Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Courses
        • Understanding the New Executive Buying Committee
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Courses
            • Understanding the New Executive Buying Committee
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How Compliance and Multi-Cloud Impact Cybersecurity for Data Stored in the Cloud
Cloud

How Compliance and Multi-Cloud Impact Cybersecurity for Data Stored in the Cloud

Chris HughesBy Chris HughesMarch 30, 20232 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email

In this moment, excerpted from Acceleration Economy’s Cloud Data Strategy digital event, which took place on March 23, Acceleration Economy analyst and CISO Chris Hughes explains the areas of focus security leaders must consider when attempting to safeguard data in the cloud.

Highlights

00:08 — Security leaders often have limited time and resources when it comes to attempting to secure their environments. When looking at the industry they are in, the types of data they are responsible for, and the regulatory environments being used to drive focus, leaders can take a look at their own environments to understand the applicable frameworks they may have to comply with.

Cloud Data Strategy, Analytics & Governance_featured
Guidebook: Insights Into the Why & How of
Cloud Data Strategy, Analytics, & Governance

00:39 — Once a security leader understands the environment they are operating within — and the applicable compliance frameworks — they can determine the best way to safeguard the data and the environments it exists within.

00:53 — Oftentimes when users adopt cloud, and especially multi-cloud, “they haven’t really necessarily become proficient in one cloud, and they start moving to…several clouds….that’s where things get hairy,” says Chris. “We’ve seen over the course of the past decade or so, most cloud data breaches are due to customer misconfiguration.”

01:09 — Chris suggests that “bringing the workforce along in the journey is key.” He also notes that he believes “everyone is in multi-cloud.” Shifting gears, Chris says that when talking about artificial intelligence (AI) as providers, understanding how it is being used by teams, what services they plan to use, and if they are covered underneath the regulatory frameworks that teams are expected to abide by is crucial. He concludes by asking, “What configurations can you take advantage of to try to safeguard that data?”


To gain more insights on the hows and whys of a cloud data strategy’s impact on business processes, view the Acceleration Economy Cloud Data Strategy Digital Summit, which is now available on-demand. Register for your free streaming pass here.

CISO Cloud Cloud Database Cybersecurity data Featured Highlights
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

How to Implement Zero Trust For Remote Endpoints in the Enterprise

May 28, 2023

How Celonis Makes Process Mining More Accessible: Embracing Generative AI, Partners

May 27, 2023

Innovation Profile: How Generative AI Enhances ServiceNow Platforms to Enable Better Customer Experiences

May 26, 2023

Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

May 26, 2023
Add A Comment

Comments are closed.

Recent Posts
  • How to Implement Zero Trust For Remote Endpoints in the Enterprise
  • How Celonis Makes Process Mining More Accessible: Embracing Generative AI, Partners
  • C3 AI’s Thomas Siebel on How Generative AI Applies to Business Apps, Impacts Workers
  • Innovation Profile: How Generative AI Enhances ServiceNow Platforms to Enable Better Customer Experiences
  • Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Co-Creation and Growth With Professional Services

May 24, 2023

The Business Impact and Opportunity of Generative AI

May 16, 2023

Healthcare Industry Clouds

May 10, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.