAMICALLY
PROVISIONED CONNECTIVITY.
SOFTWARE DEFINED
PERIMETER
ACTED AS A DIGITAL
LEDGER FOR
CRYPTOCURRENCY BUT
CAN NOW BE APPLIED IN
NEW USE CASES.
BLOCKCHAIN
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
201 8 RE SE A RCH
RE LE A SES
APPLICATION CONTAINERS AND MICROSERVICES
NIST Guidance for Containers and Microservices
CLOUD CONTROLS MATRIX (CCM)
Mapping Methodology
ISO 27001, 27002, 27017, 27018
ENTERPRISE RESOURCE PLANNING
State of ERP Security in the Cloud
TOP THREATS
Deep Dive Analysis
INTERNET OF THINGS
Blockchain for the IoT
CYBER INCIDENT SHARING
Best Practices for Cyber Incident Exchange
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
201 8 RE SE A RCH
RE LE A SES
HEALTH INFORMATION MANAGEMENT
State of Cloud in Healthcare
SOFTWARE DEFINED PERIMETER (SDP)
SDP Architecture Overview Document
Glossary of SDP Terminology
Awareness Poll/Survey (infographic)
QUANTUM SAFE SECURITY
A Day without RSA Whitepaper
Quantum Safe Security Awareness
Post Quantum Cryptography
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
201 8 RE SE A RCH
RE LE A SES
NEW WORKING GROUPS
ARTIFICIAL INTELLIGENCE
DEVOPS
CLOUD DATA GOVERNANCE
• Data Classification
HEALTHCARE
INTERNET OF THINGS
• Fog Computing
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
201 8 R E SE A R CH
RE LE A SES
SECURITY AS A SERVICE
SecaaS Categories of Services Document V.2
CASB Implementation Guidance
CLOUD SECURITY CONTROLS FRAMEWORK (CCM)
AICPA TSP 2017
NIST SP 800-53 Rev 5 Candidate Mapping
CONTAINERS AND MICROSERVICES
NIST 800 Level Document w/ Use Cases
INTERNET OF THINGS
IoT Security Controls for the Enterprise
OPEN CERTIFICATION FRAMEWORK
Benefits of STAR
STAR Level 3 (Continuous Monitoring)
FINANCIAL SERVICES
Key Management for SaaS
Entitlement Management
Risk Assessment Guide
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
201 8 R E SE A R CH
RE LE A SES
SOFTWARE DEFINED PERIMETER (SDP)
State of SDP
SDP Specification v2.0
ENTERPRISE RESOURCE PLANNING
IaaS considerations for implementing ERP
COMMISSIONED RESEARCH
GDPR Survey
BLOCKCHAIN
Use Cases for Blockchain
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
U SE FU L C SA LINKS
CLOUD CONTROLS MATRIX (CCM)
https://cloudsecurityalliance.org/group/cloud-controls-matrix/
CONSENSUS ASSESSMENT INITIATIVE QUESTIONNAIRE (CAIQ)
https://cloudsecurityalliance.org/group/consensus-assessments/
CSA STAR (Security, Trust and Assurance Registry), Provider Assurance Program
https://cloudsecurityalliance.org/star/
CSA CloudBytes Channel
https://cloudsecurityalliance.org/research/cloudbytes/#_overview
STARWatch
https://cloudsecurityalliance.org/star/watch/
DOWNLOAD CSA RESEARCH ARTIFACTS
https://cloudsecurityalliance.org/download
COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE
22
T H A N K Y O U
Let’s Connect
Email: lsantos@cloudsecurityalliance.org
Twitter: @CSAResearchGuy
LinkedIn: https://linkedin.com/in/lucianojrsantos
Our Workgroups: www.cloudsecurityalliance.org/research
Learn: www.cloudsecurityalliance.org/research/cloudbytes
Download: www.cloudsecurityalliance.org/download

More Related Content

PDF
Five Big Bets in a Blockchain World (June 2018)
PDF
Blockchain - ISG Future Network Summit Presentation, 2018
PDF
Network Security‬ and Big ‪‎Data Analytics‬
PDF
Security, Compliance and Cloud - Jelecos
PDF
Cyber response to insider threats 3.1
PPT
Growing need for cyber security
PDF
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
PPT
RSA大会2009-2010分析
Five Big Bets in a Blockchain World (June 2018)
Blockchain - ISG Future Network Summit Presentation, 2018
Network Security‬ and Big ‪‎Data Analytics‬
Security, Compliance and Cloud - Jelecos
Cyber response to insider threats 3.1
Growing need for cyber security
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
RSA大会2009-2010分析

What's hot (18)

PDF
Webinar: Securing Mobile Banking Apps
PDF
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
PDF
Digital Energy 2018 Day 2
PDF
Cybersecurity Threats - NI Business Continuity Forum
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PDF
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
PPTX
PCM Vision 2019 Keynote: Gary Miglicco
 
PDF
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
PPTX
GDPR Complaince: Don't Let SIEM BE Your Downfall
PPTX
GDPR Compliance: The challenge for HR and how Cezanne HR helps
PDF
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
PDF
Finsec innov-acts-open banking-london080319-4web
PPTX
Threat Intelligence Market
PDF
Accelerating Digital Leadership
PDF
MITRE ATT&CKcon 2.0: attckr - A Toolkit for Analysis and Visualization of ATT...
