SlideShare a Scribd company logo
1




Big Data, Security, and the Cloud:
This isn’t Football, It’s Your Data
          Pano M. Xinos
2


Whirlwind Tour
Where have we been?
Where are we now?
Where are we going?
3




WHERE HAVE WE BEEN?
4


The Past
Mainframe
Client-server model
e-Commerce
Virtualisation
Outsourcing
5




WHERE ARE WE NOW?
6


The Present
Early days of massive decentralization
Focus on cost cutting
Focus on increasing agility/flexibility
7




Big Data




   Big
Data, Clou
    d
Computing




Big Data,
Security
8




WHERE ARE WE GOING?
9


The Future
Commodity based compute
Commodity based storage
Imperative to revise governance
10


To be clear…
“Big Data is not a hail-mary pass. It’s a
running play with the defensive team
running in slow motion.”
                                    –Me
11




THE CLOUD AND YOU(R BIG DATA)
12


Cloud Computing In Review
Essential Characteristics
On-demand, Self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
13


 Cloud Computing—Part Deux
Deployment Models   Service Models
Public Cloud        Infrastructure
Private Cloud       Platform
Community Cloud     Software
Hybrid Cloud
14


Big Data <3’s Cloud

     Massive workloads,
            meet
      Cloud Computing
          XOXOXOX
15




SECURITY AND YOU(R BIG DATA)
16


Security is not one-size-fits-all




                 http://teradatamagazine.com/v09n04/Features/One-size-does-not-fit-all/
17


And…
It should be tightly coupled with your
tolerance to risk and risk management
policies including BC/DR
18


Ownage!




          http://www.citytv.com/toronto/citynews/sports/article/231050
19


I’ve said this before…
“The biggest security vulnerability is people.
Always has been, always will be.”
                                                 -Me
20


Standards



CSA STAR and BDWG
NIST reference architecture
ITU reference architecture
21


Service Level Agreements
What is the value of your brand?
QMUL Cloud Legal Project
…leave a lot to be desired
22


Privacy
“...Privacy by Design -privacy by default, end-to-
end security, and strong accountability- by
enabling enterprises to automatically encrypt
(decrypt) data locally and on-the-fly when using
third-party cloud [based] service
applications, with no loss of functionality.
Maintaining control over encryption and
decryption processes is an excellent approach to
safeguarding personal data, regardless of where
the data resides.”
    –Ann Cavoukian, Ph.D. Information and Privacy
                  Commissioner of Ontario, Canada
                                       http://www.perspecsys.com/
23


How-to




Dress in layers
Obfuscate data
                          IDC, circa 2010
Address vulnerabilities
App security
24


Example of Personal Security
“SolaS uses Lockheed Martin’s
intelligence-driven defense approach
to provide proactive and continuous
cloud security situational awareness,
and real-time compliance and
configuration management”
          http://www.marketwatch.com/story/lockheed-martin-delivers-solastm-hybrid-cloud-solution-2012-09-27
25


To Sum Up...
Cloud, Big Data, and Security
Tolerance to Risk
Governance
Adaptability
26




                THANK YOU!

                QUESTIONS?

Pano M. Xinos
PanoXinos.TDWI@GMail.com
http://ca.LinkedIn.com/in/panoxinos
@pmxinos
http://TheCaseforCloud.blogspot.com

More Related Content

PDF
Cloud Cuckoo Land to Corporate Acceptance
PDF
How Blockchain Will Transform the IoT
PDF
Isaca 2011 trends in virtual security v1.0
PDF
2022 Q1 Webinar Securite du Cloud public (1).pdf
PPTX
Living In a World of Data Exploitation - CPDP 2017
PDF
WITDOM presentation at Net Futures 2016
PPT
State of Cybersecurity in 2018 - Our Top Predictions
PPT
Top 16 Startup Trends to Dominate in 2015
Cloud Cuckoo Land to Corporate Acceptance
How Blockchain Will Transform the IoT
Isaca 2011 trends in virtual security v1.0
2022 Q1 Webinar Securite du Cloud public (1).pdf
Living In a World of Data Exploitation - CPDP 2017
WITDOM presentation at Net Futures 2016
State of Cybersecurity in 2018 - Our Top Predictions
Top 16 Startup Trends to Dominate in 2015

What's hot (10)

PDF
2018 Cybersecurity Predictions
PPTX
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
PDF
Bitcoin: The Biggest Opportunity Ever
PDF
DWS16 - Plenary Privacy shield & consumer proection - Nicolas Sekkaki, IBM
PDF
Smart Cities Day 1 Secure Cities
PPTX
Some thoughts on insurance technology and current trends
PPTX
When the Internet of Things meets the Blockchain
PDF
Fal conunite2019 complete_zero_trust_final
PDF
BCS ITNow 201403 - Data Loss Prevention
PDF
Global Forum on Digital Security for Prosperity November 2019 event photo book
2018 Cybersecurity Predictions
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
Bitcoin: The Biggest Opportunity Ever
DWS16 - Plenary Privacy shield & consumer proection - Nicolas Sekkaki, IBM
Smart Cities Day 1 Secure Cities
Some thoughts on insurance technology and current trends
When the Internet of Things meets the Blockchain
Fal conunite2019 complete_zero_trust_final
BCS ITNow 201403 - Data Loss Prevention
Global Forum on Digital Security for Prosperity November 2019 event photo book
Ad

