123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cloud Security Innovators – Q+a With George Do, Ciso, Equinix

Profile Picture
By Author: AdamChriss
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

We are incredibly excited to feature a Q+A session with George Do, CISO of Equinix, as the first in our new monthly Cloud Security Innovators blog series. Every month we will interview a new maverick in the cloud security space who is taking an innovative approach to securing data and systems as business increasingly moves to the cloud

Q: How do you view the cloud? Friend? Foe? Necessary Evil?
A: Friend – embrace the cloud or get left behind.

Q: What is the top security challenges surrounding cloud services?
A: The security posture of vendors, specifically the protection of customer data and reputation.

Q: Are there any advantages to using cloud apps as it relates to security
A: A big benefit we see is availability – we have access from anywhere from almost any device at any time.

Q: For your industry, are there any specific privacy, regulatory or compliance requirement that make it more challenging to embrace the cloud?
A: Yes absolutely. Various (foreign) government regulations have strict requirements ...
... on the protection of data that are not friendly to cloud services. Separately, high-security environments are nervous about going to cloud based on their own risk profile. Cloud companies need to improve and attest to their security posture before nervous customers can come around.

Q: There is lot of press around “encryption” as the silver bullet to address security issues relating to the cloud? Do you see “encryption” as the panacea?
A: Encryption is one big piece of the solution only – certainly not a panacea. There are many other pieces that need focus and attention as well such as access control, reputation/brand protection, and security infrastructure.

Q: As you look into your crystal ball, how will cloud security evolve over the next 2-3 years?
A: This will be very interesting. I think companies will be slow to improve security unless there are significant headlines on data compromises / hacks. We’re seeing some of this now (think Heartbleed). In the end I think the cloud industry will get there, but it will take some time.

Q: It is said that every journey begins with a single step. What practical advice would you give to your peers as it relates to Cloud Security?
A: Step 1 is to get visibility as most companies don’t even have that right now. Then you need a program to manage the enforcement of policy that’s customized to the business.

Q: Where do you go for information regarding Cloud Security? Any particular websites, blogs, visionaries and publications you find particularly useful
A: Skyhigh, SANS, US-CERT, and various security blogs.

Q: Moving beyond cloud, what’s the big concern for CISOs today – ie what kept you up last night?
A: The shift of data and users to cloud. Overall, I’m concerned with the speed of technology and lack of security architecture at various layers.

Q: What drives the compliance requirements for your business and how to ensure Cloud Compliance?
A: It’s really the business that drives compliance at Equinix such as SOX and ISO27001. Ensuring compliance in the cloud is a new challenge for us as it is with most other organizations. We recognize that and are beginning to put focus on it.

Author :

Adam Chriss, a proud contributing author and a freelance writer with interests in various subjects and writes articles on several subjects including Cloud Technology, Cloud Security, Cloud Data Security, Cloud Compliance etc,.

Total Views: 542Word Count: 570See All articles From Author

Add Comment

Computers Articles

1. Modern Software At Scale: A Practical Guide To Microservice Development
Author: Tech Gazebos

2. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh

3. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft

4. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash

5. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs

6. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions

7. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel

8. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart

9. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos

10. Soluzioni Complete Per La Stampa In Ufficio: Assistenza, Noleggio E Manutenzione Professionale
Author: Mihai Filip

11. Cheap Vps Hosting & Dedicated Server Solutions – Fast, Secure & Affordable | Rackoona
Author: Rackoona

12. Reliable Temperature Monitoring Solutions Enhancing Drug Safety And Freezer Storage Compliance By Tempgenius
Author: Chris Miller

13. Spark Matrix™: Evaluating Security Information And Event Management (siem) Solutions For Scalable And Intelligent Security Operations
Author: Umangp

14. How To Get In Touch With Bellsouth Customer Service By phone?
Author: frank rayan

15. Bca In Cyber Security Online: Curriculum, Labs, And 2025 Modules
Author: UniversityGuru

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: