SlideShare a Scribd company logo
1 of 18
Racing Ahead of the Competition by Capitalizing on Your
Potential to be the Safe and Secure Choice for Cloud

The Race to Cloud Services Summit
Chair: Nava Levy, VP SaaS Cloud Solutions, cVidya Networks

                   November 9th, 2011
Introducing our Speakers
           Nava Levy




    K. Scott       Varun    Mark      Guy
    Morrison      Badhwar   Weeks   Bejerano
Session   •   Becoming the Safe Choice for Cloud by Addressing
Overview       Cloud Fraud & Security Threats
                –   Nava Levy, VP SaaS/Cloud Solutions, cVidya Networks


           •   Blind Trust or Dumb Luck - How do you want
               customers to choose your cloud service?
                –   Guy Bejerano, Chief Security Officer, Liveperson


           •   Managing Through Security Requirements in the Race
               to the Cloud
                –   Mark Weeks, Product Manager - Managed Security Services, Sprint


           •   Achieving Security Assurance and Compliance in the
               Cloud
                –   Scott Morrison, CSA Council Member, Cloud Security Alliance


           •   Panel: Addressing the Challenges and Dilemmas of
               Securing Cloud Services
                –   Varun Badhwar, Vice President Products, CipherCloud
                    Mark Weeks, Sprint; Scott Morrison, CSA;
                    Guy Bejerano, Liveperson


           •   Interactive Dialogue between Panelists and Audience
Nava Levy, cVidya Networks
   With 18 years experience in developing new,
   innovative strategic directions, Nava Levy leads
   cVidya’s efforts in SaaS/Cloud. Before joining cVidya,
   Nava was the Head of SaaS/Cloud Computing Program
   at Amdocs and prior to this position played a key role
   in developing a new strategic direction for Amdocs
   which resulted in their becoming a leader in their
   domain, generating hundreds of millions dollars for the
   company.

   cVidya Networks is a global leader of revenue-
                                                             Nava Levy
   intelligence solutions. The company’s product             Vice President,
   portfolio helps service providers maximize margins,       SaaS/Cloud Solutions
   improve customer experience and optimize
   ecosystem relationships through revenue assurance,
   fraud, risk, dealer and margin analytics. cVidyaCloud
   is its umbrella of On Demand revenue intelligence
   solutions. With over 130 customers cVidya has one of
   the largest installed bases of revenue-assurance and
   fraud-management implementations worldwide.
Becoming the safe choice for the cloud by
addressing cloud fraud & security threats


Wednesday, November 9

Nava Levy, VP SaaS/Cloud Solutions, cVidya Networks
Cloud Computing is not just a hype…

         Huge Market               Growing Extremely          Disrupting Existing
          Potential                      Fast                      Markets



    •   $60B by 2014           •    5 times vs.           •    Today is dominated
                                    traditional IT!            by pureplay SaaS/
                                                               Cloud vendors




           By 2012 Cloud computing will become so pervasive that 1 out of
                5 businesses will own no IT assets at all (Gartner, 2010)

6
The number of operators offering
Cloud Services has doubled in 18 months




                                                           Oct, 2011




  Allows service providers to move up the value chain and avoid
                     becoming “dumb pipes”
However, security remains biggest
barrier to cloud adoption
                                              Forrester's clients have consistently rated
                                              security as their top concern with cloud
                                              computing, ahead of other issues such as
                                              performance and availability.

                                                                     Source: Forrester, 2011




                                                   Security still top concern with
                                                   cloud, despite Amazon outage.
                                                   Enterprises I speak to are more
                                                   concerned about security than they
                                                   are about availability, reliability, or
                                                   performance.


                                                                    Source: Gartner, 2011
Source: Survey by Marketing Solutions, 2011
Is it an Opportunity or Threat?
What are CSPs strengths & weaknesses
for delivering cloud services?

