
Sign up to save your podcasts
Or
Attendees
Guest: Olaf Streutker
Guest title: CISO Advisor
Company: ABN Amro
Abstract
The Cloud Octagon Model is a new framework for cloud adoption (mostly SaaS adoption). The model was designed in cooperation between ABN-Amro and the Cloud Security Alliance and assists organizations to identify, represent, and assess risks in the context of their cloud implementation across multiple factors by introducing a logical approach to holistically dealing with security aspects involved in moving to the cloud.
Link to CSA Cloud Octagon Model:
https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/
Timing
0:00
Intro and introducing the guest and ABN Amro cloud adoption methodology
12:10
The evolution of the Cloud Octagon Model and basic concepts
11:28
How ABN-Amro are dealing with IaaS/PaaS vs. SaaS
15:30
The different phases of the Cloud Octagon Model: Classification
20.30
Core banking applications in the cloud
24.20
The different phases of the Cloud Octagon Model
31.20
Summary and conclusions
5
33 ratings
Attendees
Guest: Olaf Streutker
Guest title: CISO Advisor
Company: ABN Amro
Abstract
The Cloud Octagon Model is a new framework for cloud adoption (mostly SaaS adoption). The model was designed in cooperation between ABN-Amro and the Cloud Security Alliance and assists organizations to identify, represent, and assess risks in the context of their cloud implementation across multiple factors by introducing a logical approach to holistically dealing with security aspects involved in moving to the cloud.
Link to CSA Cloud Octagon Model:
https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/
Timing
0:00
Intro and introducing the guest and ABN Amro cloud adoption methodology
12:10
The evolution of the Cloud Octagon Model and basic concepts
11:28
How ABN-Amro are dealing with IaaS/PaaS vs. SaaS
15:30
The different phases of the Cloud Octagon Model: Classification
20.30
Core banking applications in the cloud
24.20
The different phases of the Cloud Octagon Model
31.20
Summary and conclusions