PDF
Implementing a Security Management Framework
PDF
The 2018 Threat Landscape
PPTX
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg
Webinar: Securing Mobile Banking Apps
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Digital Energy 2018 Day 2
Cybersecurity Threats - NI Business Continuity Forum
Identity Live Singapore: Transform Your Cybersecurity Capability
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
PCM Vision 2019 Keynote: Gary Miglicco
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Compliance: The challenge for HR and how Cezanne HR helps
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
Finsec innov-acts-open banking-london080319-4web
Threat Intelligence Market
Accelerating Digital Leadership
MITRE ATT&CKcon 2.0: attckr - A Toolkit for Analysis and Visualization of ATT...
Implementing a Security Management Framework
The 2018 Threat Landscape
SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg
Ad

Similar to Charting the Course Through Disruption with CSA Research (20)

PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PPTX
INTERFACE, by apidays - API Data Protection in Gateways
PPTX
Blockchain Technology and its role in the process of public sector innovation
PDF
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
PDF
See You in the Future
PDF
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
PDF
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
PDF
50 Things You Absolutely Need To Know About The Cloud
PPSX
Cw13 cloud computing & big data by ahmed aamer
PPTX
NetNordic_DDoS-War-Room_25-april-2019.pptx
PPTX
Connected Mining Market PPT 2021-26 | Enhancing Huge Growth and Latest Trends...
PDF
Developing Comprehensive National Statistics
PPTX
ORBCOMM Investor Overview
PDF
Sept MN Cloud Security Alliance Chapter - Cloud Maturity Presentation
PDF
Sept MN Cloud Security Alliance - Presentation
PPTX
ORBCOMM Investor Overview
PPTX
ORBCOMM Investor Overview
PDF
Network Engineering and Operations in a Multi-Cloud World
PDF
EuroCACS 2016 There are giants in the sky
PPTX
Digital grid: Disruptive digital technologies
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
INTERFACE, by apidays - API Data Protection in Gateways
Blockchain Technology and its role in the process of public sector innovation
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018
See You in the Future
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
50 Things You Absolutely Need To Know About The Cloud
Cw13 cloud computing & big data by ahmed aamer
NetNordic_DDoS-War-Room_25-april-2019.pptx
Connected Mining Market PPT 2021-26 | Enhancing Huge Growth and Latest Trends...
Developing Comprehensive National Statistics
ORBCOMM Investor Overview
Sept MN Cloud Security Alliance Chapter - Cloud Maturity Presentation
Sept MN Cloud Security Alliance - Presentation
ORBCOMM Investor Overview
ORBCOMM Investor Overview
Network Engineering and Operations in a Multi-Cloud World
EuroCACS 2016 There are giants in the sky
Digital grid: Disruptive digital technologies
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Charting the Course Through Disruption with CSA Research

  • 1. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE CHARTING THE COURSE THROUGH DISRUPTION WITH CSA RESEARCH J.R. SANTOS, EXECUTIVE VICE PRESIDENT OF RESEARCH
  • 2. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE I O T C O N N E C T E D D E V I C E S B Y 2 0 2 0 The total number of “things” in the Internet of Things (IoT) is forecast to reach 20.4 billion in 2020, which is lower than Gartner’s previous prediction of 20.8 billion, published in 2015. The consumer segment is tipped to make up 63 per cent of the total IoT application market in 2017 with 5.2 billion units. Businesses are on pace to employ 3.1 billion connected things in 2017. 20.4B 3 1 % UP FROM 2016 8 . 4 B FOR EC AST IN 2017 TITLE GOES H ER E Quis nostrud exercitation.
  • 3. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE T HE ZET TABYTE E RA The document presents some of the main findings of Cisco’s global IP traffic forecast and explores the implications of IP traffic growth for service providers.