             Strengths                Weaknesses




        CSPs should Leverage their Strengths to Become the
                 Safe & Secure Choice for Cloud!
Addressing Security Threats
                                                              - Mapping the risks
                                                              - Impact, likelihood
                                                              - Determine the controls and
                                         Risk                   which risks we can tolerate
                                      Management              - Periodical




                Security                                   Fraud
               Management                                Management




     -   Threats                                   - Fraudsters
     -   Real time defense                         - Combating and recovering
     -   Preventing services disruption              financial losses
     -   24X7                                      - On going
11
Top Threats to Cloud Computing

Percent*               Threat Type                        IaaS   PaaS   SaaS

     28.8%         Data Loss or Leakage

     17.8%   Abuse & Nefarious Use of Cloud
                      Computing
     15.1%     Insecure Interfaces and APIs

     11.0%          Malicious Insiders

     9.6%      Account or Service Hijacking

     9.6%          Unknown Risk Profile

     8.2%    Shared Technology Vulnerabilities



                 Source: CSA, 2010; *percent per survey
12
What’s special about Cloud Security
 for Telecom Cloud Providers?
     SaaS/Cloud transfers IT
     Risk to Cloud Provider



          ICT significantly larger
               wallet share


                  Cloud expands risk
                 potential and type of
                   threats spectrum

                          Telco’s role as Cloud
                          Services Brokerage –
                            further increases
                               complexity

                                    Telco’s critical
                                positioning as trusted
                                       suppliers
13
What’s special about Cloud Security
 for Telcos? (cont.)

       IT                           Theft of software … leapt 14 percent
                                    globally in 2010 to $59 Billion
      5/2011

     Internet
                                    Internet crime has affected Millions
                                    …. report demonstrates how
      2/2011                        pervasive online crime has become…


     Telecom                        Experts estimate annual fraud losses
                                    are $40.1 Billion …. the results
                                    …confirm that telecom fraud remains
     10/2011                        a lucrative criminal business.


                Need to combat Telecom Fraud, Software Theft and
                            CyberCrime Combined!
14
Cloud Security – Risk Assessment
         Cloud computing has "unique attributes that
         require risk assessment in areas such as data
     integrity, recovery, and privacy, and an evaluation of
      legal issues in areas such as e-discovery, regulatory
                   compliance, and auditing,"




15
Cloud Security – Risk Assessment



                                                   ISOLATION       INSECURE
                                                   FAILURE (7)     APIs (3)

                                                   INSECURE DATA
                                                   DELETION (1)  MALICIOUS
                                                                 INSIDER (4)




                                 GOVERNANCE
                                 / CONTROL JURISDICTION
                                           CHANGES
                                 COMPLIANCE




                 Source: enisa
16
Integrated approach to Risk and Fraud
 and Security management is needed


                            Risk
                         Management




                Security            Fraud
               Management         Management




      With a comprehensive and integrated approach to
      addressing Cloud security threats, Telcos are well
17
       positioned to become the safe choice for cloud
THANK YOU!
 nava.levy@cvidya.com

More Related Content

What's hot

07 role of network effects and digital ecosystems
07 role of network effects and digital ecosystems 07 role of network effects and digital ecosystems
07 role of network effects and digital ecosystems innov-acts-ltd
 
Digital Threats: Scenarios Exercise
Digital Threats: Scenarios ExerciseDigital Threats: Scenarios Exercise
Digital Threats: Scenarios ExerciseElena Kvochko
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
Cybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportCybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportJoshua Enders
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKHappiest Minds Technologies
 
Chapter 7 risk based approach
Chapter 7   risk based approachChapter 7   risk based approach
Chapter 7 risk based approachQuan Risk
 
Build competitive edge through differentiated customer experience
Build competitive edge  through differentiated  customer experienceBuild competitive edge  through differentiated  customer experience
Build competitive edge through differentiated customer experiencegiridharseorank
 
eCMO Conference 2013 - NFC Global Opportunity, Progress and Challenge
eCMO Conference 2013 - NFC Global Opportunity, Progress and ChallengeeCMO Conference 2013 - NFC Global Opportunity, Progress and Challenge
eCMO Conference 2013 - NFC Global Opportunity, Progress and ChallengeHKAIM
 
Chapter 12 regulatory technology for aml compliance
Chapter 12   regulatory technology for aml complianceChapter 12   regulatory technology for aml compliance
Chapter 12 regulatory technology for aml complianceQuan Risk
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forumkkvences
 
Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...
Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...
Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...GSMA Mobile for Development
 

What's hot (16)

