Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How to Reduce Multi-Cloud Data Risk With Cybersecurity Training 
Cybersecurity as a Business Enabler

How to Reduce Multi-Cloud Data Risk With Cybersecurity Training 

Robert WoodBy Robert WoodMarch 14, 2023Updated:March 14, 20234 Mins Read
Facebook Twitter LinkedIn Email
multi-cloud training security
.
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

It’s no secret that more companies are turning to or, at the very least, exploring multi-cloud environments to store and manage data. This choice is often driven by multi-cloud’s potential to help companies avoid vendor lock-in, decrease costs, and enable them to select the best tool for each job.

Unfortunately, multi-cloud environments are complex; in cybersecurity, complexity often translates to risk. Preparing your workforce to navigate these complexities through focused security training is one valuable way to manage the risk. In this analysis, I’ll discuss why security training is so crucial in multi-cloud environments and provide some security training best practices for reducing threats.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner-analysts.

Multi-Cloud Security Threats

In a multi-cloud environment, security threats arise due to a lack of standardization. Cloud providers generally offer the same types of services but their pricing models are naturally different; documentation may be better with one over another; or there may be differentiated features. When there is a mix of different tools in place, security policies often are not consistently applied, and potential blindspots can arise.

The lack of standardization can introduce risk to an organization through assumptions about what’s configured and how, ownership of patches, the control plane and scope thereof, to name several examples. Assumptions can be dangerous in cybersecurity, particularly when they result in vulnerabilities that go unnoticed or unresolved.

Visibility across environments can also present issues. Visibility into hosts, services, and configuration states may all be handled differently within each provider. Dealing with connection requests across providers, network zones, and regions introduces more complexity. Lack of visibility can degrade an organization’s ability to detect and respond to security issues effectively.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Importance of Security Training in Multi-Cloud Environments

There are technical countermeasures to dealing with challenges relating to visibility and assumptions detailed above. Security-focused training can also play a significant part in reducing risk in these situations. All employees with access to multi-cloud resources — developers, administrators, and any other users involved in setting up or managing infrastructure — should be properly trained. Security training geared to multi-cloud should include the following:

  1. Cloud Security Fundamentals: Employees should understand cloud security basics, including authentication, access control, and encryption. They should also be aware of the specific security protocols of their cloud platforms. It’s vital that training covers each of the platforms in use. Generic training that doesn’t reference the nuance of a particular provider is unlikely to be helpful.
  2. Compliance Requirements: Multi-cloud environments are likely to be subject to different regulatory requirements, such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA). Employees should be trained on these requirements to ensure that data is stored and managed in compliance with regulations. This will be specific to the organization and industry.
  3. Best Practices: Employees should be trained to secure data in multi-cloud environments. Providers often include best practices in their documentation, but in some cases, there is a need to engage external sources like security research blogs or conferences. Employees should know the importance of protecting cloud credentials and applying secure configuration, among other best practices. Roles and responsibilities are also important to outline.

Best Practices for Security Training

Training can be conducted in many ways depending on resources, goals, time, and team makeup. Experimenting with these different approaches will help identify the best training approach. The following are some proven approaches to consider:

  • Regular Instructor-Led or Computer-Based Training: Security training should be conducted regularly. This will help employees stay up-to-date with the latest security protocols and regulations. Smaller, frequent engagements can help.
  • Use Simulations: Simulation-based training can be effective in helping employees understand how to respond to security threats. Simulations can provide a safe environment to test security measures without the risk of compromising actual data. An example of this would be a more theoretical tabletop exercise across the team or a purple team exercise.
  • Pairing Exercises: Live pairing exercises with multi-disciplinary teams can be a powerful way to cross-pollinate knowledge across functions and groups. This might happen through testing, service deployment, or development.

Concluding Thoughts

As organizations continue to explore and adopt multi-cloud strategies, they must implement security training. Security training in these environments helps to reduce the risk of threats by educating employees on cloud security fundamentals, compliance requirements, and best practices. Additionally, embracing an active learning culture can minimize risk when adopting a multi-cloud strategy.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

Compliance Cybersecurity data education featured governance HR multi-cloud vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Robert Wood

CISO
Executive Branch Agency

Areas of Expertise
  • Cybersecurity

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

  Contact Robert Wood ...

Related Posts

How Technology Ecosystem Partners Advance Digital Transformation Projects

March 25, 2023

SAP Expands Big Advantage It Has Over Oracle, Salesforce, Workday

March 24, 2023

How Teradata’s Vantage Cloud Lake Helps Customers Reduce Cloud Spend

March 24, 2023

Why Context Matters When Cybersecurity Leaders Communicate With Data Teams

March 24, 2023
Add A Comment

Comments are closed.

Recent Posts
  • How Technology Ecosystem Partners Advance Digital Transformation Projects
  • SAP Expands Big Advantage It Has Over Oracle, Salesforce, Workday
  • How Teradata’s Vantage Cloud Lake Helps Customers Reduce Cloud Spend
  • Why Context Matters When Cybersecurity Leaders Communicate With Data Teams
  • Securing Multi-Cloud Ecosystems

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.