AI EXPRESS
  • AI
    Crippling AI cyberattacks are inevitable: 4 ways security pros can prepare

    Crippling AI cyberattacks are inevitable: 4 ways security pros can prepare

    AI

    How AI Is Being Used to Assess Risk

    Rain nabs $11M to build voice experiences for brands

    Rain nabs $11M to build voice experiences for brands

    AI Weekly: AI tools for hiring under scrutiny; Clearview AI settlement reaction

    AI Weekly: AI tools for hiring under scrutiny; Clearview AI settlement reaction

    Nuance partners with The Academy to launch The AI Collaborative

    Nuance partners with The Academy to launch The AI Collaborative

    How AI can improve services revenue and customer success

    How AI can improve services revenue and customer success

  • ML
    Moderate, classify, and process documents using Amazon Rekognition and Amazon Textract

    Moderate, classify, and process documents using Amazon Rekognition and Amazon Textract

    The Intel®3D Athlete Tracking (3DAT) scalable architecture deploys pose estimation models using Amazon Kinesis Data Streams and Amazon EKS

    The Intel®3D Athlete Tracking (3DAT) scalable architecture deploys pose estimation models using Amazon Kinesis Data Streams and Amazon EKS

    Intelligently search your Jira projects with Amazon Kendra Jira cloud connector

    Intelligently search your Jira projects with Amazon Kendra Jira cloud connector

    Enhance the caller experience with hints in Amazon Lex

    Enhance the caller experience with hints in Amazon Lex

    Image classification and object detection using Amazon Rekognition Custom Labels and Amazon SageMaker JumpStart

    Image classification and object detection using Amazon Rekognition Custom Labels and Amazon SageMaker JumpStart

    Run automatic model tuning with Amazon SageMaker JumpStart

    Run automatic model tuning with Amazon SageMaker JumpStart

    Achieve in-vehicle comfort using personalized machine learning and Amazon SageMaker

    Achieve in-vehicle comfort using personalized machine learning and Amazon SageMaker

    Example of subtitles toggled on within a web video player

    Create video subtitles with Amazon Transcribe using this no-code workflow

    Abstract diagram showing how AWS AI services come together.

    Content moderation design patterns with AWS managed AI services

  • NLP
    Westpac fund backs start-up that enables AI phone calls

    Westpac fund backs start-up that enables AI phone calls

    Biased data is anathema to society says the SAS CTO who has made it his mission to stamp bias out

    Biased data is anathema to society says the SAS CTO who has made it his mission to stamp bias out

    ELaPro, a LOINC-mapped core dataset for top laboratory procedures of eligibility screening for clinical trials | BMC Medical Research Methodology

    ELaPro, a LOINC-mapped core dataset for top laboratory procedures of eligibility screening for clinical trials | BMC Medical Research Methodology

    The problem with self-driving cars

    The problem with self-driving cars

    These 5 robotic startups are impacting healthcare sector with their innovation

    These 5 robotic startups are impacting healthcare sector with their innovation

    Raidix Era Western Digital

    What is a supercomputer? – Dataconomy

    Data Intelligence Solutions for Sales Market Overview 2022-2029| Key Players – Linkedln, Discoverorg, Zoomlnfo, Datanyze, Dun & Bradstreet

    Japan Cloud Natural Language Processing Market Size 2022 Analysis by 2029

    Generic business image for news article

    Asset servicing data services news

    Australian Govt. not sufficiently investing enough in artificial intelligence: research institute boss - Software

    Australian Govt. not sufficiently investing enough in artificial intelligence: research institute boss – Software

  • Vision
    Creator Karen X. Cheng Brings Keen AI for Design ‘In the NVIDIA Studio’

    Creator Karen X. Cheng Brings Keen AI for Design ‘In the NVIDIA Studio’