07 role of network effects and digital ecosystems
07 role of network effects and digital ecosystems 07 role of network effects and digital ecosystems
07 role of network effects and digital ecosystems
 
Digital Threats: Scenarios Exercise
Digital Threats: Scenarios ExerciseDigital Threats: Scenarios Exercise
Digital Threats: Scenarios Exercise
 
Fintech_2017
Fintech_2017Fintech_2017
Fintech_2017
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Cybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportCybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud Report
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
Chapter 7 risk based approach
Chapter 7   risk based approachChapter 7   risk based approach
Chapter 7 risk based approach
 
Coinsquad_ppt_deck_v1
Coinsquad_ppt_deck_v1Coinsquad_ppt_deck_v1
Coinsquad_ppt_deck_v1
 
Build competitive edge through differentiated customer experience
Build competitive edge  through differentiated  customer experienceBuild competitive edge  through differentiated  customer experience
Build competitive edge through differentiated customer experience
 
Telecoms + It
Telecoms + ItTelecoms + It
Telecoms + It
 
eCMO Conference 2013 - NFC Global Opportunity, Progress and Challenge
eCMO Conference 2013 - NFC Global Opportunity, Progress and ChallengeeCMO Conference 2013 - NFC Global Opportunity, Progress and Challenge
eCMO Conference 2013 - NFC Global Opportunity, Progress and Challenge
 
Chapter 12 regulatory technology for aml compliance
Chapter 12   regulatory technology for aml complianceChapter 12   regulatory technology for aml compliance
Chapter 12 regulatory technology for aml compliance
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum
 
Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...
Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...
Getting the Most Out of Your Data - Segmenting Your Mobile Money Customer Bas...
 

Viewers also liked

DN11 _U3_ A14_OMPH
DN11 _U3_ A14_OMPHDN11 _U3_ A14_OMPH
DN11 _U3_ A14_OMPHmauricioph13
 
Presentation
PresentationPresentation
Presentationkdthle
 
Dn11_ U3_ A14_OMPH
Dn11_ U3_ A14_OMPHDn11_ U3_ A14_OMPH
Dn11_ U3_ A14_OMPHmauricioph13
 
Inbound Marketing in retail: wat is het en hoe start je ermee?
Inbound Marketing in retail: wat is het en hoe start je ermee?Inbound Marketing in retail: wat is het en hoe start je ermee?
Inbound Marketing in retail: wat is het en hoe start je ermee?Steven Van Duyse
 
DN11_ U3_ A23_OMPH
DN11_ U3_ A23_OMPHDN11_ U3_ A23_OMPH
DN11_ U3_ A23_OMPHmauricioph13
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud managementcVidya Networks
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssurancecVidya Networks
 
Líquidos y electrolitos balance acido base nuevo
Líquidos y electrolitos balance acido base nuevoLíquidos y electrolitos balance acido base nuevo
Líquidos y electrolitos balance acido base nuevoАндрей Мерлано
 
Winning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsWinning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsAmazon Web Services
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalcVidya Networks
 
IT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh WarrenIT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh Warrenbob panic
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Strategy Development Workshop
Strategy Development WorkshopStrategy Development Workshop
Strategy Development Workshopmalpascoe
 

Viewers also liked (20)

Dn11 u3 a29_omph
Dn11 u3 a29_omphDn11 u3 a29_omph
Dn11 u3 a29_omph
 
Common app essay question
Common app essay questionCommon app essay question
Common app essay question
 
DN11 _U3_ A14_OMPH
DN11 _U3_ A14_OMPHDN11 _U3_ A14_OMPH
DN11 _U3_ A14_OMPH
 
DN11_U3 _A14_OMPH
DN11_U3 _A14_OMPHDN11_U3 _A14_OMPH
DN11_U3 _A14_OMPH
 
Presentation
PresentationPresentation
Presentation
 
Dn11 u3 a18_omph
Dn11 u3 a18_omphDn11 u3 a18_omph
Dn11 u3 a18_omph
 
Dn11_ U3_ A14_OMPH
Dn11_ U3_ A14_OMPHDn11_ U3_ A14_OMPH
Dn11_ U3_ A14_OMPH
 
Dn11 u3 a19_omph
Dn11 u3 a19_omphDn11 u3 a19_omph
Dn11 u3 a19_omph
 
Inbound Marketing in retail: wat is het en hoe start je ermee?
Inbound Marketing in retail: wat is het en hoe start je ermee?Inbound Marketing in retail: wat is het en hoe start je ermee?
Inbound Marketing in retail: wat is het en hoe start je ermee?
 
