10/May/2013
Cloud Computing and the SysOp
Professional: How to get ready?
Eduardo Coelho - Congresso UNIFACEX
Friday, May 10, 13
hold on
✤ before we get started, let me show you some interesting facts
involving information security and privacy in our world
Friday, May 10, 13
Cryptogram newsletter published
the following on 15/Apr/2013
✤ One: Some of the Chinese military hackers who were implicated in a broad set of
attacks against the U.S. government and corporations were identified because they
accessed Facebook from the same network infrastructure they used to carry out
their attacks.
✤ Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, was
identified and arrested last year by the FBI. Although he practiced good computer
security and used an anonymous relay service to protect his identity, he slipped
up.
✤ And three: Paula Broadwell, who had an affair with CIA director David Petraeus,
similarly took extensive precautions to hide her identity. She never logged in to
her anonymous e-mail service from her home network. Instead, she used hotel
and other public networks when she e-mailed him. The FBI correlated hotel
registration data from several different hotels -- and hers was the common name.
Friday, May 10, 13
(continuing)
✤ There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers,
social networking sites, search engines: these have become necessities, and it's fanciful to expect
people to simply refuse to use them just because they don't like the spying, especially since the
full extent of such spying is deliberately hidden from us and there are few alternatives being
marketed by companies that don't spy.
✤ This isn't something the free market can fix. We consumers have no choice in the matter. All the
major companies that provide us with Internet services are interested in tracking us. Visit a
website and it will almost certainly know who you are; there are lots of ways to be tracked
without cookies. Cell phone companies routinely undo the web's privacy protection. One
experiment at Carnegie Mellon took real-time videos of students on campus and was able to
identify one-third of them by comparing their photos with publicly available tagged Facebook
photos.
✤ Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your
protections, or click on the wrong link, or type the wrong thing, you've permanently attached
your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI
got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope.
Friday, May 10, 13
(continuing)
✤ So, we're done. Welcome to a world where Google knows exactly what
sort of porn you all like, and more about your interests than your
spouse does. Welcome to a world where your cell phone company
knows exactly where you are all the time. Welcome to the end of private
conversations, because increasingly your conversations are conducted
by e-mail, text, or social networking sites.
✤ And welcome to a world where all of this, and everything else that you
do or is done on a computer, is saved, correlated, studied, passed
around from company to company without your knowledge or consent;
and where the government accesses it at will without a warrant.
✤ Welcome to an Internet without privacy, and we've ended up here with
hardly a fight.
Friday, May 10, 13
Thoughts
✤ How many people actually understand how all of this impacts our
life?
✤ How good is it to be an IT professional which are probably in the best
position to fully antecipate bad outcomes and prevent bad things?
Friday, May 10, 13
Now let’s focus on the IT PRO
✤ Which is the set of abilities that will (is) be asked of System Operators
and Network Admins?
Friday, May 10, 13
By the way, what SysOp stands
for? (or will stand for)
✤ Windows Server Professionals
✤ Unix/Linux Server Professionals
✤ Network Appliance Professionals
✤ Security Officers
✤ DBAs
✤ Any above, but Management-focused
Friday, May 10, 13
The best SysOp in a nutshell
✤ basic dev knowledge
✤ basic ITIL best practices knowledge
✤ basic PMP knowledge
✤ basic COBIT knowledge
✤ good to awesome security knowledge
✤ advanced cloud platforms knowledge
✤ and of course:
✤ great communication skills
✤ good presentation
✤ self-managed
✤ self-motivated
Friday, May 10, 13
Difficulties a professional have to
deal with
✤ how to always keep up-to-date with technologies as a whole
✤ choosing the right technologies to be good at
✤ focusing too much on enhancing tech knowledge and forgeting about
behavioral skill set
✤ how to continuously position IT as strategic to the company
Friday, May 10, 13
Insights
✤ Cloud is not the problem, scaling IT is
✤ Spending less is possible, be creative
✤ Decide how YOU will enhance your career
By the way, that’s your job, not HR’s
✤ Infrastructure exists to support software, never forget that
Friday, May 10, 13
Conclusions
✤ Cloud demand a good understanding and creative solutions for load
balancing, clustering, fail-overs
✤ Cloud demand good knowledge of virtualization concepts
✤ Cloud demand a better understanding of security
✤ Cloud will force SysOps to have a more holistic view of IT
Friday, May 10, 13
thank you for your time =)
✤ facebook.com/eduardocoelholima
✤ slideshare.net/eduardocoelholima
✤ youtube.com/eduardocoelholima
Friday, May 10, 13