    GFN Thursday: ‘Evil Dead: The Game’ on GeForce NOW

    GFN Thursday: ‘Evil Dead: The Game’ on GeForce NOW

    pix2pix Generative Adversarial Networks

    pix2pix Generative Adversarial Networks

    AI-Generated Endangered Species Mix With Times Square’s Nightlife

    AI-Generated Endangered Species Mix With Times Square’s Nightlife

    Shopping Smart: AiFi Using AI to Spark a Retail Renaissance

    Shopping Smart: AiFi Using AI to Spark a Retail Renaissance

    Writing AlexNet from Scratch in PyTorch

    Writing AlexNet from Scratch in PyTorch

    Duos Technologies Uses AI-Powered System for Railcar Inspection

    Duos Technologies Uses AI-Powered System for Railcar Inspection

    Recycleye AI-Driven Systems Aim to Reduce Global Waste

    Recycleye AI-Driven Systems Aim to Reduce Global Waste

    NVIDIA Metropolis Edge AI-on-5G Platform Delivers IVA Over 5G

    NVIDIA Metropolis Edge AI-on-5G Platform Delivers IVA Over 5G

  • Robotics
    Eureka Robotics brings in $4.5M in pre-Series A funding

    Eureka Robotics brings in $4.5M in pre-Series A funding

    NASCAR crash test

    AB Dynamics’ robots at use crash testing NASCAR cars

    depainting a plane

    Advanced cable management lets robots depaint airplanes

    Dusty Robotics raises $45M Series B round

    Dusty Robotics raises $45M Series B round

    Flexxbotics brings in $2.9M in Series A funding

    Flexxbotics brings in $2.9M in Series A funding

    ABB's Mark Joppru joins MiR as VP of sales for the Americas

    ABB’s Mark Joppru joins MiR as VP of sales for the Americas

    Teraki, DriveU.auto partner for teleoperated delivery robots

    Teraki, DriveU.auto partner for teleoperated delivery robots

    Apex.AI receives strategic investment from Daimler Truck

    Apex.AI receives strategic investment from Daimler Truck

    Festo introduces pneumatic cobot arm

    Festo introduces pneumatic cobot arm

  • RPA
    Invoice Management Made Easy With Automation and RPA solution

    Automated Invoice Processing: An Ardent Need of Modern Day Businesses

    Conversational AI- Oomphing Up HR Digitization Factor| AutomationEdge

    Conversational AI- Oomphing Up HR Digitization Factor| AutomationEdge

    Know how to Implement Conversational AI

    Alarm Ringing! Top 10 Tips to go about Conversational Marketing

    UiPath RPA & Microsoft Cloud - Microsoft Inspire 2019

    UiPath RPA & Microsoft Cloud – Microsoft Inspire 2019

    UiPath 2019.7 Monthly Update | UiPath

    UiPath 2019.7 Monthly Update | UiPath

    Take The Wheel of Your Automation Strategy

    Take The Wheel of Your Automation Strategy

    Finding Your Unattended Robots Use Cases (Part 1)

    Finding Your Unattended Robots Use Cases (Part 1)

    EU Urges Public Sector to Use Artificial Intelligence To Improve Services

    EU Urges Public Sector to Use Artificial Intelligence To Improve Services

    2019 Gartner Peer Insights Customers' Choice for RPA

    2019 Gartner Peer Insights Customers’ Choice for RPA

  • Gaming
    You can now play Resident Evil 7 and Village in fully-immersive VR on PC

    You can now play Resident Evil 7 and Village in fully-immersive VR on PC

    UK Charts: Nintendo Switch Sports Is Number One For A Third Week

    UK Charts: Nintendo Switch Sports Is Number One For A Third Week

    Square Enix still recommends Balan Wonderworld "with confidence" despite recent lawsuit

    Square Enix still recommends Balan Wonderworld “with confidence” despite recent lawsuit

    This Elden Ring mod lets you hang out with your favourite NPCs

    This Elden Ring mod lets you hang out with your favourite NPCs

    Gears of War could be getting a Master Chief Collection-style collection

    Gears of War could be getting a Master Chief Collection-style collection

    Handheld Face-Off - Nintendo Switch OLED Model Vs Steam Deck

    Handheld Face-Off – Nintendo Switch OLED Model Vs Steam Deck

    Soulstice looks like it wants to be the next Devil May Cry, and gets an autumn release window

