Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Half Title
Title Page
Copyright Page
Table of Contents
Foreword
Extended Multimedia Content
Introduction
CHAPTER 1. Cloud User Perceptions
CHAPTER 2. Economics of Cloud Computing
CHAPTER 3. Process and Sources
CHAPTER 4. Industry-Specific Findings
4.1 OFFICIAL TITLES
4.2 HIGHEST LEVEL OF EDUCATION
4.3 INDUSTRY REPRESENTATION
4.4 ORGANIZATIONAL REPORTING
4.5 ABILITY TO ENFORCE COMPLIANCE
4.6 METHOD THAT BEST PREPARES SOMEONE TO BECOME A CISO
4.7 CYBERATTACKS: A MAJOR THREAT TO INDUSTRY
4.8 TOP FIVE IT/CYBERSECURITY PRIORITIES IN THE NEXT 12 MONTHS
4.9 WHICH SECURITY STANDARDS/FRAMEWORKS ARE MOST EFFECTIVE?
4.10 WORKFORCE AND TALENT
CHAPTER 5. Cloud Computing
5.1 RISE OF THE INTERNET
5.2 THE TRANSFORMATION
5.3 KEY CHARACTERISTICS OF CLOUD COMPUTING
5.4 CLOUD COMPUTING DEPLOYMENT MODELS
5.4.1 Public Cloud
5.4.2 Benefits of Public Clouds
5.4.3 Private Cloud
5.4.4 Benefits of Private Clouds
5.4.5 Hybrid Cloud
5.4.6 Benefits of Hybrid Clouds
5.4.7 Community Cloud
5.5 CLOUD COMPUTING SERVICE MODELS
5.6 GENERAL CLOUD COMPUTING BENEFITS
5.7 CLOUD USE CASES
5.8 CLOUD COMPUTING TECHNOLOGIES
5.8.1 Commodity Hardware
5.8.2 Network Speed
5.8.3 Pervasive High-Quality Access
5.8.4 Data Storage Architectures
5.8.5 Data Centers
5.8.6 Virtualization
5.8.7 Hypervisor
5.8.8 Hardware Virtualization Types
5.8.9 Desktop Virtualization
5.8.10 Software Virtualization
5.8.11 Memory Virtualization
5.8.12 Storage Virtualization
5.8.13 Data Virtualization
5.8.14 Network Virtualization
5.8.15 Emerging Cloud Technologies
5.9 CLOUD ADOPTION TRENDS
5.9.1 Data Sent to High-Risk Cloud Services
CHAPTER 6. Cybersecurity
6.1 INTRODUCTION
6.2 MANAGING RISK IN THE CLOUD
6.2.1 The Risk Management Framework
6.2.2 Cloud Providers Risk Management Process
6.2.3 Cloud Consumers Risk Management Process
6.3 CYBERCRIME
6.3.1 The Hype
6.3.2 The Facts
6.3.3 Cyberattack Vectors
6.3.4 Occurrence of Cyberattacks
6.3.5 Cost of Successful Cyberattacks
6.4 EDUCATION AND TRAINING
6.5 TRENDS
6.6 GLOBAL
CHAPTER 7. Cloud Computing Vulnerabilities
7.1 ORGANIZATIONAL REPORTING
7.1.1 IT/Cybersecurity Executive Title
7.2 ORGANIZATIONAL BUDGET MANAGEMENT
7.3 OPERATIONAL PLANNING
7.3.1 Key Required Resources
7.3.2 Key Future Initiatives
7.3.3 Quality of Network IT/Cybersecurity
7.3.4 Number of Security Breaches Experienced in the Past 2 Years
7.3.5 Most Recent IT/Cybersecurity Risk Assessment
7.3.6 Source for Comparative IT/Cybersecurity Metrics
7.3.7 Security Standards/Frameworks Used
