The book includes insights from the following experts:
- Katherine Riley, Director of Information Security & Compliance, Braintrace >>
- Paul Dackiewicz, Lead Security Consulting Engineer, Advanced Network Management (ANM) >>
- Darrell Shack, Cloud Engineer, Cox Automotive Inc >>
- Ross Young, Director, Capital One >>
Mauro Loda, Senior Security Architect, McKesson >>
James P. Courtney, Certified Chief Information Security Officer, Courtney Consultants, LLC >>
Milinda Rambel Stone, Vice President & CISO Provation Medical >>
Avoiding limitations of traditional approaches to security was generously sponsored by lacework.
We all know the attributes of the cloud; agile, dynamic, adaptable. Doesn’t it make sense to use security products that operate the way the cloud does? From a business standpoint, the answer is yes. From a security perspective, there simply is no other way.
Many organizations have built elaborate network-based security systems based on endpoints and linear flow of data. In these infrastructures, the key was to build a hard outer shell and prevent unwanted and unwarranted entry. The cloud, however, can only be effective when data can be shared and integrated among users and resources. It’s ad hoc and agile, but it helps companies achieve business goals with efficiency. All those users and data, however, can’t be protected in an infrastructure that’s using outdated concepts for risk management and threat detection.
Cloud security demands an end-to-end experience that delivers better context, greater intelligence, and more sophisticated threat detection in order for customers to make sense of the data and workloads they’re running in the cloud. In this book are excellent examples of adept practitioners who have adopted cloud strategies within their enterprise cloud security, and who operate with a framework of protection while still enabling fast, scalable growth. The individuals interviewed in this book live the challenge of security every day; we hope it’s enlightening and helpful.