  • 4. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE “The cyber security industry faces a massive problem: there are simply not enough highly-skilled cyber security professionals. This is already a massive issue, but fast-forward to 2020 and the shortfall is expected to reach 1.5 million” - ISC2 Workforce Study EX IST ING EMPLOYEES CAN’ T KEEP UP WIT H T HE CHANG ES IN OUR INDUST RY COLLEG E G RADUAT ES LACK T HE SKILL AND EX PERIENCE 1 .5 M ILLION C Y BE R SE C U RITY P RO FE SSIONA LS NE E D E D BY 2020
  • 5. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE O UR ENVIRO NMENT IN C HANG ING TH E R EGU LATOR Y & STAN D AR D S LAN D SC APE W ILL C H AN GE AN D BEC OME MOR E C OMPLEX N EW ATTAC K SU R FAC ES TEC H N OLOGY LAN D SC APE C H AN GES R APID LY D ATA W ILL C ON TIN U E TO EXPLOD E 9 9 % TH R OU GH 2020, 99% OF VU LN ER ABILITIES EXPLOITED W ILL C ON TIN U E TO BE ON ES KN OW N BY SEC U R ITY AN D IT PR OFESSION ALS FOR AT LEAST ON E YEAR . 33.3 % BY 2020, A TH IR D OF SU C C ESSFU L ATTAC KS EXPER IEN C ED BY EN TER PR ISES W ILL BE ON TH EIR SH AD OW IT R ESOU R C ES 8 . 3 % GR OW TH R ATE FOR IN FOR MATION SEC U R ITY SPEN D . FOR C ASTED TO BR EAK 101 B BY 2020 2 5 % BY 2020, MOR E TH AN 25% OF ID EN TIFIED EN TER PR ISE ATTAC KS WILL INVOLVE IOT
  • 6. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE CLOUDSECURITYALLIANCE SE C U RITY P RO FE SSIONA LS NE E D T O E VO LVE
  • 7. 1 9 ACT IVE WORKING G ROUPS 2009 CSA FOUNDED SIN GAPOR E // ASIA PAC IFIC H EAD QU AR TER S ED IN BU R GH // UK HEADQUARTERS SEATTLE/BELLIN GH AM, W A // U S H EAD QU AR TER S 9 0 , 0 0 0 + INDIVIDUAL MEMBERS 300+ CORPORAT E MEMBERS 75+ CHAPT ERS Strategic partnerships with governments, research institutions, professional associations and industry CSA research is FREE! OUR COMMUNITY
  • 8. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 8 RESEARCH FOR THE INDUSTRY • CSA HAS PRODUCED OVER 165 RESEARCH ARTIFACTS • WE HAVE A TOTAL OF 34 RESEARCH WORKING GROUPS (26 CURRENTLY ACTIVE) • OVER 4500 SUBJECT MATTER EXPERTS PARTICIPATE HAVE BEEN INVOLVED • 50+ CONFERENCES IN 2018 * DOES NOT INCLUDED SOME REGIONAL RESEARCH, CCM MAPPINGS ACTIVITIES, GRANT DELIVERABLES, COMMISSIONED PROJECTS,
  • 9. 9 INDUSTRY COLLABORATION FORMAL: • ISO/IEC JTC 1 – IT AND CLOUD SECURITY TECHNIQUES • ITU-T – PROCEDURES AND STANDARDS IN TELECOM • IEEE – CYBERSECURITY AND PRIVACY STANDARDS COMMITTEE • NIST – CLOUD SECURITY WORKING GROUP • FCC - TECHNOLOGICAL ADVISORY COMMITTEE ON IOT • DISA DODIN (GIG) – CLOUD COMPUTING SERVICES GUIDANCE • DOD IC - CLOUD COMPUTING STANDARDS FOCUS GROUP • ATIS - PACKET TECHNOLOGY AND SYSTEMS COMMITTEE ON 5G • CIS – CLOUD SECURITY BENCHMARKS • CLOUD SECURITY INDUSTRY SUMMIT – EXECUTIVE COUNCIL OF CLOUD • ENISA – EU FUNDED RESEARCH ON RISK, INTEROPERABILITY, SLAS, AND MORE • ISC2 – TRAINING AND EDUCATION PARTNER FOR CLOUD SECURITY CERTIFICATION • ISACA – CONTINUING EDUCATION PARTNER FOR IT CERTIFICATION • CSA CORPORATE MEMBERS – COMMISSIONED WORK TO EXPLORE TRENDING TOPICS • AND MANY OTHERS INFORMAL: MPAA, SECURITY SMART CITIES, US FEDERAL HIGHWAY ADMINISTRATION, HIMSS, HC3, FFIEC, FDIC, OCC, EBA, AND MORE
