RSA Conference 2012: Former NSA director says secure clouds can't come fast enough
CSO - At the third annual Cloud Security Alliance (CSA) summit today, Michael McConnell, former director of the National Security Agency, urged the audience of 1,200 security experts to do what they can to help build trusted cloud computing systems.
"I've a message. Drive this technology, and drive the standards to force change. The economics of the cloud are so compelling they can't be denied. We have to get the security aspects right," McConnell said.
"The threat is well known in this room," he said. "Let me put it in context. There isn't an entity on the globe that is safe from penetration. Not one. The organization that I left has a great legacy. In World War II we were breaking and reading codes before the Nazi field commanders. Think about the magnitude of that during a global conflict," he said.
McConnell then painted a picture of a world in a global economic battle, with cyber-economic espionage as a front line. And, he said, the U.S. is suffering R&D and trade secret loss on a regular and consistent basis. "The U.S. does not have, as a policy, economic espionage, other nations do," he said.
"We are moving, as a nation very, very slowly to engage these threats," he said.
McConnell needed to look no further for validation of his position than the very next CSA panel, "National and International Security Standards -- The Viability of Cross-Jurisdictional Solutions," where, during the session, moderator Tim Mather, advisory director, KPMG, and panelists -- including Marc S. Crandall, senior manager of global compliance enterprise, Google; Baber Amin, senior director of product management, CA Technologies; Chris Wysopal, CTO, Veracode; and Ashvin Kamaraju, VP product development at Vormetric -- spent the better part of an hour hashing the nuances of privacy and data protection regulations and standards.
Most of the talk had to do with issues such as federated identity-management in the cloud and cross-border data sharing regulations; and not much to do with the nitty-gritty of protecting cloud-based applications and infrastructure from attack. Regulations discussed -- and currently in some state of flux -- included FedRAMP, or Federal Risk and Authorization Management Program, and the European Union's proposed new General Data Protection Regulation, as well as the U.S. PATRIOT Act.
"Right now we may have data privacy regulations in those countries, but you need the underlying security to make any of that work," said Veracode's Wysopal. "Security is what makes maintaining that data privacy possible."
No doubt, according to the former director of the NSA, there isn't much actual security in place out there at all. "The NSA is doing better in its mission today than at any other time in its history. For that to be true, it just shows you the level of vulnerabilities in even protected environments," McConnell said.
George V. Hulme writes about security and technology from his home in Minneapolis. You can also find him tweeting about those topics on Twitter at @georgevhulme.
Read more about cloud security in CSOonline's Cloud Security section.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- A More Predictable Way to Budget Software Costs Wavetronix enables creative collaboration while cost-effectively accessing all the latest tools with Adobe Creative Cloud for teams. For Wavetronix, collaboration was easy when...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface. All Data Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!