ALL >> Computers >> View Article
Cloud Security Innovators – Q+a With George Do, Ciso, Equinix
We are incredibly excited to feature a Q+A session with George Do, CISO of Equinix, as the first in our new monthly Cloud Security Innovators blog series. Every month we will interview a new maverick in the cloud security space who is taking an innovative approach to securing data and systems as business increasingly moves to the cloud
Q: How do you view the cloud? Friend? Foe? Necessary Evil?
A: Friend – embrace the cloud or get left behind.
Q: What is the top security challenges surrounding cloud services?
A: The security posture of vendors, specifically the protection of customer data and reputation.
Q: Are there any advantages to using cloud apps as it relates to security
A: A big benefit we see is availability – we have access from anywhere from almost any device at any time.
Q: For your industry, are there any specific privacy, regulatory or compliance requirement that make it more challenging to embrace the cloud?
A: Yes absolutely. Various (foreign) government regulations have strict requirements ...
... on the protection of data that are not friendly to cloud services. Separately, high-security environments are nervous about going to cloud based on their own risk profile. Cloud companies need to improve and attest to their security posture before nervous customers can come around.
Q: There is lot of press around “encryption” as the silver bullet to address security issues relating to the cloud? Do you see “encryption” as the panacea?
A: Encryption is one big piece of the solution only – certainly not a panacea. There are many other pieces that need focus and attention as well such as access control, reputation/brand protection, and security infrastructure.
Q: As you look into your crystal ball, how will cloud security evolve over the next 2-3 years?
A: This will be very interesting. I think companies will be slow to improve security unless there are significant headlines on data compromises / hacks. We’re seeing some of this now (think Heartbleed). In the end I think the cloud industry will get there, but it will take some time.
Q: It is said that every journey begins with a single step. What practical advice would you give to your peers as it relates to Cloud Security?
A: Step 1 is to get visibility as most companies don’t even have that right now. Then you need a program to manage the enforcement of policy that’s customized to the business.
Q: Where do you go for information regarding Cloud Security? Any particular websites, blogs, visionaries and publications you find particularly useful
A: Skyhigh, SANS, US-CERT, and various security blogs.
Q: Moving beyond cloud, what’s the big concern for CISOs today – ie what kept you up last night?
A: The shift of data and users to cloud. Overall, I’m concerned with the speed of technology and lack of security architecture at various layers.
Q: What drives the compliance requirements for your business and how to ensure Cloud Compliance?
A: It’s really the business that drives compliance at Equinix such as SOX and ISO27001. Ensuring compliance in the cloud is a new challenge for us as it is with most other organizations. We recognize that and are beginning to put focus on it.
Author :
Adam Chriss, a proud contributing author and a freelance writer with interests in various subjects and writes articles on several subjects including Cloud Technology, Cloud Security, Cloud Data Security, Cloud Compliance etc,.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech