Knowledge Sharing Platform for Public Cloud Professionals

Peer2Peer Cloud

  • Home
  • Cloud Fundamentals
Cloud Fundamentals

Top CISO concerns regarding cloud security challenges in 2019

Sam - March 31, 2019

ciso-top-concern-public-cloud
Share if you liked this post

Cybersecurity risks are a growing concern for CISO’s with increased public cloud adoption, proliferation of devices and shadow IT.

In 2019, CISO’s have growing concerns around public cloud security challenges, data breaches, security policy lapse and shortage of cybersecurity skillsets. According to a recent study, the biggest concern that CISO’s have around Public Cloud is “Uncontrolled Growth” within their enterprises.

Public Cloud offers organizations agility, faster time to market and several other benefits. Organizations of all sizes and shapes are adopting cloud to accelerate their digital transformation plans. increasingly various business teams are making their own technology decisions without involving their IT and Security teams.

This uncontrolled deployment of public cloud with minimal governance and security policies enforcement (often referred to as “Shadow IT”) is the biggest concern for CISO’s in 2019.

Traditional security measures don’t work anymore

In the traditional model, datacenters were protected by enforcing a perimeter security to block any outside attack through firewalls, secured gateways, etc.

Perimeter based security intrinsically trusts everyone on the “inside” of the network. As traditional constructs are changing with more employees accessing corporate network resources (applications and data) remotely, perimeter security measures are becoming less effective.

Companies are opting for Hybrid cloud where corporate assets in public and private cloud are communicating with each other. Despite security challenges, Containers are growing in popularity offering software development teams the ability to deliver their applications to market quickly.

All of these technologies are creating a wider surface area for cyber criminals to find security vulnerabilities in the trusted network.  These malicious actors (hackers) are always searching for any gaps that exists in the trusted network and once they gain a foothold, they will move laterally through internal networks into public cloud for unfettered access to applications and data. 

Lessons learnt from Top 10 Data Breaches

Some of the largest breaches had intruders traversing the internal network for months without detection. The infographic (courtesy twitter: @tscadvantage) below depicts Top 10 Data Breaches over the last 5 Years:

 

Top 10 Data Breaches - Peer2peercloud.com

 

OPINION POLL

[poll id=”4″]

 

Suggested Read:

3 things CISO’s should make sure business stakeholders understand about cloud security

 

Relevant Tweets:

 

Top 5 Cyber Threats 2019
{#infographic} @jodelak#Security #cybersecurity #security #infosec #malware #CyberAttacks #threats #infosecurity #Malware #CISO #DDoS@antgrasso @KaiGrunwitz @AnsgarKaschel @TopCyberNews @cybersecboardrm @reach2ratan @CyberIntelFirst @alvinfoo @vg_fco pic.twitter.com/d77NLs2BwA

— Giuliano Liguori (@ingliguori) March 31, 2019

 

The Ponemon Institute estimates the average global cost of a #databreach is $3.62 million, or about $141 per record. Costs in the US are nearly twice that:https://t.co/Fxyn55gk5h#ITSecurity #CyberSecurity #cybercrime #CIO #csuite #CISO #GDPR pic.twitter.com/35auBOyNlO

— Marc Wilczek (@MarcWilczek) March 31, 2019

“Cybersecurity: How to protect personal and health information from a cyberattack,” via @vtdigger: https://t.co/oi4m1URUgX #CyberSecurity #CyberRisk #CyberThreats #CyberAttack #CyberCrime #CyberAware #RiskManagement #infosec #DataSecurity #DataProtection #DataPrivacy #phishing

— TSC Advantage (@TSCAdvantage) October 29, 2018

Tags | CISO, cloud security, cybersecurity
 0 0

Sam

You Might Also Like

CISO Security Concerns Cloud Fundamentals

3 things CISO’s should make sure business stakeholders understand about cloud security

February 19, 2019

Leave a Reply Cancel Reply

Connect with:
LinkedIn

Your email address will not be published. Required fields are marked *

Previous Post Domino’s remarkable digital transformation story…
Next Post What are Containers? Simplified for Beginners

HOT KEYWORDS PEOPLE ARE SEARCHING

AI amazon web services Artificial Intelligence aws azure azure hybrid benefits CISO cloud benefits cloud computing cloud economics cloud foundations cloud principles cloud security cloud SLA containers cost savings cybersecurity DevOps digital transformation Docker Swarm domino pizza Google kubernetes Microsoft microsoft azure public cloud

POPULAR POSTS

  • What you should know about Cloud Service Level Agreements
  • What is Composite SLA for cloud services?
  • What are the 3 types of cloud computing models?
  • Capital Expenditure (CapEx) vs Operational Expenditure (OpEx)
  • What are Containers? Simplified for Beginners

About Us

About Us

Peer2Peer Cloud is a one stop knowledge sharing and peer networking platform for Cloud Professionals.

CONTACT US

ceo@peer2peercloud.com

Find us on Facebook

TOPICS & KEYWORDS

AI amazon web services Artificial Intelligence aws azure azure hybrid benefits CISO cloud benefits cloud computing cloud economics cloud foundations cloud principles cloud security cloud SLA containers cost savings cybersecurity DevOps digital transformation Docker Swarm domino pizza Google kubernetes Microsoft microsoft azure public cloud