Rethink cloud security to get ahead of the risk curve
Enterprise security has never been easy, but the rapidly expanding use of cloud applications is adding daunting layers of complexity – and risk – to the job. Since information drives the business, simply locking down cloud applications isn’t a realistic option.
To compete in any industry, you need to open your organization up to customers, partners, vendors and mobile employees – all of whom might consider you their cloud. Open access isn’t a choice in the 21st century; it’s an imperative, and cloud is part of that.
What organizations need to catch up on, however, is making sure this new way of doing business is as secure, or even more secure, than your “on the ground” business. During this session, we’ll focus on how cloud computing demands a different approach, specifically ways to automatically identify, quantify and manage the risk to cloud-based resources presented by individuals that don’t – or shouldn’t - have access to them.
We’ll outline how to harness the Big Data in the trillions of access relationships in the cloud to see what’s really going on. By applying predictive analytics to Big Data, companies can create heat map visualizations that uncover anomalous patterns of activity that alert security personnel that they may have a problem. Gartner predicts that by 2016, 40 percent of enterprises will actively analyze at least 10 terabytes of data for Information Security intelligence. Combining big data and analytics creates the missing business intelligence for IT security, specifically: Where is the access risk in my organization? What’s causing it and how do I need to address it?
After this session, attendees will be able to:
- outline the steps needed to control access risk to the cloud;
- identify how to leverage technology to facilitate managing cloud-related access risk.
- develop a strategy to automate information security and identify patterns not discernible to the naked eye;
- prioritize their security steps, strengthen controls in times of highest risk, and continuously update threat definitions;