    Soulstice looks like it wants to be the next Devil May Cry, and gets an autumn release window

    Konami issues DMCA takedown of images claiming to be a Silent Hill reboot

    Konami issues DMCA takedown of images claiming to be a Silent Hill reboot

    The Callisto Protocol news coming next week

    The Callisto Protocol news coming next week

  • Investment
    Mammoscreen

    Therapixel Closes €15M Series B Financing

    GEOSAT

    Company EOS Data Analytics Partners With GEOSAT

    Solarr Raises $2M in Seed Funding

    Solarr Raises $2M in Seed Funding

    Yottaa

    Yottaa Receives Growth Investment from PSG

    satori

    Satori Raises $10M in Seed Funding

    klarpay

    Klarpay Raises CHF 3M in Funding

    Hedi Mardisoo and Kalle Palling

    Cachet Raises €5.5M in Funding

    venture capital

    Aquiline Closes Aquiline Technology Growth Fund II, At Over $365M

    devocean

    devOcean Raises $6M in Seed Funding

  • More
    • Data analytics
    • Apps
    • No Code
    • Cloud
    • Quantum Computing
    • Security
    • AR & VR
    • Esports
    • IOT
    • Smart Home
    • Smart City
    • Crypto Currency
    • Blockchain
    • Reviews
    • Video
No Result
View All Result
AI EXPRESS
No Result
View All Result
Home Security

How to build a cloud security strategy that sells

by
May 12, 2022
in Security
0
How to build a cloud security strategy that sells
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter

We’re excited to carry Remodel 2022 again in-person July 19 and just about July 20 – 28. Be part of AI and information leaders for insightful talks and thrilling networking alternatives. Register immediately!


As the top of safety at a cloud-forward group, you’re an data safety and threat skilled with sturdy enterprise acumen.  In your shoulders falls the tough process of detecting safety points as early as doable to cut back your group’s threat posture. You will need to collaborate with devops, IT and compliance groups to make sure safety stays sturdy whereas enterprise priorities are met. 

You acknowledge the significance of constructing a risk-based safety technique within the cloud, however want buy-in and approval from key stakeholders to obtain finances funding. The problem, then, is guaranteeing your cloud safety technique is cogent and appeals to the fitting folks.

How?

To begin, you will need to perceive why constructing and promoting your cloud safety technique is essential. Then you’ll want to know do it and have the ability to describe the advantages to your group. You’ll additionally have to have a confirmed methodology of implementing the technique effectively and efficiently.

Why it’s necessary

Transferring safety ahead isn’t straightforward, notably if stakeholders contemplate the controls an obstacle to enterprise priorities. That’s why a successful technique delivers a roadmap for bettering your cloud safety posture and driving product improvement. 

A profitable safety technique accomplishes a number of goals:

  • Serves because the constructing block for creating a risk-based safety posture
  • Reply considerations about why and for what you want funding
  • Protects your finances shifting ahead
  • Creates avenues for added funding for threat remediation
  • Identifies threats and addresses them inside the technique’s framework
  • Ensures you’re your crew are protected within the case of a safety incident
  • Demonstrates that the technique helps enterprise priorities

Search alternatives to embrace a DevSecOps mindset. For instance, cloud ahead companies are utilizing extra non-human accounts than ever to develop merchandise sooner. In flip, assaults on non-human identities are rising considerably. You’ll need to defend these accounts with out slowing down devops. Discover a vendor that gives just-in-time (JIT) permissioning for human and non-human accounts. This elevates safety and offers builders the entry they should ship effectively.

Together with your technique constructed and business-oriented alternatives in thoughts, it’s time to deal with promoting your technique to key stakeholders.

Promoting your cloud safety technique

4 essential parts comprise promoting a safety technique.

