Cloud Security Still Top Priority For Finance Execs

Cloud Security Still Top Priority For Finance Execs

In the wake of the recent Sony PlayStation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.

The web has become a playground for hackers and malcontents eager to phish, defraud and steal wherever and whenever they can. Policing this landscape is a logistical nightmare, and battle lines are being drawn and redrawn many thousands of times a day – which perhaps hints at why many of us are still uncomfortable with the idea of storing sensitive data in third-party environments.

That unease is only likely to have increased following the recent data breach in Sony’s PlayStation network, which compromised the personal data of more than 100 million customers of the Japanese electronics giant. This and other high-profile security snafus, such as a massive outage at Amazon’s cloud computing centre, have caused some businesses to put the brakes on plans to move their operations into the cloud.

There still exists a level of concern over the cloud,” admits Crawford del Prete, Executive Vice President of Worldwide Products and Chief Research Officer at research giant IDC. “There is a need for quite a bit more maturation in terms of people’s experiences with it. When we conduct our surveys, we find that security and uncertainty around what data to put into the cloud are consistently at the top of people’s concerns.”

In a 2010 report by the Ponemon Institute in California, a mere 33 percent of the 1000 IT professionals surveyed trusted the security of cloud-hosting data centres. What’s more, such skepticism seems justified: in a more recent study released last month, Ponemon found that providers of cloud computing resources are not focused on security in the cloud. Rather, their priority is delivering the features their customers want, such as low-cost solutions with fast deployment that improve customer service and increase the efficiency of the IT function. “As a result,” says the report, “providers in our study conclude that they cannot warrant or provide complete assurance that their products or services are sufficiently secure.

Such findings highlight a concern many technology executives share: will external software providers have the firm’s best interests at heart? “If we pick a vendor to host our stuff, are they going to have the right maturity, the right service levels, the ability to pay the same amount of attention as we do to our own environments today?” asks Richard Scott, CTO at Guardian Life Insurance Company. “Are we going to get the same or better or a guaranteed level of service?”

Nonetheless, given that a report published by the Centre for Economics and Business Research suggests cloud computing will allow financial services business to break free from the shackles of old legacy IT, generate some US$250 billion and create a staggering 207,000 jobs, technology and finance executives – along with their colleagues in legal, business and other related departments – will need to work together to eliminate such concerns. Much of this work has already begun: CEBR’s Cloud Dividend report predicts that 60-80 percent of all businesses in the banking, financial and business services sector will have adopted some form of cloud computing by 2015.

As such, as technology evolves – and despite the potential for further security breaches in future – comfort levels with the cloud environment are likely to increase in time as security concerns are addressed. “The future of the cloud will be driven forward by technology and comfort levels, but it will also be pulled back by technology and comfort levels,” says del Prete. “There will be security breaches where all of a sudden people will quickly lose faith in the cloud, and then they will go back to it and slowly become more comfortable again.”

Scott, too, is optimistic that these are just kinks that will work themselves out with time. “As the technology evolves and security techniques become tried and tested, these concerns will go away,” he insists. “I don’t think that there’s anything that will stop the future adoption of cloud services.”

Ensuring security in a cloud-based environment will no doubt be top of the list of issues delegates will be discussing at the Government CIO Summit 2011 which takes place at the Landsdowne Resort, Leesburg, Virginia from 8-10 June 2011.

This closed-door summit, hosted by GDS International, also features some of the leading voices in the government CIO sector, including Bernard Mazer, CIO Department of the Interior; Vance Hitch, CIO Department of Justice; Rick Holgate, CIO Alcohol Tobacco and Firearms (ATF); Henry Chao, CIO Health and Human Services, and Sean Moulton, Director of Federal Information Policy, Office of Management and Budget.

Along with cloud computing, other key topics for discussion include secure access and visibility for data centre performance, security and compliance and federal financial management performance imperatives.

Government CIO Summit 2011 is an exclusive C-level event reserved for 100 participants that includes expert workshops, facilitated roundtables, peer-to-peer networks and co-ordinated meetings.

For more information, visit http://www.governmentciosummit.com

Contribution Article By GDS International

———————————————————————————————————————————————–

GDS International is a leading business-to-business events company. We offer financial, healthcare, IT service management, telecoms and oil and gas summits for senior executives throughout the Asia Pacific, Africa, China, Europe, North America and Russia markets. Our value proposition is simple: we deliver real results. And we’re very good at it. http://www.gdsinternational.com

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…