Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Developing an Effective Cloud Security Strategy: Guidance for Public Sector CIOs

by Jenna Sindle
November 7, 2018
in Cybersecurity
Reading Time: 3 mins read
A A
Cloud security strategy
Share on FacebookShare on Twitter

You’ve finally done it! You’ve migrated to the cloud and your agency is poised to reap all the benefits that come with a move to the cloud – agility, cost savings, and economies of scale. But what about your security strategy? 

According to cloud security expert Lauren Burnell, building a comprehensive cloud security strategy is often left off the to-do list during a migration. “While some security features are baked into the cloud, is it the level of security that your agency – and its assets –  require?” she posed in a recent conversation. 

While public cloud is more secure than a traditional data center in many respects because a layer of security is built-in from the cloud provider, assets on the public cloud are still being breached. In fact, according to research by FireEye Mandiant, 15 percent of all its incident response work involves assets housed in a public cloud. 

So, if they cloud is more secure, why is it still getting hacked?

For Burnell, one of the biggest reasons is that people don’t understand the cloud shared security model. “While cloud service providers are addressing some of organizations’ traditional security pain-points, securing data is the cloud customer’s responsibility.” she noted. “Cloud computing brings new challenges and an increased need for situational awareness. Organizations need to have visibility and centralized security across their cloud and hybrid infrastructure.”  Chief among these new challenges are shadow IT, ephemeral assets, and the fact that the public cloud itself broadens the attack surface available to hackers. 

However, Burnell encourages public sector CIOs not to use these security concerns as reasons to shy away from migrating to the cloud. Instead she urges these IT leaders to “embrace the cloud, but to also embrace a comprehensive cloud security strategy.”

To help guide public sector CIOs in addressing cloud security challenges, Burnell will be discussing the key steps to building a comprehensive cloud security strategy in a webinar on Wednesday, November 14th 2018 at 2PM (EST).  From the critical role that analytics play in detecting cloud compromises to the essential elements of a cloud security strategy, Burnell is ready to share her insights and expertise to help public sector CIOs navigate this complex topic.

Register for the webinar here. Or subscribe to GTI to access the webinar summary and playback here.

Tags: Cloud CompromiseCloud Incident ResponseCloud SecurityFireEye Cloud SecurityFireEye Mandiant Incident ResponseLauren BurnellPublic Cloud SecuritySecuring Cloud Infrastructure

RELATED POSTS

Cloud Vulnerability

Cloud

Arming Federal Agencies Against Cloud Vulnerability

August 3, 2021
Cloud security platforms
Cloud

Improving Your Agency’s Security Through Cloud Security

January 19, 2021
City and County of San Francisco
C-Suite Directions

City and County of San Francisco Move to Cloud to Bolster Security

November 5, 2020

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5370 shares
    Share 2148 Tweet 1343
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3
  • Arizona Department of Economic Security Combats Unemployment Benefits Fraud

    61 shares
    Share 24 Tweet 15

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us