  • Creating a threat framework
  • Getting enterprise buy-in and help
  • Constructing a custom-made management framework
  • Utilizing the fitting answer(s)

Danger framework

A threat framework begins with threat identification. Listed below are 4 frequent eventualities:

  • An exterior occasion seizes management of your system and initiates a Denial of Service (DoS)
  • An exterior occasion steals delicate information or processes
  • An worker misuses entry to mission-critical information
  • An worker leaks buyer data
See also  Device42 aims to identify Log4j vulnerabilities

Every situation requires an evaluation to research and classify the danger probability and influence. Develop a scoring system that helps you and your organization’s stakeholders shortly perceive potential outcomes. 

Management mapping helps you to perceive the controls wanted to handle the dangers. For instance, if the “kill chain” is to achieve entry to your surroundings and the “risk” is credential theft, the safety management could be multifactor authorization (MFA), JIT, or improved privileged entry administration (PAM).

  • Kill chain = achieve entry
  • Risk = credential theft
  • Controls = MFA, JIT, PAM

After you have established the danger framework, prioritize and outline the initiatives wanted to enhance controls that cut back threat. 

Enterprise buy-in

Assign the danger’s influence on enterprise funds, prospects and repute. As an example, contemplate the next scoring system:

Rating: 5

Ranking: Very Excessive

Description: Potential existential influence

Popularity / Buyer: Excessive influence on shopper relations

Monetary: Vital and/or everlasting influence to income technology

Rating: 4

Ranking: Excessive

Description: Severe, long-term influence

Popularity / Buyer: Main influence on shopper relations

Monetary: Diminished capacity to generate income

Rating: 3

Ranking: Reasonable

Description: Severe, long-term influence

Popularity / Buyer: Materials, however recoverable, influence

Monetary: Close to-term income loss

Subsequent, assign the danger’s probability, equivalent to:

  • Rating: 5
  • Ranking: Very Excessive
  • Probability: The danger is sort of sure to happen 

Management frameworks

Undertake one or a number of of the out there safety management frameworks. Doing so gives your technique and stakeholder buy-in with management checklists and is a essential benchmark system for sustaining a robust cloud safety posture. 

  • Nationwide Institute of Requirements and Know-how (NIST) Cybersecurity Framework
  • SANS High 20 Crucial Controls
  • ISO 27001 Data Safety Administration Programs (ISMS)
  • Cloud Safety Alliance (CSA) Matrix

Select the fitting answer

Selecting the best answer(s) on your cloud safety technique is dependent upon your goals. Key questions embrace:

  • The place are you in your cloud journey?
    • Do you employ an on-premise information middle and wish to transfer to the cloud?
      • Will you preserve a hybrid cloud (on-premise and cloud) surroundings?
      • Will you undertake a multi-cloud hybrid surroundings?
    • Are you All-in-Cloud?
      • Do you employ a single cloud surroundings?
      • Will you undertake a multi-cloud surroundings?

No matter the place you’re in your cloud journey, your technique ought to tackle immediately’s challenges and plan for the safety dangers in retailer.  

Broad adoption of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) instruments, in addition to software-as-a-service (SaaS) purposes, have accelerated IT operations and software improvement. Managing and securing the ensuing large proliferation of cloud identities and privileges for each app builders and their customers has been difficult.

See also  Noname Security gets $135M to 'proactively' lock down APIs

It isn’t possible in the long run to proceed managing identities in password-protected Excel spreadsheets, which is frequent apply with many safety operations (secops) and devops groups. Relatively, guaranteeing the safety of privileged entry in a fancy multi-cloud surroundings would require each a brand new mindset and new safety instruments. 

The dynamic nature of the cloud brings adjustments to administration and configuration instruments each day. With every change comes one other set of options and performance that must be understood and built-in into current safety instruments. Finally, directors and auditors lack ample visibility into who has what stage of entry to every platform. As such, listed below are eight (8) finest practices to search for in a platform answer:

  • Grant cloud privileges JIT
  • Assign privileges based mostly on coverage
  • Drastically cut back standing privileges for human and nonhuman identities
  • Combine single-sign-on (SSO) or MFA
  • Prolong id and governance administration (IGA)
  • Feed UEBA / SIEM with privileged cloud exercise
  • Cross-cloud visibility and reporting
  • Holistic, cloud-native platform 

Danger must be the cornerstone

Assessing threat is restricted to your group. Nonetheless, in terms of constructing and promoting your cloud safety technique, threat must be the cornerstone. 

