25.01.2018 Views

CIO & LEADER-Issue-10-January 2018 (1)

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

COLUMN<br />

By Rahul Kumar<br />

Cloud<br />

Security:<br />

A Case For<br />

Effective<br />

Encryption<br />

Having an effective encryption and key<br />

management solution is vital to the<br />

success of any security strategy<br />

I<br />

It has not yet reached epic proportions, but the number of organizations<br />

adopting cloud-based technologies is growing dramatically.<br />

Organizations of all sizes across industries are turning towards<br />

cloud-based infrastructure and cloud computing for better scalability,<br />

accessibility and a collaborative work environment. However,<br />

after moving to the cloud, many organizations mistakenly assume<br />

that it is the role of the cloud service provider (CSP) to secure data<br />

and ensure compliance.<br />

Even though the CSP may provide services for protecting data,<br />

organizations must understand the fact that virtual environments<br />

are not always fully secure and that they—organizations—too have a<br />

role in protecting the security and privacy of their data. Remember,<br />

the liability to notify those affected and remediate damages is on you<br />

should your company suffer a data breach!<br />

The author is Country Manager for<br />

India at WinMagic<br />

Knowing the levels of responsibility<br />

does matter<br />

When it comes to choosing between cloud infrastructure and cloud<br />

computing, companies must make the decision backed by a plan to<br />

implement the right security solution. The solution should effectively<br />

address issues such as securing data, managing risk related<br />

to unauthorized access, and meeting compliance and regulatory<br />

requirements. Remember, the cloud is subject to the same threats<br />

12 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!