More Related Content

PPTX
Dangers on the Internet
PPS
Dangers Of Internet - Parents Beware
PPT
Eskwela module 3_responsible use of ict
PPT
Kid Safety On The Internet
PPT
Y2 l10 esafety
PPTX
Facebook for Parents
PDF
Internet Safety For Parents And Kids
PPTX
Using the Internet Safely
Dangers on the Internet
Dangers Of Internet - Parents Beware
Eskwela module 3_responsible use of ict
Kid Safety On The Internet
Y2 l10 esafety
Facebook for Parents
Internet Safety For Parents And Kids
Using the Internet Safely

What's hot (20)

PPTX
Powerpoint
PPTX
Internet safety presentation 2015
PPTX
Internet safety presentation 2016
PPTX
Internet Safety Slideshare
PPT
10things
PPT
Internet Safety for Children Powerpoint
DOCX
Jessica guevara
PPT
Cyber Safety How Children Can Protect Themselves From Online Threats
PDF
E safety-slide-presentation
DOCX
Gloria flores
PPTX
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
PPT
Social Networking and Internet Safety
PPTX
Digital wellness and your family internet upload
PPT
Danger on Your Desktop
DOCX
Jonathan cullishpuma
PPTX
Internet Safety & Cyberbullying Workshop for Parents
PPT
Internet Safety
PPT
Internet Safety; A Guide for Parents & Teachers
PPTX
Internet safty
PPTX
Internet Safety for Parents presentation 2017
Powerpoint
Internet safety presentation 2015
Internet safety presentation 2016
Internet Safety Slideshare
10things
Internet Safety for Children Powerpoint
Jessica guevara
Cyber Safety How Children Can Protect Themselves From Online Threats
E safety-slide-presentation
Gloria flores
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Social Networking and Internet Safety
Digital wellness and your family internet upload
Danger on Your Desktop
Jonathan cullishpuma
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety
Internet Safety; A Guide for Parents & Teachers
Internet safty
Internet Safety for Parents presentation 2017
Ad

Similar to Speaking - cloud computing and the sysop professional - how to get ready (20)

PPTX
The Year Ahead in Cyber Security: 2014 edition
PDF
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
PDF
ACS Talk (Melbourne) - The future of security
PDF
Protecting Your Privacy: Cyberspace Security, Real World Safety
PPT
Quant & Crypto Gold
PPT
Have the Bad Guys Won the Cyber security War...
PPT
ethical legal issues
PPT
Bright talk intrusion prevention are we joking - henshaw july 2010 a
PPTX
Privacy issues and internet privacy
PDF
CIO Digest_July 2013 Issue
PPTX
2015: The year-ahead-in-cyber-security
PPTX
Presentation on Information Privacy
PPTX
Digital Defense for Activists (and the rest of us)
PDF
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
PPTX
Overview Marketing and International Business
PPTX
Information Security and Data Breach Trends 2014-2015
PPTX
Co3's Annual Review & Predictions Webinar
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PPTX
2014CyberSecurityProject
PPTX
Trends in Cybersecurity
The Year Ahead in Cyber Security: 2014 edition
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ACS Talk (Melbourne) - The future of security
Protecting Your Privacy: Cyberspace Security, Real World Safety
Quant & Crypto Gold
Have the Bad Guys Won the Cyber security War...
ethical legal issues
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Privacy issues and internet privacy
CIO Digest_July 2013 Issue
2015: The year-ahead-in-cyber-security
Presentation on Information Privacy
Digital Defense for Activists (and the rest of us)
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Overview Marketing and International Business
Information Security and Data Breach Trends 2014-2015
Co3's Annual Review & Predictions Webinar
The Cyber Security Landscape: An OurCrowd Briefing for Investors
2014CyberSecurityProject
Trends in Cybersecurity
Ad

More from Eduardo Coelho (13)

PDF
Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
PPTX
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
PDF
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
PDF
2012 06-27 imersão academia de redes itcursos
PDF
2012 06-05 porque voce precisa ser fera em linux.pdf
PDF
2011 11-05 csi - valores pessoais
PDF
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
PDF
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
PPTX
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
PDF
2010 09-22 infra rn security meeting - palestra firewalls opensource
PDF
2012 11-09 facex - i pv6 transition planning-
PDF
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
PPTX
Firewalls Opensource
Dual stack IPv4 / IPv6 Security Issues - A simple proof of concept
2013 09-21 e-learning, moodle and opensource - what do i have to do with it
2012 07-05 eduardo coelho - revolução tecnológica - a influencia dos jogos
2012 06-27 imersão academia de redes itcursos
2012 06-05 porque voce precisa ser fera em linux.pdf
2011 11-05 csi - valores pessoais
2011 09-22 responsabilidade social, o profissional e a empresa.pdf
2011 04-26 estacio fcc - palestra cloud computing para o profissional de ti
2010 10-16 workshop gestão de projetos 2010 - palestra gestão de tempo de g...
2010 09-22 infra rn security meeting - palestra firewalls opensource
2012 11-09 facex - i pv6 transition planning-
2010 09-17 farn sistemas de informação 6o periodo - palestra e-commerce
Firewalls Opensource