Make sure to hold your technique easy, visible and based mostly on established finest practices and frameworks. 

To efficiently promote your technique to key stakeholders, you will have their buy-in. Display how your technique improves your safety posture and facilitates enterprise priorities: “As a result of we’ve deployed JIT permissions for human and non-human identities, builders can entry the instruments they want shortly and safely. This elevates our posture and accelerates velocity.”

Subsequent steps

Step one is figuring out crew members with whom you may kind a safety threat group. Subsequent, establish the important thing stakeholders within the varied enterprise departments of your group. Then, record related threat eventualities and undertake a management framework that’s custom-made to your wants and threat tolerance. Lastly, with an understanding of the priorities of every division and the safety dangers they face, develop your technique overview and make plans to include management scores, threat photos and desired outcomes.

Constructing and promoting a profitable cloud safety technique isn’t straightforward. However the suggestions right here will allow you to grasp the circumstances of your group’s enterprise safety priorities. 

Artwork Poghosyan is the CEO of Britive.

Source link

Tags: Buildcloudsecuritysellsstrategy
Previous Post

Rocker Chair Market Size 2022 Analysis by 2029

Next Post

Former Meta Executive Latest To Join Crypto Bandwagon

Next Post
Meta

Former Meta Executive Latest To Join Crypto Bandwagon

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Newsletter

Popular Stories

  • A fan is making the Metroid 64 game that never was

    A fan is making the Metroid 64 game that never was

    0 shares
    Share 0 Tweet 0
  • Android 13 needs to steal a few of Apple’s features to show off at Google IO 2022

    0 shares
    Share 0 Tweet 0
  • Bubbles Raises $8.5M in Seed Funding

    0 shares
    Share 0 Tweet 0
  • Intel shows off new Arctic Sound M graphics chips for the datacenter

    0 shares
    Share 0 Tweet 0
  • Spotify Celebrates Star Wars Day With New Blend Playlists

    0 shares
    Share 0 Tweet 0

Security Jobs

View 115 Security Jobs at Tesla

View 165 Security Jobs at Nvidia

View 105 Security Jobs at Google

View 135 Security Jobs at Amamzon

View 131 Security Jobs at IBM

View 95 Security Jobs at Microsoft

View 205 Security Jobs at Meta

View 192 Security Jobs at Intel

Accounting and Finance Hub

Raised Seed, Series A, B, C Funding Round

Get a Free Insurance Quote

Try Our Accounting Service

AI EXPRESS

AI EXPRESS is a news site that covers the latest developments in Artificial Intelligence, Data Analytics, ML & DL, Algorithms, RPA, NLP, Robotics, Smart Homes & Cities, Cloud & Quantum Computing, AR & VR and Blockchains

Categories

  • AI
  • Ai videos
  • Apps
  • AR & VR
  • Blockchain
  • Cloud
  • Computer Vision
  • Crypto Currency
  • Data analytics
  • Esports
  • Gaming
  • Gaming Videos
  • Investment
  • IOT
  • Iot Videos
  • Low Code No Code
  • Machine Learning
  • NLP
  • Quantum Computing
  • Robotics
  • Robotics Videos
  • RPA
  • Security
  • Smart City
  • Smart Home

Quick Links

  • Reviews
  • Deals
  • Best
  • AI Jobs
  • AI Events
  • AI Directory
  • Industries

© 2021 Aiexpress.io - All rights reserved.

  • Contact
  • Privacy Policy
  • Terms & Conditions

No Result
View All Result
  • AI
  • ML
  • NLP
  • Vision
  • Robotics
  • RPA
  • Gaming
  • Investment
  • More
    • Data analytics
    • Apps
    • No Code
    • Cloud
    • Quantum Computing
    • Security
    • AR & VR
    • Esports
    • IOT
    • Smart Home
    • Smart City
    • Crypto Currency
    • Blockchain
    • Reviews
    • Video

© 2021 Aiexpress.io - All rights reserved.