01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

consider the metrics and operations adjustments that will allow them to demonstrate the<br />

enhanced value of the cloud beyond just the bottom line. If you are trying to get exec/C-level buy<br />

in, consider the following:<br />

How will you measure the speed of introducing new capabilities?<br />

Are new areas of value or product enhancement made possible through cloud services?<br />

How will the organization measure and control usage to hit your cost targets?<br />

How do you know whether your organization is getting what you have contracted for from cloud<br />

providers?<br />

Do you have a mechanism for commercial coverage of the organization when things go wrong?<br />

Protect your organization and secure the cloud<br />

Organizations will often “upgrade” in some areas of basic security (perimeter, basic request<br />

hygiene) when making the move to well-known cloud providers. How the overall security posture<br />

is affected depends heavily on the level of diligence that goes into onboarding new cloud<br />

providers. Implementing critical technical measures like the Cloud Access Security layer and<br />

policy around how the cloud is procured and technically implemented should drive basic control<br />

requirements.<br />

As the number of cloud providers scales in the environment, your organization needs to assess<br />

and document them based on how much your organization depends on a given service and the<br />

sensitivity of the data those services will hold. Services that are prioritized higher on these two<br />

fronts should have increased organizational scrutiny and technical logging integration in order to<br />

maintain the overall defensive posture of the company.<br />

Finally, as with any other technology trend, the missteps in making the transition to business and<br />

consumer cloud services have received outsized coverage. Take the time to dive into the “how’s”<br />

and “whys” of early cloud breaches to avoid becoming a potential victim—after all, when it comes<br />

to security, it is better to learn from someone else’s (unpleasant) experiences!<br />

About the Author<br />

Scott joins McAfee from his previous role at Cisco, as the Technology<br />

and Cybersecurity Director in Middle East and Africa with a proven track<br />

record of delivering sales results across the Middle East, Africa and<br />

Europe. His technology and solution orientated sales experience spans<br />

the last 19 years working ostensibly in this market. Prior to that, 8 years<br />

ago, Scott ran cloud sales and operations for BMC software in EMEAR<br />

and has always enjoyed working in the leading-edge technology<br />

markets to find more optimal ways to take these respective products to<br />

market

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!