General security

Benefits and challenges of securing your cloud data

May 3, 2019 by Jeff Peters

On this episode of the Infosec Cyberspeak podcast, Andrew Howard, chief technology officer for Kudelski Security, discusses the security risks that can arise when your company finally makes the full transition to a digital existence in the cloud.

In the podcast, Howard and host Chris Sienko discuss:

– Can you tell us a little bit about your security journey? (1:35)
– What are some of the big projects you’re currently working on at Kudelski Security? (3:05)
– Should everyone be thinking about migrating to the cloud, or are there some organizations where it isn’t appropriate? (4:35)
– How has popular thought around cloud-hosting changed in recent years? (5:40)
– What exactly do most companies transfer to the cloud? (6:40)
– Is cloud migration typically done in stages? (7:50)
– What are the benefits of a cloud-based business? (9:45)
– What effect will GDPR and CCPA have on cloud migration? (10:55)
– What are some reg flags to watch out for when migrating data to the cloud? (12:00)
– How does secure authentication and identity management factor into the cloud? (13:30)
– What are some of the most common mistakes companies make? (14:35)
– Do you have any budget strategies to combat inevitable cost overruns? (16:15)
– What are the most important security strategies to ensure your assets are protected? (16:55)
– How are job roles changing due to cloud services? (18:05)

Additional Resources

Join us in the fight against cybercrime:

Special offer for Infosec Cyberspeak listeners:

Check out Infosec’s scholarship program:

About Infosec Cyberspeak Podcast

Knowledge is your best defense against cybercrime. Each week on Infosec Cyberspeak, industry thought leaders and host Chris Sienko arm you with the latest security awareness and education best practices. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.

Posted: May 3, 2019
Articles Author
Jeff Peters
View Profile

Notice: Undefined index: visitor_id12882 in /www/resourcesinfosecinstitute_601/public/wp-content/plugins/infosec-user-info/infosec-user-info.php on line 117