The Power of Platforms: Driving Innovation through a Full-Stack Approach

The Power of Platforms: Driving Innovation through a Full-Stack Approach

It’s the world of AI that we live in currently, as everything around us is becoming automated and digitalized. The digital revolution or whatever buzzword you use to define it is upon us, and as it was predicted by many, platforms have an imperative influence
How Norway’s Fatland beat back ransomware thanks to a rapid backup and recovery data protection stack

How Norway’s Fatland beat back ransomware thanks to a rapid backup and recovery data protection stack

The next BriefingsDirect strategic storage and business continuity case study discussion explores how Norway’s venerable meat processing business, Fatland, relied on rapid backup and recovery solutions to successfully defended against a nasty ransomware attack. The comprehensive backup and recovery stack allowed Fatland’s production processing systems to snap back to use after only

Secure Business Agility

As cloud continues to accelerate business delivery and shift away the balance of power from IT and InfoSec to business users, organizations need to find ways to ensure that security is part of a business process rather than an afterthought. Today’s organizations are transacting some of their most valuable data and services in the cloud. While the promise of instant availability, convenience and cost are very attractive the damage to brand, reputation and trust could be irrevocable to businesses if security is not built in.

Many CISOs and InfoSec teams continue to struggle with the new order in which business users have unprecedented freedom over how they work, what devices and applications they use to accomplish their work and from where they work. Most want to partner with their business users to figure out optimal ways to engage in cloud services securely but most don’t think of how IT security integrates into business processes. The result is that we often see burdensome processes within organizations where business users have to take extra steps to categorize data or to register new cloud security services. And, in doing so InfoSec and IT might be creating a bigger risk where business users will further make a run around InfoSec and IT. When business users are pressed for time extra processes become doubly burdensome.

Insider Threat Vectors

Over the last year there has been a rise in both accidental and mis-intentioned insider threat vectors. With personal and business lines of work so blurred it’s easy for business users to accidentally drag and drop the wrong attachment into an email, or in the spur of a moment accidentally post a message that alludes or pertains to confidential company information, or post a regulatory-related file on an unsecured file share site in order to make it easier to work on.

The key to secure business agility in the cloud is through ongoing dialog and automation.

evolution-tech

Ongoing dialog:

  • Given the fast changing pace of today’s business environments IT and InfoSec and business users need to have constant check-ins to ensure a fruitful relationship. Needs are going to change rapidly as increasingly more services are migrated to the cloud.
  • Security processes need to be designed to be business intuitive. If business users are going to required to own the data classification process, categories should be few and very intuitive. And, so, too the process for the onboarding of new cloud services.

Automation:

There are now a slew of cloud security services that enable business users to remain agile while preserving security in a less intrusive way.

  • Emerging data security toolsets leverage big data analytics and machine learning to automate the data classification process. Such toolsets should be explored within the business culture, geographies and trialed before going broadscale.
  • Self service portals can be designed with a standard set of security profiles built in. This helps not only automate the cloud security provisioning process but also allows for consistent implementation company-wide and across the many different types of cloud services a company many engage.

As we enter into 2016, I encourage IT and business users to find more meaningful ways to ensure securely accelerate cloud services.

By Evelyn de Souza

Evelyn de Souza

Evelyn de Souza focuses on developing industry blueprints that accelerate secure cloud adoption for business as well as everyday living. She currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn was named to CloudNOW's Top 10 Women in Cloud Computing for 2014 and SVBJ’s 100 Women of Influence for 2015. Evelyn is the co-creator of Cloud Data Protection Cert, the industry's first blueprint for making data protection "business-consumable” and is currently working on a data protection heatmap that attempts to streamline the data privacy landscape.

TOP ARCHIVES

How Will Artificial Intelligence Really Impact Jobs?

How Will Artificial Intelligence Really Impact Jobs?

Artificial Intelligence Jobs Hamilton is my favorite Broadway musical. The show follows the life of one of America’s founding fathers, ...
How Automation is Changing the Digital Revolution

How Automation is Changing the Digital Revolution

Automated Digital Revolution While the exact moment it began is up for debate (opinions vary wildly on the matter, from ...
GDPR Compliance

Avoid Breaking the Bank to Protect Your IT by Automating These 3 Departments

Protect Your IT by Automating In the big data world, companies have more information than any human (or team of ...
Dean of Big Data’s Favorite Infographic Picks of 2018

Dean of Big Data’s Favorite Infographic Picks of 2018

Big Data Infographics My last University of San Francisco School of Management class of the semester is coming up this ...
The Cloud Debate - Private, Public, Hybrid or Multi Clouds?

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

The Cloud Debate Now that we've gotten over the hump of whether we should adopt the cloud or not, "which ...
Simplify Your Communications Migration Options: Private & Public Cloud Solutions

Simplify Your Communications Migration Options: Private & Public Cloud Solutions

In this post, we tackle another common challenge in migration planning – the decision to deploy sites and users on either multi-tenant or “public” cloud solutions versus dedicated, virtualized systems in “private” cloud solutions. In the communications industry, PBX vendors ...
Cloud Concerns - Strong Passwords and Data Encryption

Cloud Concerns – Strong Passwords and Data Encryption

Strong Passwords and Data Encryption For all the concerns and buzz surrounding cloud computing, some companies are still not buying in. The benefits that come from using the cloud are already well documented, and while adoption rates have risen in ...
Cloud Monitoring and Data Performance Services

Cloud Monitoring and Data Performance Services

CLOUD PERFORMANCE MONITORING The Dynamic State Of Cloud Performance Monitoring Monitoring and evaluation in cloud computing are essential processes. They determine whether a company’s applications on the cloud are effective, safe, and efficient. They also help eliminate failures in cloud computing’s ...