Foreword |
|
xi | |
Extended Multimedia Content |
|
xvii | |
Introduction |
|
xix | |
|
Chapter 1 Cloud User Perceptions |
|
|
1 | (2) |
|
Chapter 2 Economics of Cloud Computing |
|
|
3 | (14) |
|
Chapter 3 Process and Sources |
|
|
17 | (2) |
|
Chapter 4 Industry-Specific Findings |
|
|
19 | (12) |
|
|
19 | (1) |
|
4.2 Highest Level of Education |
|
|
20 | (1) |
|
4.3 Industry Representation |
|
|
21 | (1) |
|
4.4 Organizational Reporting |
|
|
21 | (3) |
|
4.5 Ability to Enforce Compliance |
|
|
24 | (1) |
|
4.6 Method That Best Prepares Someone to Become a Ciso |
|
|
25 | (1) |
|
4.7 Cyberattacks: A Major Threat to Industry |
|
|
26 | (1) |
|
4.8 Top Five It/Cybersecurity Priorities in the Next 12 Months |
|
|
27 | (1) |
|
4.9 Which Security Standards/Frameworks are Most Effective? |
|
|
28 | (1) |
|
4.10 Workforce and Talent |
|
|
29 | (2) |
|
Chapter 5 Cloud Computing |
|
|
31 | (32) |
|
|
32 | (1) |
|
|
32 | (1) |
|
5.3 Key Characteristics of Cloud Computing |
|
|
32 | (2) |
|
5.4 Cloud Computing Deployment Models |
|
|
34 | (4) |
|
|
34 | (1) |
|
5.4.2 Benefits of Public Clouds |
|
|
35 | (1) |
|
|
36 | (1) |
|
5.4.4 Benefits of Private Clouds |
|
|
37 | (1) |
|
|
37 | (1) |
|
5.4.6 Benefits of Hybrid Clouds |
|
|
37 | (1) |
|
|
38 | (1) |
|
5.5 Cloud Computing Service Models |
|
|
38 | (2) |
|
5.6 General Cloud Computing Benefits |
|
|
40 | (2) |
|
|
42 | (4) |
|
5.8 Cloud Computing Technologies |
|
|
46 | (11) |
|
|
46 | (1) |
|
|
47 | (1) |
|
5.8.3 Pervasive High-Quality Access |
|
|
47 | (1) |
|
5.8.4 Data Storage Architectures |
|
|
48 | (2) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
5.8.8 Hardware Virtualization Types |
|
|
53 | (1) |
|
5.8.9 Desktop Virtualization |
|
|
53 | (1) |
|
5.8.10 Software Virtualization |
|
|
54 | (1) |
|
5.8.11 Memory Virtualization |
|
|
55 | (1) |
|
5.8.12 Storage Virtualization |
|
|
55 | (1) |
|
5.8.13 Data Virtualization |
|
|
55 | (1) |
|
5.8.14 Network Virtualization |
|
|
56 | (1) |
|
5.8.15 Emerging Cloud Technologies |
|
|
56 | (1) |
|
5.9 Cloud Adoption Trends |
|
|
57 | (6) |
|
5.9.1 Data Sent to High-Risk Cloud Services |
|
|
60 | (3) |
|
|
63 | (26) |
|
|
63 | (3) |
|
6.2 Managing Risk in the Cloud |
|
|
66 | (14) |
|
6.2.1 The Risk Management Framework |
|
|
68 | (4) |
|
6.2.2 Cloud Providers Risk Management Process |
|
|
72 | (1) |
|
6.2.3 Cloud Consumers Risk Management Process |
|
|
73 | (7) |
|
|
80 | (4) |
|
|
80 | (1) |
|
|
81 | (1) |
|
6.3.3 Cyberattack Vectors |
|
|
82 | (1) |
|
6.3.4 Occurrence of Cyberattacks |
|
|
83 | (1) |
|
6.3.5 Cost of Successful Cyberattacks |
|
|
84 | (1) |
|
6.4 Education and Training |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (3) |
|
Chapter 7 Cloud Computing Vulnerabilities |
|
|
89 | (28) |
|
7.1 Organizational Reporting |
|
|
99 | (1) |
|
7.1.1 It/Cybersecurity Executive Title |
|
|
99 | (1) |
|
7.2 Organizational Budget Management |
|
|
99 | (2) |
|
|
101 | (7) |
|
7.3.1 Key Required Resources |
|
|
101 | (1) |
|
7.3.2 Key Future Initiatives |
|
|
101 | (1) |
|
7.3.3 Quality of Network It/Cybersecurity |
|
|
102 | (1) |
|
7.3.4 Number of Security Breaches Experienced in the Past 2 Years |
|
|
103 | (1) |
|
7.3.5 Most Recent It/Cybersecurity Risk Assessment |
|
|
104 | (1) |
|
7.3.6 Source For Comparative It/Cybersecurity Metrics |
|
|
104 | (1) |
|
7.3.7 Security Standards/Frameworks Used |