Dn13 u3 a16_omph
Dn13 u3 a16_omphDn13 u3 a16_omph
Dn13 u3 a16_omph
 
DN11_ U3_ A23_OMPH
DN11_ U3_ A23_OMPHDN11_ U3_ A23_OMPH
DN11_ U3_ A23_OMPH
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud management
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
 
Darren Visual Cv 2011
Darren Visual Cv 2011Darren Visual Cv 2011
Darren Visual Cv 2011
 
Líquidos y electrolitos balance acido base nuevo
Líquidos y electrolitos balance acido base nuevoLíquidos y electrolitos balance acido base nuevo
Líquidos y electrolitos balance acido base nuevo
 
Winning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsWinning Enterprise Cloud Engagements
Winning Enterprise Cloud Engagements
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to External
 
IT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh WarrenIT strategy presentation by global leading CIO, Creagh Warren
IT strategy presentation by global leading CIO, Creagh Warren
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Strategy Development Workshop
Strategy Development WorkshopStrategy Development Workshop
Strategy Development Workshop
 

Similar to Becoming the safe choice for the cloud by addressing cloud fraud & security threats

Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudVincent Kwon
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013avelinakauffman
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.martin_lee1969
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San JoseMoshe Ferber
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 

Similar to Becoming the safe choice for the cloud by addressing cloud fraud & security threats (20)

Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Csathreats.v1.0
Csathreats.v1.0Csathreats.v1.0
Csathreats.v1.0
 
Top Cloud Threats
Top Cloud ThreatsTop Cloud Threats
Top Cloud Threats
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot Spot
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 

More from cVidya Networks

Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyacVidya Networks
 
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...cVidya Networks
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiescVidya Networks
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssurancecVidya Networks
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...cVidya Networks
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?cVidya Networks
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk" cVidya Networks
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya Networks
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelcVidya Networks
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyacVidya Networks
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthcVidya Networks
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssurancecVidya Networks
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiescVidya Networks
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012cVidya Networks
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiescVidya Networks
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...cVidya Networks
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategycVidya Networks
 

More from cVidya Networks (20)

Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
 
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management Strategies
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum Conference
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and Alltel
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidya
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidya
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growth
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue Assurance
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New Opportunities
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Becoming the safe choice for the cloud by addressing cloud fraud & security threats