7.3.8 New Technology Strategy Posture
7.3.9 Cybersecurity Staffing Source
7.3.10 Cyber Defense Priorities
7.4 THREAT EXPECTATIONS
7.4.1 Type of Attack
7.4.2 Type of Attackers
7.4.3 Application Security Risks
7.5 CYBERSECURITY OPERATIONS
7.5.1 Number of Security Positions
7.5.2 Key CISO Activities
CHAPTER 8. General Cybersecurity Threat by Industry
8.1 ENERGY/UTILITIES
8.1.1 Vertical View (AlertLogic_Energy Sector_Cloud Security Report.pdf)
8.1.2 Energy-Specific Vulnerabilities
8.2 BANKING/FINANCE
8.2.1 Vertical View
8.2.2 General
8.3 HEALTHCARE
8.3.1 Vertical View
8.3.2 General
8.3.3 Retail Pharmacies
8.4 INFORMATION TECHNOLOGY OUTSOURCING
8.4.1 General
8.5 EDUCATION
8.5.1 General
8.6 CYBERSECURITY CONSULTING SERVICE
8.7 GOVERNMENT/MILITARY
8.7.1 US Federal Sector
8.7.1.1 Federal
8.7.1.2 Insider Threats
8.7.1.3 Stolen Credentials
8.7.1.4 The Need for Compliance
8.7.1.5 Controlling Costs and Risk
8.7.1.6 Civilian Agencies
8.7.1.7 Defense
8.7.1.8 Intelligence Community
8.7.2 State and Local
8.7.2.1 State Security Breach Disclosure Laws
CHAPTER 9. Application Security by Industry
9.1 POLICY COMPLIANCE
9.2 INTERNALLY VERSUS EXTERNALLY DEVELOPED APPLICATIONS
9.3 APPLICATION FLAW DENSITY
9.4 APPLICATION REMEDIATION
9.5 HIGH-PROFILE VULNERABILITIES
CHAPTER 10. Cloud Computing and Cybersecurity Education Challenges
10.1 INDUSTRY VERTICAL KNOWLEDGE
10.1.1 Regulated Industries
10.1.2 Unregulated Industries
10.2 A GLOBAL CYBERSECURITY VIEW
10.3 GLOBAL LEGAL FRAMEWORK KNOWLEDGE
10.4 CISO TRAINING, EDUCATION, AND CERTIFICATION
10.5 HYBRID IT INFRASTRUCTURE MANAGEMENT
10.6 RISK MANAGEMENT FRAMEWORKS
10.7 KEY EDUCATIONAL TOPICS: CRITICAL THREATS TO CLOUD SECURITY
10.8 NEXT STEPS FOR EDUCATING THE CYBERSECURITY WORKFORCE
10.9 NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK
10.10 UNITED STATES NICE
REFERENCES
CHAPTER 11. Next-Generation Business Models and Strategies
11.1 STRATEGIC REINVENTION
11.1.1 Customer Value Propositions
11.1.2 Value Chains
11.2 BETTER DECISIONS
11.3 DEEPER COLLABORATION
REFERENCE
APPENDIX A: ONCLOUD TRAINING SECURITY OFFERINGS
APPENDIX B: RELEVANT ARTICLES AND PUBLICATIONS
APPENDIX C: CLOUD COMPUTING FOR THE BUSINESS OF GOVERNMENT
APPENDIX D: IMPLEMENTATION OF CLOUD BROKERAGE
APPENDIX E: THE WEB SERVICES AND SERVICE-ORIENTED ARCHITECTURE REVOLUTION—USING WEB SERVICES TO DELIVER
APPENDIX F: SOFTWARE AS A SERVICE INFLECTION POINT—USING CLOUD COMPUTING TO ACHIEVE BUSINESS AGILITY
APPENDIX G: FITARA AND FedRAMP—ACCELERATING FEDERAL CLOUD ADOPTION
INDEX
← Prev
Back
Next →
← Prev
Back
Next →