Key success factors for managing cloud security has been saved
Key success factors for managing cloud security
Part of the For Cloud Professionals podcast series
Cloud security isn't simply throwing technology at problems. It's understanding security in the context of a complex cloud environment and using teamwork, processes, and technology to discover potential security issues and prevent them before they become catastrophic.
Effective planning and execution of cloud security: What it takes to make it better?
Join host David Linthicum and guest Lori MacVittie, Principal technical evangelist, office of the CTO at F5 networks, as they discuss security in the cloud. Lori provides her perspective on problems organizations face with security, and how teamwork plays a more critical role than technology in fixing problems—and making sure they’re discovered before they become catastrophic. Lori and David also discuss the future of security in the cloud and what CIOs can do to start moving toward that future right now.
We are all accountable for all those things so that we all work together to achieve that, because there is no piece of this puzzle when you look at the different silos that doesn't somehow impact the security or the performance or the availability. First, get aligned on what it means to be successful in the first place. It isn't just you get measured on this one piece of it and you get measured on this other piece of it. You have to be measured on the same things and take responsibility for that so that you work together. You're more likely to–and to communicate more, to understand the impacts, and thus form a broader set of expertise across that team to understand.
Lori MacVittie is a subject matter expert for F5 Networks on cloud computing, cloud and application security, devops and application delivery. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise.
Leading practices are still emerging around the use of identity-based security with cloud computing, but the leading practice, for now, is to fit the technology to your requirements versus fit your requirements to a single security technology.
Security is all or nothing. Either you have all of the doors locked, or they might as well be unlocked. It's critically important to understand that this is a consistently evolving area of technology, and that your first instance of systemic cloud security should proactively improve over time.
Realizing the transformative power of the cloud
For Cloud Professionals: Hosted by David Linthicum and designed for cloud professionals, this podcast gives you the straight talk on cloud computing. From what’s going on in the industry, the impact of cloud in the enterprise to how it can enable business transformation–it’s all covered here.
Architecting the Cloud: Get real about cloud technology with Mike Kavis on the Architecting the Cloud podcast. We’re talking about what’s new in the cloud, how to use it, and why with people in the field who have done the work.
Or visit the On Cloud library for the full collection of episodes.