Skip to main content

Secure on the Cloud: a Keynote

Some time ago, I gave a keynote at a CloudSec 2016 Conference in Mumbai. I was pleased to learn recently that the organizers put it on Youtube. I've presented this point of view before - with slides; this was my first attempt to break away from the oppression of Powerpoint and be slidefree.

Comments

  1. Love the way you linked security to agility. Great analogy!

    ReplyDelete
  2. Enjoyed listening to you as always.

    ReplyDelete

Post a Comment

Popular posts from this blog

Outsourcing I–The "Why" Question

A little while ago, I was asked to give a presentation to CEOs on outsourcing. The audience wanted to know about adopting outsourcing for their companies; making use of its promise while avoiding its pitfalls. It seemed to me (unimaginatively, I must admit) that the whole thing boiled down to four fundamental questions - the why , the what , the who and the how . I decided to expand the presentation into a series of blog posts, one per question. The Why Question Why outsource? Given that a trillion-dollar industry has crowded a lot of people into Bangalore and made more than one driver rich, it seems a little late to ask this question. However, this isn't really about outsourcing being good or bad per se. Bloggers like us love to wallow in theoretical questions; companies usually want answers to more prosaic stuff. The question really is, why should a company be looking for an outsource partner ?   I've divided the universe into two simple flavours – Tactical and Str...

The Song of Socialism II: Penetration

Social is the new buzzword, and what a loud buzz that is nowadays. In the last post I described my theory of levels of social media - Presence , Participation , Penetration and Platform . Presence was passive, Participation was active entry into the world of social media. Penetration and Platform are quite a bit more complex. This part two of the series gets into the next P – Penetration . I’ll need another post for Platform . To understand where I’m going with this, lets see what a social network really is. The web started off as a way to connect content together. Any piece of content could easily and simply refer to another piece of content, even if it was on a different server in a different country. A browser allowed people to move from content item to content item, thus making the universe of the world wide web a wonderful store of content. People soon realized that this could be extended to all kinds of transactions – one could pass not just content but messages and info...

Rethinking Disaster Recovery

Disaster Recovery has been on the minds of companies ever since the early days of commercially available computing. Today's world of DR revolves around four acronyms - BIA (business impact analysis), RPO (recovery point objective), RTO (recovery time objective) and BCP (business continuity plan). The acronyms appear in a disaster recovery plan in roughly in that order, the thinking being that you first analyse the impact to business of systems being down, then figure out how far back in the past are you willing to turn the dial back to recover from (last day, last hour, last millisecond). Next focus on how long you can afford to be down. Finally - buy a boatload of hardware, software and services to convert all this into action. Setting up a DR is a hugely expensive affair that takes a significant amount planning and effort, not to mention all those drills and tests every now and then. CTOs have followed this prescription since the late seventies (apparently the first hot site wa...