Cybersecurity & Cloud Computing Héctor Sánchez Montenegro (@hectorsm) Chief Technology Officer Microsoft Ibérica
Jun 22, 2015
Cybersecurity & Cloud ComputingHéctor Sánchez Montenegro (@hectorsm)
Chief Technology OfficerMicrosoft Ibérica
Perfect Storm
Cloud Computing
New Opportunities
TIC and Cloud democratize Research
Hoy Mañana?
▪ Use laptops and desktop computers
▪ Overwhelmed by data
▪ Finding analysis ever more difficult, sharing even harder
HPC users
Those with small clusters or servers
Majority of Researchers
A Unified Research Community
▪ Powerful tools
▪ Data and analysis tools in the cloud
Cycles, storage, support
▪ Building communities around research results
▪ The ability to marshal needed resources on demand
Without caring or knowing how it gets done…
La mayoría de los Investigadores Cambio de Paradigm a
214D053B33BC
Cybersecurity ¿New Threats? amenaza?
7Cybersecurity. Something has been changed
A Global Trust question
Security
PrivacySoveranity
Interoperability
Compliance
Service Level
Data portability
Legislation
Transparency
Certifications and compliance in Cloud
• Address privacy, security and handling of Customer Data. • Going above and beyond the EU Model Clauses to address
additional requirements from individual EU member states• Enables customers to comply with their local regulations.
• Office 365 is the first major business productivity public cloud service provider willing to sign EU Model Clauses with all customers.
• EU Model Clauses a set of stringent European Union wide data protection requirements Data Processing Agreement
EU Model Clauses
• ISO27001 is one of the best security benchmarks available across the world.
• Office 365 first major business productivity public cloud service to implement rigorous ISO security controls on physical, logical, process and management
ISO27001
Ongoing dialogue with EU Article 29 Working Party since the start
Gov Surveillance
Data Encryption Points
Data in transit between a user and the service
Protects user from interception of their communication and helps ensure transaction integrity
Data in transit between data centers
Protects from bulk interception of data
Data at rest
Protects from removal of physical media
End-to-end encryption of communications between users
Protects from interception or loss of data in transit between users
1 32 4
Trabajamos para proteger el dato en los diferentes estados de la comunicación
Aggressively roll out encryption of customer content between data centers
Implement Perfect Forward Secrecy with 2048-bit security for users interacting with our services to protect their communications from interception
End-to-End Data Encryption CommitmentsMicrosoft is enhancing encryption services for customers.
Gracias