- Leveraging the cloud introduces IT professionals to a new world that they are tasked with securing.
- With many cloud vendors proposing to share the security responsibility, it can be a challenge for organizations to develop a clear understanding of how they can best secure their data off premises.
Our Advice
Critical Insight
- Cloud security is not fundamentally different from security on premises.
- While some of the mechanics are different, the underlying principles are the same. Accountability doesn’t disappear.
- By virtue of its broad network accessibility, the cloud does expose decisions to extreme scrutiny, however.
Impact and Result
- The business is adopting a cloud environment and it must be secured, which includes:
- Ensuring business data cannot be leaked or stolen.
- Maintaining privacy of data and other information.
- Securing the network connection points.
- This blueprint and associated tools are scalable for all types of organizations within various industry sectors.
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
9.3/10
Overall Impact
$26,889
Average $ Saved
56
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
Federal Judicial Affairs
Guided Implementation
10/10
$50,000
120
There has not been any bad experience. Working with Ian has been a great experience.
Rehabilitation Hospital of the Pacific
Guided Implementation
9/10
$3,779
44
Bank of Jamaica
Guided Implementation
9/10
N/A
5
Best - Very useful and detailed advice given.
Renown Health
Guided Implementation
10/10
$61,999
47
BDO Digital, LLC
Guided Implementation
9/10
N/A
2
Jeremy was wonderful to speak with! He was energetic, positive, passionate, and very knowledgeable about the topics I needed help with.
Workshop: Build a Cloud Security Strategy
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Module 1: Define Your Approach
The Purpose
Define your unique approach to improving security in the cloud.
Key Benefits Achieved
An understanding of the organization’s requirements for cloud security.
Activities
Outputs
Define your approach to cloud security.
- Defined cloud security approach
Define your governance requirements.
- Defined governance requirements
Define your cloud security management requirements.
Module 2: Respond to Cloud Security Challenges
The Purpose
Explore challenges posed by the cloud in various areas of security.
Key Benefits Achieved
An understanding of how the organization needs to evolve to combat the unique security challenges of the cloud.
Activities
Outputs
Explore cloud asset management.
Explore cloud network security.
Explore cloud application security.
Explore log and event management.
Explore cloud incident response.
Explore cloud eDiscovery and forensics.
Explore cloud backup and recovery.
- Understanding of cloud security strategy components (cont.).
Module 3: Build Cloud Security Roadmap
The Purpose
Identify initiatives to mitigate challenges posed by the cloud in various areas of security.
Key Benefits Achieved
A roadmap for improving security in the cloud.
Activities
Outputs
Define tasks and initiatives.
Finalize your task list
- Defined task list.
Consolidate gap closure actions into initiatives.
Finalize initiative list.
Conduct a cost-benefit analysis.
- Cost-benefit analysis
Prioritize initiatives and construct a roadmap.
- Roadmap
Create effort map.
- Effort map
Assign initiative execution waves.
Finalize prioritization.
Incorporate initiatives into a roadmap.
Schedule initiatives.
- Initiative schedule
Review your results.