|
|
105 | (1) |
|
7.3.8 New Technology Strategy Posture |
|
|
106 | (1) |
|
7.3.9 Cybersecurity Staffing Source |
|
|
106 | (1) |
|
7.3.10 Cyber Defense Priorities |
|
|
107 | (1) |
|
|
108 | (3) |
|
|
108 | (1) |
|
|
108 | (1) |
|
7.4.3 Application Security Risks |
|
|
109 | (2) |
|
7.5 Cybersecurity Operations |
|
|
111 | (6) |
|
7.5.1 Number of Security Positions |
|
|
111 | (1) |
|
7.5.2 Key Ciso Activities |
|
|
112 | (5) |
|
Chapter 8 General Cybersecurity Threat By Industry |
|
|
117 | (22) |
|
|
120 | (2) |
|
8.1.1 Vertical View (Alertlogic_Energy Sector_Cloud Security Report.Pdf) |
|
|
120 | (1) |
|
8.1.2 Energy-Specific Vulnerabilities |
|
|
120 | (2) |
|
|
122 | (3) |
|
|
122 | (1) |
|
|
122 | (3) |
|
|
125 | (2) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
8.4 Information Technology Outsourcing |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
8.6 Cybersecurity Consulting Service |
|
|
128 | (3) |
|
|
131 | (8) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
8.7.1.3 Stolen Credentials |
|
|
133 | (1) |
|
8.7.1.4 The Need For Compliance |
|
|
133 | (1) |
|
8.7.1.5 Controlling Costs and Risk |
|
|
133 | (1) |
|
8.7.1.6 Civilian Agencies |
|
|
134 | (1) |
|
|
134 | (1) |
|
8.7.1.8 Intelligence Community |
|
|
135 | (1) |
|
|
136 | (1) |
|
8.7.2.1 State Security Breach Disclosure Laws |
|
|
136 | (3) |
|
Chapter 9 Application Security By Industry |
|
|
139 | (6) |
|
|
139 | (1) |
|
9.2 Internally Versus Externally Developed Applications |
|
|
140 | (1) |
|
9.3 Application Flaw Density |
|
|
140 | (1) |
|
9.4 Application Remediation |
|
|
141 | (1) |
|
9.5 High-Profile Vulnerabilities |
|
|
142 | (3) |
|
Chapter 10 Cloud Computing and Cybersecurity Education Challenges |
|
|
145 | (30) |
|
10.1 Industry Vertical Knowledge |
|
|
145 | (1) |
|
10.1.1 Regulated Industries |
|
|
145 | (1) |
|
10.1.2 Unregulated Industries |
|
|
146 | (1) |
|
10.2 A Global Cybersecurity View |
|
|
146 | (1) |
|
10.3 Global Legal Framework Knowledge |
|
|
147 | (2) |
|
10.4 Ciso Training, Education, and Certification |
|
|
149 | (3) |
|
10.5 Hybrid It Infrastructure Management |
|
|
152 | (2) |
|
10.6 Risk Management Frameworks |
|
|
154 | (2) |
|
10.7 Key Educational Topics: Critical Threats to Cloud Security |
|
|
156 | (3) |
|
10.8 Next Steps For Educating The Cybersecurity Workforce |
|
|
159 | (4) |
|
10.9 National Cybersecurity Workforce Framework |
|
|
163 | (1) |
|
|
163 | (12) |
|
|
171 | (4) |
|
Chapter 11 Next-Generation Business Models and Strategies |
|
|
175 | (4) |
|
11.1 Strategic Reinvention |
|
|
175 | (1) |
|
11.1.1 Customer Value Propositions |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
11.3 Deeper Collaboration |
|
|
177 | (2) |
|
|
177 | (2) |
Appendix A Oncloud Training Security Offerings |
|
179 | (2) |
Appendix B Relevant Articles and Publications |
|
181 | (12) |
Appendix C Cloud Computing For The Business of Government |
|
193 | (4) |
Appendix D Implementation of Cloud Brokerage |
|
197 | (6) |
Appendix E The Web Services and Service-Oriented Architecture Revolution---Using Web Services to Deliver |
|
203 | (4) |
Appendix F Software as a Service Inflection Point---Using Cloud Computing to Achieve Business Agility |
|
207 | (6) |
Appendix G Fitara and Fedramp---Accelerating Federal Cloud Adoption |
|
213 | (8) |
Index |
|
221 | |