Similar to Big data, security, and the cloud (20)

PDF
Cloud Seminar Feb 4 2010
PDF
IT Security Trends 2013
PPTX
Cloud Computing & Cybersecurity in Industry 4.0
PDF
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
DOCX
What is the future of cloud security linked in
PPT
Cloud Computing - Is it the Future of ESI?
PPT
False Cloud Debate Panel Interop 2011
PDF
Security, Compliance and Cloud - Jelecos
PPT
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
PDF
Ciphercloud Solutions Overview hsa oct2011
PDF
Security of,for & by cloud
PDF
Keys to success and security in the cloud
PDF
Keys-to-Success-and-Security-in-the-Cloud
PDF
Cloud Computing Direction in Thailand
PDF
How would cloud computing Effect to Software Industry?
PDF
How would cloud computing Effect to Software Industry?
PPTX
Where worlds collide: Agile, Project Management, Risk and Cloud?
PPT
Your clouds must be transparent - an intro to Cloud Security Alliance
PDF
Cloud Go Green
PDF
Moving Sucks. Making Secure Cloud Migration Painless
Cloud Seminar Feb 4 2010
IT Security Trends 2013
Cloud Computing & Cybersecurity in Industry 4.0
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
What is the future of cloud security linked in
Cloud Computing - Is it the Future of ESI?
False Cloud Debate Panel Interop 2011
Security, Compliance and Cloud - Jelecos
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Ciphercloud Solutions Overview hsa oct2011
Security of,for & by cloud
Keys to success and security in the cloud
Keys-to-Success-and-Security-in-the-Cloud
Cloud Computing Direction in Thailand
How would cloud computing Effect to Software Industry?
How would cloud computing Effect to Software Industry?
Where worlds collide: Agile, Project Management, Risk and Cloud?
Your clouds must be transparent - an intro to Cloud Security Alliance
Cloud Go Green
Moving Sucks. Making Secure Cloud Migration Painless
Ad

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf

Big data, security, and the cloud

  • 1. 1 Big Data, Security, and the Cloud: This isn’t Football, It’s Your Data Pano M. Xinos
  • 2. 2 Whirlwind Tour Where have we been? Where are we now? Where are we going?
  • 6. 6 The Present Early days of massive decentralization Focus on cost cutting Focus on increasing agility/flexibility
  • 7. 7 Big Data Big Data, Clou d Computing Big Data, Security
  • 8. 8 WHERE ARE WE GOING?
  • 9. 9 The Future Commodity based compute Commodity based storage Imperative to revise governance
  • 10. 10 To be clear… “Big Data is not a hail-mary pass. It’s a running play with the defensive team running in slow motion.” –Me
  • 11. 11 THE CLOUD AND YOU(R BIG DATA)
  • 12. 12 Cloud Computing In Review Essential Characteristics On-demand, Self-service Broad network access Resource pooling Rapid elasticity Measured service
  • 13. 13 Cloud Computing—Part Deux Deployment Models Service Models Public Cloud Infrastructure Private Cloud Platform Community Cloud Software Hybrid Cloud
  • 14. 14 Big Data <3’s Cloud Massive workloads, meet Cloud Computing XOXOXOX
  • 16. 16 Security is not one-size-fits-all http://teradatamagazine.com/v09n04/Features/One-size-does-not-fit-all/
  • 17. 17 And… It should be tightly coupled with your tolerance to risk and risk management policies including BC/DR
  • 18. 18 Ownage! http://www.citytv.com/toronto/citynews/sports/article/231050
  • 19. 19 I’ve said this before… “The biggest security vulnerability is people. Always has been, always will be.” -Me
  • 20. 20 Standards CSA STAR and BDWG NIST reference architecture ITU reference architecture
  • 21. 21 Service Level Agreements What is the value of your brand? QMUL Cloud Legal Project …leave a lot to be desired
  • 22. 22 Privacy “...Privacy by Design -privacy by default, end-to- end security, and strong accountability- by enabling enterprises to automatically encrypt (decrypt) data locally and on-the-fly when using third-party cloud [based] service applications, with no loss of functionality. Maintaining control over encryption and decryption processes is an excellent approach to safeguarding personal data, regardless of where the data resides.” –Ann Cavoukian, Ph.D. Information and Privacy Commissioner of Ontario, Canada http://www.perspecsys.com/
  • 23. 23 How-to Dress in layers Obfuscate data IDC, circa 2010 Address vulnerabilities App security
  • 24. 24 Example of Personal Security “SolaS uses Lockheed Martin’s intelligence-driven defense approach to provide proactive and continuous cloud security situational awareness, and real-time compliance and configuration management” http://www.marketwatch.com/story/lockheed-martin-delivers-solastm-hybrid-cloud-solution-2012-09-27
  • 25. 25 To Sum Up... Cloud, Big Data, and Security Tolerance to Risk Governance Adaptability
  • 26. 26 THANK YOU! QUESTIONS? Pano M. Xinos PanoXinos.TDWI@GMail.com http://ca.LinkedIn.com/in/panoxinos @pmxinos http://TheCaseforCloud.blogspot.com