  • 1. Racing Ahead of the Competition by Capitalizing on Your Potential to be the Safe and Secure Choice for Cloud The Race to Cloud Services Summit Chair: Nava Levy, VP SaaS Cloud Solutions, cVidya Networks November 9th, 2011
  • 2. Introducing our Speakers Nava Levy K. Scott Varun Mark Guy Morrison Badhwar Weeks Bejerano
  • 3. Session • Becoming the Safe Choice for Cloud by Addressing Overview Cloud Fraud & Security Threats – Nava Levy, VP SaaS/Cloud Solutions, cVidya Networks • Blind Trust or Dumb Luck - How do you want customers to choose your cloud service? – Guy Bejerano, Chief Security Officer, Liveperson • Managing Through Security Requirements in the Race to the Cloud – Mark Weeks, Product Manager - Managed Security Services, Sprint • Achieving Security Assurance and Compliance in the Cloud – Scott Morrison, CSA Council Member, Cloud Security Alliance • Panel: Addressing the Challenges and Dilemmas of Securing Cloud Services – Varun Badhwar, Vice President Products, CipherCloud Mark Weeks, Sprint; Scott Morrison, CSA; Guy Bejerano, Liveperson • Interactive Dialogue between Panelists and Audience
  • 4. Nava Levy, cVidya Networks With 18 years experience in developing new, innovative strategic directions, Nava Levy leads cVidya’s efforts in SaaS/Cloud. Before joining cVidya, Nava was the Head of SaaS/Cloud Computing Program at Amdocs and prior to this position played a key role in developing a new strategic direction for Amdocs which resulted in their becoming a leader in their domain, generating hundreds of millions dollars for the company. cVidya Networks is a global leader of revenue- Nava Levy intelligence solutions. The company’s product Vice President, portfolio helps service providers maximize margins, SaaS/Cloud Solutions improve customer experience and optimize ecosystem relationships through revenue assurance, fraud, risk, dealer and margin analytics. cVidyaCloud is its umbrella of On Demand revenue intelligence solutions. With over 130 customers cVidya has one of the largest installed bases of revenue-assurance and fraud-management implementations worldwide.
  • 5. Becoming the safe choice for the cloud by addressing cloud fraud & security threats Wednesday, November 9 Nava Levy, VP SaaS/Cloud Solutions, cVidya Networks
  • 6. Cloud Computing is not just a hype… Huge Market Growing Extremely Disrupting Existing Potential Fast Markets • $60B by 2014 • 5 times vs. • Today is dominated traditional IT! by pureplay SaaS/ Cloud vendors By 2012 Cloud computing will become so pervasive that 1 out of 5 businesses will own no IT assets at all (Gartner, 2010) 6
  • 7. The number of operators offering Cloud Services has doubled in 18 months Oct, 2011 Allows service providers to move up the value chain and avoid becoming “dumb pipes”
  • 8. However, security remains biggest barrier to cloud adoption Forrester's clients have consistently rated security as their top concern with cloud computing, ahead of other issues such as performance and availability. Source: Forrester, 2011 Security still top concern with cloud, despite Amazon outage. Enterprises I speak to are more concerned about security than they are about availability, reliability, or performance. Source: Gartner, 2011 Source: Survey by Marketing Solutions, 2011
  • 9. Is it an Opportunity or Threat?
  • 10. What are CSPs strengths & weaknesses for delivering cloud services? Strengths Weaknesses CSPs should Leverage their Strengths to Become the Safe & Secure Choice for Cloud!
  • 11. Addressing Security Threats - Mapping the risks - Impact, likelihood - Determine the controls and Risk which risks we can tolerate Management - Periodical Security Fraud Management Management - Threats - Fraudsters - Real time defense - Combating and recovering - Preventing services disruption financial losses - 24X7 - On going 11
  • 12. Top Threats to Cloud Computing Percent* Threat Type IaaS PaaS SaaS 28.8% Data Loss or Leakage 17.8% Abuse & Nefarious Use of Cloud Computing 15.1% Insecure Interfaces and APIs 11.0% Malicious Insiders 9.6% Account or Service Hijacking 9.6% Unknown Risk Profile 8.2% Shared Technology Vulnerabilities Source: CSA, 2010; *percent per survey 12
  • 13. What’s special about Cloud Security for Telecom Cloud Providers? SaaS/Cloud transfers IT Risk to Cloud Provider ICT significantly larger wallet share Cloud expands risk potential and type of threats spectrum Telco’s role as Cloud Services Brokerage – further increases complexity Telco’s critical positioning as trusted suppliers 13
  • 14. What’s special about Cloud Security for Telcos? (cont.) IT Theft of software … leapt 14 percent globally in 2010 to $59 Billion 5/2011 Internet Internet crime has affected Millions …. report demonstrates how 2/2011 pervasive online crime has become… Telecom Experts estimate annual fraud losses are $40.1 Billion …. the results …confirm that telecom fraud remains 10/2011 a lucrative criminal business. Need to combat Telecom Fraud, Software Theft and CyberCrime Combined! 14
  • 15. Cloud Security – Risk Assessment Cloud computing has "unique attributes that require risk assessment in areas such as data integrity, recovery, and privacy, and an evaluation of legal issues in areas such as e-discovery, regulatory compliance, and auditing," 15
  • 16. Cloud Security – Risk Assessment ISOLATION INSECURE FAILURE (7) APIs (3) INSECURE DATA DELETION (1) MALICIOUS INSIDER (4) GOVERNANCE / CONTROL JURISDICTION CHANGES COMPLIANCE Source: enisa 16
  • 17. Integrated approach to Risk and Fraud and Security management is needed Risk Management Security Fraud Management Management With a comprehensive and integrated approach to addressing Cloud security threats, Telcos are well 17 positioned to become the safe choice for cloud