News Arrow to Content

June 28, 2014

Security Trends Article Series

In 2012, Microsoft Trustworthy Computing launched the Cloud Security Readiness Tool (CSRT) to help organizations understand their current IT infrastructure, identify relevant industry regulations, and evaluate whether cloud adoption will meet their business needs. The aggregate data from the survey has provided insights into current technology trends and security conditions in Retail, Healthcare, and the Financial Services industries.

View Reports

Categories: Other News and Information ||

May 3, 2014

Security Trends in Financial Services, Microsoft Trustworthy Computing

In 2012, Microsoft Trustworthy Computing launched the Cloud Security Readiness Tool (CSRT) to help organizations understand their current IT infrastructure, identify relevant industry regulations, and evaluate whether cloud adoption will meet their business needs. The aggregate data from the survey has provided insights into current technology trends and security conditions in four distinct industries; “Security trends in financial services” is the first report. Additional reports will be published that consider trends in healthcare, retail, and public sector (government) organizations in the coming weeks.

View Report

Categories: Other News and Information ||

February 1, 2014

Healthcare IT and Compliance in the Cloud

Be sure to view our latest Podcast with John Christiansen, Attorney and Founder of Christiansen IT Law, on Healthcare IT and the Cloud.  John discusses the challenges, regulatory issues, and best practices for healthcare customers to assess if Cloud Providers meet compliance requirements under HIPAA and the HITech Act and provides information to CSP’s on what they can do to meet the needs of their healthcare customers.  The interview is listed on our Podcast page or visit The Cumulus page for links to past presentations and other helpful resources.

Categories: CSA Greater Seattle Chapter ||

December 27, 2013

Software Defined Perimeter (SDP)

The Cloud Security Alliance recently announced a new approach to protecting corporate assets. It is named the “Software Defined Perimeter’ or SDP. SDP is a security framework that can be deployed to protect application infrastructure from network-based attacks. The SDP incorporates security standards from a variety of organizations such as the National Institute of Standards and Technology (NIST), and the U.S. Department of Defense (DoD) into an integrated network security framework. Read the full article.

Categories: Other News and Information ||

December 27, 2013

Risk Management for the Cloud

Be sure to view our latest Podcast with Cary Sholer, President and Founder of Farallon Risk Group, on Risk Management and Assessments in the Cloud.  Cary discusses the challenges, issues, and best practices for performing risk assessments of Cloud Providers.  The interview is listed on our Podcast page or the visit The Cumulus page for links to past presentations and other helpful resources.

Categories: Podcasts ||

October 27, 2013

Podcasts on Legal Issues in the Cloud

Be sure to view our latest podcast interviews with Christopher Howard and Colin Folawn, Attorney’s with Schawbe, Williamson & Wyatt.  In three podcasts Mr. Howard and Mr. Colin discuss “Legal Data in the Cloud”,  “eDiscovery in the Cloud”, and “Picking a CSP for a Law Firm”.  The interviews can be found on our Podcast page or on our Cumulus page which includes links to view past chapter presentations, our solutions directory and vendor white papers,  and information on the CSA Global STAR Registry and CCSK certification.

Categories: Chapter Meetings Podcasts ||

October 3, 2013

CSA Seattle Chapter Releases 2013 Report on Cloud Adoption Survey

The CSA Seattle Chapter 2012 fall survey included responses from 107 CSA Seattle Chapter and ISSA members from the Greater Puget Sound area and beyond.  It measures the key obstacles to Cloud adoption including insights on what customers want in order to move the cloud faster.  Key findings from the survey include:

  • Reputation and Brand is the #1 criteria for customers evaluating CSPs.
  • Customers want more Transparency from CSPs to increase confidence in Cloud computing.
  • 80% of respondents identified External Certification as important.
  • Concerns over Data Ownership remain a key factor in cloud adoption.

The survey will be used as a baseline for future surveys by the Seattle Chapter to measure customer adoption rates and issues or concerns with cloud based solutions.

Read 2013 Survey Report

 

Categories: Other News and Information ||

August 20, 2013

Podcast Interviews with John Howie of the CSA

View three podcast interviews with John Howie, COO, of the Cloud Security Alliance filmed at the Seattle Chapter Executive Luncheon in May 2013 and hear what he has to say on the top challenges facing cloud adoption and use, how enterprises are using the Security Trust Assurance Registry (STAR) to evaluate Cloud providers, and recent news on CSA Research initiatives.  View the podcasts with John Howie, COO, of the Cloud Security Alliance.

Categories: Podcasts ||

May 26, 2013

Call for Cloud Security Articles

Seattle Chapter Members are invited to submit articles on Cloud Security for publication in the ISSA Journal.  Article submission is open to ISSA members and non-members.  For more information and editorial guidelines please visit the ISSA Journal web page.

Categories: Other News and Information ||

April 18, 2013

Records in the Cloud Survey

Chapter members are invited to participate in the Records in the Cloud international research project by taking a brief survey. This survey gathers information from users of all types of cloud computing services in order to help us understand users’ needs and experiences.

Records in the Cloud, supported by your feedback, studies the management, operational, legal, and technical issues surrounding the storage and management of records in the cloud. Its goals are:

 1) to determine what policies and procedures a provider should have in place for fully implementing the records/archives management regime of the organization outsourcing the records, for responding promptly to its needs, and for detecting, identifying, analyzing and responding to incidents; and

2) to develop guidelines to assist organizations in assessing the risks and benefits of outsourcing records/archives storage and processing to a cloud provider; in writing contractual agreements, certifications and attestations; and in integrating outsourcing with the organization’s records management and information governance programs.

The web-based survey will take approximately 10 minutes to complete. The survey is anonymous and delivered on secure survey software that meets the privacy and security criteria of University of British Columbia. Participation is voluntary, and completion of the questionnaire indicates your consent to participate in this research. Any identifying information will be removed from the dataset prior to analysis to protect the confidentiality of your answers.

The questionnaire is available online at:
http://fluidsurveys.com/s/RitC/cloud-user-survey/

The survey will be open until May 1st, 2013.  For more information about the research project(including privacy policy)  visit www.recordsinthecloud.org. This study is affiliated with the University of British Columbia.

Categories: Other News and Information ||

Page Dividing Line