Cloud Security Still Top Priority For Finance Execs

Cloud Security Still Top Priority For Finance Execs

In the wake of the recent Sony PlayStation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.

The web has become a playground for hackers and malcontents eager to phish, defraud and steal wherever and whenever they can. Policing this landscape is a logistical nightmare, and battle lines are being drawn and redrawn many thousands of times a day – which perhaps hints at why many of us are still uncomfortable with the idea of storing sensitive data in third-party environments.

That unease is only likely to have increased following the recent data breach in Sony’s PlayStation network, which compromised the personal data of more than 100 million customers of the Japanese electronics giant. This and other high-profile security snafus, such as a massive outage at Amazon’s cloud computing centre, have caused some businesses to put the brakes on plans to move their operations into the cloud.

There still exists a level of concern over the cloud,” admits Crawford del Prete, Executive Vice President of Worldwide Products and Chief Research Officer at research giant IDC. “There is a need for quite a bit more maturation in terms of people’s experiences with it. When we conduct our surveys, we find that security and uncertainty around what data to put into the cloud are consistently at the top of people’s concerns.”

In a 2010 report by the Ponemon Institute in California, a mere 33 percent of the 1000 IT professionals surveyed trusted the security of cloud-hosting data centres. What’s more, such skepticism seems justified: in a more recent study released last month, Ponemon found that providers of cloud computing resources are not focused on security in the cloud. Rather, their priority is delivering the features their customers want, such as low-cost solutions with fast deployment that improve customer service and increase the efficiency of the IT function. “As a result,” says the report, “providers in our study conclude that they cannot warrant or provide complete assurance that their products or services are sufficiently secure.

Such findings highlight a concern many technology executives share: will external software providers have the firm’s best interests at heart? “If we pick a vendor to host our stuff, are they going to have the right maturity, the right service levels, the ability to pay the same amount of attention as we do to our own environments today?” asks Richard Scott, CTO at Guardian Life Insurance Company. “Are we going to get the same or better or a guaranteed level of service?”

Nonetheless, given that a report published by the Centre for Economics and Business Research suggests cloud computing will allow financial services business to break free from the shackles of old legacy IT, generate some US$250 billion and create a staggering 207,000 jobs, technology and finance executives – along with their colleagues in legal, business and other related departments – will need to work together to eliminate such concerns. Much of this work has already begun: CEBR’s Cloud Dividend report predicts that 60-80 percent of all businesses in the banking, financial and business services sector will have adopted some form of cloud computing by 2015.

As such, as technology evolves – and despite the potential for further security breaches in future – comfort levels with the cloud environment are likely to increase in time as security concerns are addressed. “The future of the cloud will be driven forward by technology and comfort levels, but it will also be pulled back by technology and comfort levels,” says del Prete. “There will be security breaches where all of a sudden people will quickly lose faith in the cloud, and then they will go back to it and slowly become more comfortable again.”

Scott, too, is optimistic that these are just kinks that will work themselves out with time. “As the technology evolves and security techniques become tried and tested, these concerns will go away,” he insists. “I don’t think that there’s anything that will stop the future adoption of cloud services.”

Ensuring security in a cloud-based environment will no doubt be top of the list of issues delegates will be discussing at the Government CIO Summit 2011 which takes place at the Landsdowne Resort, Leesburg, Virginia from 8-10 June 2011.

This closed-door summit, hosted by GDS International, also features some of the leading voices in the government CIO sector, including Bernard Mazer, CIO Department of the Interior; Vance Hitch, CIO Department of Justice; Rick Holgate, CIO Alcohol Tobacco and Firearms (ATF); Henry Chao, CIO Health and Human Services, and Sean Moulton, Director of Federal Information Policy, Office of Management and Budget.

Along with cloud computing, other key topics for discussion include secure access and visibility for data centre performance, security and compliance and federal financial management performance imperatives.

Government CIO Summit 2011 is an exclusive C-level event reserved for 100 participants that includes expert workshops, facilitated roundtables, peer-to-peer networks and co-ordinated meetings.

For more information, visit http://www.governmentciosummit.com

Contribution Article By GDS International

———————————————————————————————————————————————–

GDS International is a leading business-to-business events company. We offer financial, healthcare, IT service management, telecoms and oil and gas summits for senior executives throughout the Asia Pacific, Africa, China, Europe, North America and Russia markets. Our value proposition is simple: we deliver real results. And we’re very good at it. http://www.gdsinternational.com

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

THE FUTURE OF BIG DATA AND DNS ANALYTICS

THE FUTURE OF BIG DATA AND DNS ANALYTICS

Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…