We’ve lined up a brilliant panel of leaders in tech for insights on Cloud Security!
How can enterprises ensure maximum business value with the right cloud strategy? Click https://t.co/uEpShiE2Zs to join the #Tweetchat “#Cloud security: A cyber-forward strategy,” Nov 9 at 4 PM CET. #STinsights pic.twitter.com/6GE7kv6GkS— CIO Straight Talk (@CIOStraightTalk) November 5, 2021
So let’s begin this insightful journey with our first question!
Follow @CIOStraightTalk and join a Twitter discussion with industry leaders on “#Cloud security: A cyber-forward strategy”. Tune in to #STinsights at 4 PM CET on November 9. Click https://t.co/uEpShiE2Zs to add the event to your calendar. #Tweetchat pic.twitter.com/UR0DToReR6— CIO Straight Talk (@CIOStraightTalk) November 9, 2021
Q1 Pandemic situation has accelerated the speed and size of cloud adoption. Most organizations are expanding their use of cloud to maintain their competitive edge and better interact with customers. @CIOStraightTalk #STinsights https://t.co/XWR9NW3iG4— Sanjay Katkar (@sanjaykatkar) November 9, 2021
Accelerated cloud adoption is also leading to more complexities. How can businesses deal with this for a smooth transformation journey?
Q1. Cloud Security is top of mind for our organizations. Some stats from MSFT CISO Tracker survey, April 2021: Cloud Security is Security leaders' #1 priority for investment. Ensuring cloud resources workloads and apps are securely configured is the biggest concern. #STinsights https://t.co/wyUoUGb58Y— Mandana Javaheri (@Securityinstyle) November 9, 2021
📌 ZERO-Trust and a thorough understanding of the shared responsibilities are essential to address the challenges of multi- and hybrid cloud.— Dr. ir Johannes Drooghaag (JD) 🛡 #ZeroTrust (@DrJDrooghaag) November 9, 2021
Knowing the various SLAs by heart is essential, eliminate all assumptions!#STinsights @CIOStraightTalk #Cloud #CyberSecurity https://t.co/Et9HYPXRgj
Conistency matters: Point solutions per provider are practically impossible to manage. When it comes to #DDoS attacks, a 360-degree approach handling all types of attack vectors, across all OSI layers, and being platform agnostic across the entire IT landscape is paramount.— Marc Wilczek (@MarcWilczek) November 9, 2021
With great power, comes great vulnerabilities. Is that true? Let’s find out!
While there are many but 3 aspects are Analysis of any data from any source, at any scale, Real-time insights & Analytics that empower teams to act would give successful path for Multi/Hybrid cloud adoption. #STinsights #DynamicCyberSecurityWithHCL @CIOStraightTalk— Syam Thommandru (@ntsyam) November 9, 2021
(1/2) It surely has! In 33% of #DDoS attacks, attackers rely on cloud resources. Instances of big #cloud providers are being abused frequently as witnessed by @Link11GmbH. #STinsights @CIOStraightTalk— Marc Wilczek (@MarcWilczek) November 9, 2021
The right cloud strategy will both empower your business and keep it secured too.
📌 The acceleration of cloud adoption has led to a shift towards Supply Chain Attacks.— Dr. ir Johannes Drooghaag (JD) 🛡 #ZeroTrust (@DrJDrooghaag) November 9, 2021
This underlines the importance of Zero-Tolerance Zero-Trust throughout the entire digital supply chain even further!#STinsights @CIOStraightTalk #Cloud #CyberSecurity #ZeroTrust https://t.co/ZbMueH7qbe pic.twitter.com/b36osay2OW
Q4 Cloud enables reliable and faster disaster recovery and backup solutions in a cost-efficient manner. This minimizes downtime and loss of productivity as enterprises are able to access data quickly after a failure. @CIOStraightTalk #STinsights— Sanjay Katkar (@sanjaykatkar) November 9, 2021
Cloud security is critical not just for business continuity, but also business reputation.
(1/2) Ensuring business continuity needs #DDoS protection, just as it needs backups. The no. of DDoS attacks have seen a 140% surge since 2019. The maximum attack bandwidth has more than doubled. In Q3/2021, the largest attack mitigated by @Link11GmbH hit an agreggated 2.55 Tbps.— Marc Wilczek (@MarcWilczek) November 9, 2021
Always the best is to Encrypt your data both at rest and consider phased migration with clear understanding of Compliance Requirements.@CIOStraightTalk #DynamicCyberSecuritywithHCL #STinsghts https://t.co/qNciLearvk— Syam Thommandru (@ntsyam) November 9, 2021
(1/2) The regulatory environment has become increasingly complex, with varying industry and geographical standards that are constantly evolving. There are on average 220 daily updates from over 1000 global regulatory agencies. #STinsights https://t.co/znJN3Dtjlk— Mandana Javaheri (@Securityinstyle) November 9, 2021
Thank you very much to our expert panel for sharing such valuable information! Stay tuned for more interesting and informative tweet chats!
(2/2) Know your compliance posture for the regulations you need to comply with. Use tools to identify actions needs to be taken to help meet the obligations. Continues assessment and monitoring of data protection controls. Improve your posture to reduce risk #STinsights https://t.co/znJN3Dtjlk— Mandana Javaheri (@Securityinstyle) November 9, 2021
A big thank you to our Power Panel for their #STinsights and those who joined us for this exclusive discussion. #Tweetchat #DynamicCyberSecurityWithHCL@DrJDrooghaag @Securityinstyle @MarcWilczek @sanjaykatkar @ntsyam pic.twitter.com/nQJUtzm8fL— CIO Straight Talk (@CIOStraightTalk) November 9, 2021