  • 10. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE • COMMON FRAMEWORK FOR TECHNOLOGY, IS MANAGEMENT • ASSESSES THE OVERALL SECURITY RISK OF A CLOUD SERVICE • PROVIDES STANDARDIZED SECURITY, OPERATIONAL RISK MANAGEMENT • HARMONIZES TO SECURITY STANDARDS AND COMPLIANCE FRAMEWORKS CLOUD SECURITY CONTROLS • QUESTIONS TO ENABLE CLOUD COMPUTING ASSESSMENTS • ESTABLISH THE PRESENCE AND TESTING OF SECURITY CONTROLS • DISCOVER PRESENCE OF SECURITY CAPABILITIES AND GAPS • DOCUMENT SECURITY CONTROLS IN IAAS, PAAS, SAAS PROVIDER ASSESSMENT QUESTIONS • PROVIDER LISTING OF SECURITY CONTROLS • TRANSPARENCY, AUDITING, AND HARMONIZATION OF STANDARDS • LEVEL OF ASSURANCE MEETING REQUIREMENTS • INDUSTRY ACCEPTABLE PROVIDER ASSESSMENT REPORTS • SOLUTION TO HELP ORGANIZATIONS MANAGE COMPLIANCE • ASSIGN MATURITY AND RELEVANCE SCORING • PROVISION AND MANAGE USER ACCESS TO ASSESSMENTS • COMPARE ASSESSMENTS BASED ON COMMON CRITERIA CLOUD SOLUTIONS MANAGEMENT DASHBOARD T O O L S F O R D U E D I L I G E N C E
  • 11. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE About Security Guidance V4• FUNDAMENTAL CLOUD SECURITY RESEARCHTHAT STARTED CSA • 4TH VERSION, RELEASED JULY 2017 • ARCHITECTURE • GOVERNING INTHE CLOUD • GOVERNANCE AND ENTERPRISE RISK MANAGEMENT • LEGAL • COMPLIANCE & AUDIT MANAGEMENT • INFORMATION GOVERNANCE • OPERATING INTHE CLOUD • MANAGEMENT PLANE & BUSINESS CONTINUITY • INFRASTRUCTURE SECURITY • VIRTUALIZATION & CONTAINERS • INCIDENT RESPONSE • APPLICATION SECURITY • DATA SECURITY & ENCRYPTION • IDENTITY MANAGEMENT • SECURITY AS A SERVICE • RELATEDTECHNOLOGIES
  • 12. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCECOPYRIGHT © 2018 CLOUD SECURITY ALLIANCE Active Working Groups • BLOCKCHAIN/DISTRIBUTED LEDGER • CLOUD CYBER INCIDENT SHARING • CLOUD COMPONENT SPECIFICATIONS • CLOUD CONTROLS MATRIX • CLOUD SECURITY SERVICES MANAGEMENT • CONSENSUS ASSESSMENTS • CONTAINERS AND MICROSERVICES • ENTERPRISE ARCHITECTURE • ERP SECURITY • FINANCIAL SERVICES • INTERNET OF THINGS • MOBILE • OPEN CERTIFICATION • PRIVACY LEVEL AGREEMENT • QUANTUM-SAFE SECURITY • SECURITY AS A SERVICE • SECURITY GUIDANCE • SOFTWARE DEFINED PERIMETER • TOP THREATS
  • 13. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCECOPYRIGHT © 2018 CLOUD SECURITY ALLIANCE Paused Working Groups • BIG DATA • CLOUD DATA CENTER SECURITY • CLOUD DATA GOVERNANCE • HEALTH INFORMATION MANAGEMENT • INCIDENT MANAGEMENT AND FORENSICS • SAAS GOVERNANCE
  • 14. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCECOPYRIGHT © 2018 CLOUD SECURITY ALLIANCE Dormant Working Groups • CLOUDAUDIT • CLOUDTRUST • CLOUDTRUST PROTOCOL • CLOUD VULNERABILITIES • INNOVATION • LEGAL • OPEN API • TELECOM • VIRTUALIZATION
  • 15. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 1 5 CREATING GUIDANCE AND SECURITY CONTROLS FOR NEW TYPES OF DEVICES, SYSTEMS, AND DATA. INTERNET OF THINGS STRIVES TO AUTOMATE SECURITY TASKS BY EMBEDDING SECURITY INTO THE DEVOPS WORKFLOW. DEV(SEC)OPS PROMISES TO TRANSFORM SOCIETY ON THE SCALE OF THE INDUSTRIAL REVOLUTION BEFORE IT. BIG DATA, AI, AUTOMATION ORCHESTRATION, INTEROPERABILITY, CONNECTIVITY AND ANALYTICS AT THE EDGE.. FOG COMPUTING TO SOLVE THE PROBLEM OF STOPPING NETWORK ATTACKS ON APPLICATION INFRASTRUCTURE THE SDP WORKGROUP DEVELOPED A CLEAN SHEET APPROACH THAT COMBINES ON DEVICE AUTHENTICATION, IDENTITY- BASED ACCESS AND DYNAMICALLY PROVISIONED CONNECTIVITY. SOFTWARE DEFINED PERIMETER ACTED AS A DIGITAL LEDGER FOR CRYPTOCURRENCY BUT CAN NOW BE APPLIED IN NEW USE CASES. BLOCKCHAIN
  • 16. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 201 8 RE SE A RCH RE LE A SES APPLICATION CONTAINERS AND MICROSERVICES NIST Guidance for Containers and Microservices CLOUD CONTROLS MATRIX (CCM) Mapping Methodology ISO 27001, 27002, 27017, 27018 ENTERPRISE RESOURCE PLANNING State of ERP Security in the Cloud TOP THREATS Deep Dive Analysis INTERNET OF THINGS Blockchain for the IoT CYBER INCIDENT SHARING Best Practices for Cyber Incident Exchange
  • 17. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 201 8 RE SE A RCH RE LE A SES HEALTH INFORMATION MANAGEMENT State of Cloud in Healthcare SOFTWARE DEFINED PERIMETER (SDP) SDP Architecture Overview Document Glossary of SDP Terminology Awareness Poll/Survey (infographic) QUANTUM SAFE SECURITY A Day without RSA Whitepaper Quantum Safe Security Awareness Post Quantum Cryptography
  • 18. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 201 8 RE SE A RCH RE LE A SES NEW WORKING GROUPS ARTIFICIAL INTELLIGENCE DEVOPS CLOUD DATA GOVERNANCE • Data Classification HEALTHCARE INTERNET OF THINGS • Fog Computing
  • 19. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 201 8 R E SE A R CH RE LE A SES SECURITY AS A SERVICE SecaaS Categories of Services Document V.2 CASB Implementation Guidance CLOUD SECURITY CONTROLS FRAMEWORK (CCM) AICPA TSP 2017 NIST SP 800-53 Rev 5 Candidate Mapping CONTAINERS AND MICROSERVICES NIST 800 Level Document w/ Use Cases INTERNET OF THINGS IoT Security Controls for the Enterprise OPEN CERTIFICATION FRAMEWORK Benefits of STAR STAR Level 3 (Continuous Monitoring) FINANCIAL SERVICES Key Management for SaaS Entitlement Management Risk Assessment Guide
  • 20. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 201 8 R E SE A R CH RE LE A SES SOFTWARE DEFINED PERIMETER (SDP) State of SDP SDP Specification v2.0 ENTERPRISE RESOURCE PLANNING IaaS considerations for implementing ERP COMMISSIONED RESEARCH GDPR Survey BLOCKCHAIN Use Cases for Blockchain
  • 21. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE U SE FU L C SA LINKS CLOUD CONTROLS MATRIX (CCM) https://cloudsecurityalliance.org/group/cloud-controls-matrix/ CONSENSUS ASSESSMENT INITIATIVE QUESTIONNAIRE (CAIQ) https://cloudsecurityalliance.org/group/consensus-assessments/ CSA STAR (Security, Trust and Assurance Registry), Provider Assurance Program https://cloudsecurityalliance.org/star/ CSA CloudBytes Channel https://cloudsecurityalliance.org/research/cloudbytes/#_overview STARWatch https://cloudsecurityalliance.org/star/watch/ DOWNLOAD CSA RESEARCH ARTIFACTS https://cloudsecurityalliance.org/download
  • 22. COPYRIGHT © 2018 CLOUD SECURITY ALLIANCE 22 T H A N K Y O U Let’s Connect Email: lsantos@cloudsecurityalliance.org Twitter: @CSAResearchGuy LinkedIn: https://linkedin.com/in/lucianojrsantos Our Workgroups: www.cloudsecurityalliance.org/research Learn: www.cloudsecurityalliance.org/research/cloudbytes Download: www.cloudsecurityalliance.org/download