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Modernising the Digital Integration Hub
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Getting Started with Data Integration: FME Form 101
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
August Patch Tuesday
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Benefits of Physical activity for teenagers.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Five Habits of High-Impact Board Members
Assigned Numbers - 2025 - Bluetooth® Document
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Modernising the Digital Integration Hub
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hybrid model detection and classification of lung cancer
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Getting Started with Data Integration: FME Form 101
NewMind AI Weekly Chronicles – August ’25 Week III
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
CloudStack 4.21: First Look Webinar slides
Getting started with AI Agents and Multi-Agent Systems
August Patch Tuesday
Hindi spoken digit analysis for native and non-native speakers
sustainability-14-14877-v2.pddhzftheheeeee
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute
Benefits of Physical activity for teenagers.pptx

Speaking - cloud computing and the sysop professional - how to get ready

  • 1. 10/May/2013 Cloud Computing and the SysOp Professional: How to get ready? Eduardo Coelho - Congresso UNIFACEX Friday, May 10, 13
  • 2. hold on ✤ before we get started, let me show you some interesting facts involving information security and privacy in our world Friday, May 10, 13
  • 3. Cryptogram newsletter published the following on 15/Apr/2013 ✤ One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks. ✤ Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up. ✤ And three: Paula Broadwell, who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels -- and hers was the common name. Friday, May 10, 13
  • 4. (continuing) ✤ There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers, social networking sites, search engines: these have become necessities, and it's fanciful to expect people to simply refuse to use them just because they don't like the spying, especially since the full extent of such spying is deliberately hidden from us and there are few alternatives being marketed by companies that don't spy. ✤ This isn't something the free market can fix. We consumers have no choice in the matter. All the major companies that provide us with Internet services are interested in tracking us. Visit a website and it will almost certainly know who you are; there are lots of ways to be tracked without cookies. Cell phone companies routinely undo the web's privacy protection. One experiment at Carnegie Mellon took real-time videos of students on campus and was able to identify one-third of them by comparing their photos with publicly available tagged Facebook photos. ✤ Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your protections, or click on the wrong link, or type the wrong thing, you've permanently attached your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope. Friday, May 10, 13
  • 5. (continuing) ✤ So, we're done. Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because increasingly your conversations are conducted by e-mail, text, or social networking sites. ✤ And welcome to a world where all of this, and everything else that you do or is done on a computer, is saved, correlated, studied, passed around from company to company without your knowledge or consent; and where the government accesses it at will without a warrant. ✤ Welcome to an Internet without privacy, and we've ended up here with hardly a fight. Friday, May 10, 13
  • 6. Thoughts ✤ How many people actually understand how all of this impacts our life? ✤ How good is it to be an IT professional which are probably in the best position to fully antecipate bad outcomes and prevent bad things? Friday, May 10, 13
  • 7. Now let’s focus on the IT PRO ✤ Which is the set of abilities that will (is) be asked of System Operators and Network Admins? Friday, May 10, 13
  • 8. By the way, what SysOp stands for? (or will stand for) ✤ Windows Server Professionals ✤ Unix/Linux Server Professionals ✤ Network Appliance Professionals ✤ Security Officers ✤ DBAs ✤ Any above, but Management-focused Friday, May 10, 13
  • 9. The best SysOp in a nutshell ✤ basic dev knowledge ✤ basic ITIL best practices knowledge ✤ basic PMP knowledge ✤ basic COBIT knowledge ✤ good to awesome security knowledge ✤ advanced cloud platforms knowledge ✤ and of course: ✤ great communication skills ✤ good presentation ✤ self-managed ✤ self-motivated Friday, May 10, 13
  • 10. Difficulties a professional have to deal with ✤ how to always keep up-to-date with technologies as a whole ✤ choosing the right technologies to be good at ✤ focusing too much on enhancing tech knowledge and forgeting about behavioral skill set ✤ how to continuously position IT as strategic to the company Friday, May 10, 13
  • 11. Insights ✤ Cloud is not the problem, scaling IT is ✤ Spending less is possible, be creative ✤ Decide how YOU will enhance your career By the way, that’s your job, not HR’s ✤ Infrastructure exists to support software, never forget that Friday, May 10, 13
  • 12. Conclusions ✤ Cloud demand a good understanding and creative solutions for load balancing, clustering, fail-overs ✤ Cloud demand good knowledge of virtualization concepts ✤ Cloud demand a better understanding of security ✤ Cloud will force SysOps to have a more holistic view of IT Friday, May 10, 13
  • 13. thank you for your time =) ✤ facebook.com/eduardocoelholima ✤ slideshare.net/eduardocoelholima ✤ youtube.com/eduardocoelholima Friday, May 10, 13