SlideShare a Scribd company logo
Helping You Piece IT Together
http://www.bhconsulting.ie info@bhconsulting.ie
Incident Response
&
Cloud Security
Who Am I?
Brian.honan@bhconsulting.ie
www.bhconsulting.ie
www.twitter.com/brianhonan
www.bhconsulting.ie/securitywatch
Business View of The Cloud
Vendor View of the Cloud
Security View of the Cloud
5
Stuff Happens !!
Traditional Incident Response
Detect
Contain
Eradicate
Remediate
Recover
Review
Communicate
Traditional IR
Cloud Incident Response
How Do You Contain Cloud?
Where is Your Data?
Data Protection & Privacy
Change of Mindset
Change of Mindset
Same IR Principles
Detect
Contain
Eradicate
Remediate
Recover
Review
Communicate
Engage Early with Business
Ensure IR Requirements in T&Cs
Establish Team
Information
Security
Operations
Human
Resources
Legal
Public
Relations
Facilities
Management
CSP
Establish Relationships
Agree Roles &
Responsibilities
Agree Policies & Procedures
Agree Jurisdictional Issues
Agree Disclosure Rules
Notification in Place
Set up Alerting Mechanisms
Access to Logs
Other Alerting Mechanisms
Identify Tools
Practise Makes Perfect
Agree Testing
Review & Measure
Questions To CSP
 Will the CSP Give You Access to Log Files,
Including RAW Data?
 What Is the CSP’s SLA?
 Are Security Demarcations Clearly Understood?
 What Are the CSP preventative measures?
 DDOS Mitigation
 Security Monitoring,
 Alert You of Breach
 IR Plan
Questions ?
@brianhonan

More Related Content

PDF
How to Build a Privacy Program
PPTX
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
PDF
Cultivate a stronger corporate culture to enhance cybersecurity
PPTX
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
PDF
10 Tips for CIOs - Data Security in the Cloud
PDF
Salesforce & GDPR: What happens next?
PDF
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
PDF
I-Week April 2004 - Claudia Warwar
How to Build a Privacy Program
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
Cultivate a stronger corporate culture to enhance cybersecurity
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
10 Tips for CIOs - Data Security in the Cloud
Salesforce & GDPR: What happens next?
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
I-Week April 2004 - Claudia Warwar

What's hot (8)

PPT
Resolving Conflicts Between Security Compliance and Human Behaviour
PDF
Preparing Your Company for a Privacy Rebellion
PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PPT
Security Problem With Cloud Computing
PPT
Security Problem With Cloud Computing
PPTX
Watchful-Corporate-Overview-Q1-16
PDF
Getting a clue: uncovering the truth about your data with mobile forensics
PPTX
Security Tips For A Safer Workplace
Resolving Conflicts Between Security Compliance and Human Behaviour
Preparing Your Company for a Privacy Rebellion
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Security Problem With Cloud Computing
Security Problem With Cloud Computing
Watchful-Corporate-Overview-Q1-16
Getting a clue: uncovering the truth about your data with mobile forensics
Security Tips For A Safer Workplace
Ad

Viewers also liked (20)

PPTX
Presentation on EU Directives Impacting Cyber Security for Information Securi...
DOCX
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
PPT
CTO-CybersecurityForum-2010-Andrea Gloriso
PDF
Protecting Europe's Network Infrastructure
PDF
Developers are from Mars, Security guys are from Venus
PDF
2016 02-14-nis directive-overview isc2 chapter
PPTX
Advanced OSSEC Training: Integration Strategies for Open Source Security
PDF
Cybersecurity isaca
PDF
Long Life Bicycles
PDF
Hot Topics For 2010
PDF
Scare Ware From Ireland
PPT
eTwinning - lyhyt johdatus työpajatyöskentelyyn
PDF
The Case for Mandatory Data Breach Disclosure Laws
PPT
Cloud security
PPT
eTwinning Professional Development 2011
PPTX
Using Moodle to Support Differentiated Instruction
PPT
Polish Cuisine Book
PPT
Cineas Corso Taylor Made Per Zurich 28 Aprile 2010 Ramo Malattia
PPT
Kansainvälisyys ja verkko-oppiminen
PDF
Finnish Easter
Presentation on EU Directives Impacting Cyber Security for Information Securi...
NIS : l’Europe se dote d’un plan de bataille contre le piratage informatique
CTO-CybersecurityForum-2010-Andrea Gloriso
Protecting Europe's Network Infrastructure
Developers are from Mars, Security guys are from Venus
2016 02-14-nis directive-overview isc2 chapter
Advanced OSSEC Training: Integration Strategies for Open Source Security
Cybersecurity isaca
Long Life Bicycles
Hot Topics For 2010
Scare Ware From Ireland
eTwinning - lyhyt johdatus työpajatyöskentelyyn
The Case for Mandatory Data Breach Disclosure Laws
Cloud security
eTwinning Professional Development 2011
Using Moodle to Support Differentiated Instruction
Polish Cuisine Book
Cineas Corso Taylor Made Per Zurich 28 Aprile 2010 Ramo Malattia
Kansainvälisyys ja verkko-oppiminen
Finnish Easter
Ad

Similar to Incident Response in the Cloud (6)

PPTX
Incident response cloud
PDF
Proactive incident response
PPTX
Learning from History
PDF
Incident response in Cloud
PPTX
Preparing for Failure - Best Practise for Incident Response
PPTX
Checklist for Competent Cloud Security Management
Incident response cloud
Proactive incident response
Learning from History
Incident response in Cloud
Preparing for Failure - Best Practise for Incident Response
Checklist for Competent Cloud Security Management

More from Brian Honan (13)

PPTX
Brian honan ipexpo keynote
PPTX
GDPR & Brexit - What Does the Future Hold?
PDF
Ransomware Prevention Guide
PPTX
Brian honan
PPTX
The dark side of the internet
PPTX
Data security brian honan
PPTX
How to Like Social Media Network Security
PDF
Bridging the air gap
PPT
Best practises for log management
PPTX
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
PPTX
Creating a CERT at WARP Speed
PPTX
Ic Sconf2010presentation Dp Bh
PPT
Knowing Me Knowing You
Brian honan ipexpo keynote
GDPR & Brexit - What Does the Future Hold?
Ransomware Prevention Guide
Brian honan
The dark side of the internet
Data security brian honan
How to Like Social Media Network Security
Bridging the air gap
Best practises for log management
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Creating a CERT at WARP Speed
Ic Sconf2010presentation Dp Bh
Knowing Me Knowing You

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hybrid model detection and classification of lung cancer
PPTX
Modernising the Digital Integration Hub
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
August Patch Tuesday
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
project resource management chapter-09.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Getting Started with Data Integration: FME Form 101
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Assigned Numbers - 2025 - Bluetooth® Document
Developing a website for English-speaking practice to English as a foreign la...
DP Operators-handbook-extract for the Mautical Institute
Hybrid model detection and classification of lung cancer
Modernising the Digital Integration Hub
Group 1 Presentation -Planning and Decision Making .pptx
August Patch Tuesday
Enhancing emotion recognition model for a student engagement use case through...
Chapter 5: Probability Theory and Statistics
project resource management chapter-09.pdf
observCloud-Native Containerability and monitoring.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Web App vs Mobile App What Should You Build First.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Hindi spoken digit analysis for native and non-native speakers
Getting Started with Data Integration: FME Form 101
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
NewMind AI Weekly Chronicles – August ’25 Week III

Incident Response in the Cloud

Editor's Notes