SlideShare a Scribd company logo
1 of 8
Download to read offline
Predictions from Security Leaders
Cloud Security
 in 2016
Encryption of data at rest will evolve to address the objects rather
than where the objects are stored. As sensitive data moves between
applications, some hosted on-premises and some in the cloud,
blindly encrypting entire repositories of data will become unfeasible
for business requirements. Companies will rely on automated,
intelligent policy enforcement that encrypts only the most sensitive
data to comply with security and regulatory requirements.
Jim Routh, CSO
The return of end point security: new tools will examine behavior
versus signatures. This new method will lead to faster detection
without increasing the infrastructure requirements for these controls
— many of which will be based in the cloud and allow for 24x7
coverage versus the 9 to 5 on your network for incident detection.
Richard Rushing, CISO
The battle to keep data within the corporate perimeter will evolve
into the challenge to allow data to travel securely wherever it is
needed. IT security is under pressure to align with business initiatives.
As companies gather data and transition to digital business models,
security teams need to prioritize making data available for business
units: on mobile devices, across departments, and within cloud-based
applications. Departments who pull this off deliver a competitive
advantage for their organization.
Brian Lillie, CIO
There is still a challenge for some organizations with establishing
trust between the cloud provider and organizations with confidential
or proprietary information. Security is becoming better integrated
into cloud services and is being highlighted as a feature of the
standard services provided. Cloud providers will develop automated
methods of obtaining data needed to support assurance. Additionally,
encryption techniques and services are being developed to allow the
needed separation of duties — paving the way for cloud adoption
even for companies that have critical information.
Mike Watson, CISO
State of Virginia
In 2016, the biggest challenge for cloud-based companies will be
to leverage privacy in their business models, as the Safe-Harbor
invalidation by EU will trigger new incentives, not only for European
companies, but globally. Digital trust will certainly be the most
important trend and a business enabler if branded efficiently.
Proactive data asset management is becoming fundamental, to keep
real-time inventory of where, how and by which company corporate
information is handled. Failing to do so is simply accepting the risk
of data loss.
Bruno Kerouanton, CISO
Canton of Jura, Switzerland
As for my own predictions, I believe 2016 will usher in a new age
in the cloud economy, which will bring a new set of challenges for
companies. They will start to worry less about whether their cloud
provider will be breached, and more about whether employee error or
stolen passwords will lead to a breach. The majority of cloud incidents
in 2016 will come from employee insiders, whether through error or
malicious intent. Security budgets will adapt to reflect the maturity of
cloud adoption, as companies pay off cloud security debt. According
to Gartner, companies currently allocate just 3.8 percent of cloud
spending to security, compared to 11 percent from overall IT budgets.
Finally, I think 2016 will shutter the approach to simply block or
eliminate cloud services. Risk to data in the cloud is contextual, and
security policies will evolve accordingly.
Rajiv Gupta, CEO
MORE SLIDESHARES YOU MAY LIKE

More Related Content

Viewers also liked

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
Skyhigh Networks
 

Viewers also liked (9)

IC4 Cloud Security Workshop 2016
IC4 Cloud Security Workshop 2016IC4 Cloud Security Workshop 2016
IC4 Cloud Security Workshop 2016
 
Cloud Predictions 2016
Cloud Predictions 2016Cloud Predictions 2016
Cloud Predictions 2016
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseThe Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Cloud Security in 2016: Predictions from Security Leaders

  • 1. Predictions from Security Leaders Cloud Security  in 2016
  • 2. Encryption of data at rest will evolve to address the objects rather than where the objects are stored. As sensitive data moves between applications, some hosted on-premises and some in the cloud, blindly encrypting entire repositories of data will become unfeasible for business requirements. Companies will rely on automated, intelligent policy enforcement that encrypts only the most sensitive data to comply with security and regulatory requirements. Jim Routh, CSO
  • 3. The return of end point security: new tools will examine behavior versus signatures. This new method will lead to faster detection without increasing the infrastructure requirements for these controls — many of which will be based in the cloud and allow for 24x7 coverage versus the 9 to 5 on your network for incident detection. Richard Rushing, CISO
  • 4. The battle to keep data within the corporate perimeter will evolve into the challenge to allow data to travel securely wherever it is needed. IT security is under pressure to align with business initiatives. As companies gather data and transition to digital business models, security teams need to prioritize making data available for business units: on mobile devices, across departments, and within cloud-based applications. Departments who pull this off deliver a competitive advantage for their organization. Brian Lillie, CIO
  • 5. There is still a challenge for some organizations with establishing trust between the cloud provider and organizations with confidential or proprietary information. Security is becoming better integrated into cloud services and is being highlighted as a feature of the standard services provided. Cloud providers will develop automated methods of obtaining data needed to support assurance. Additionally, encryption techniques and services are being developed to allow the needed separation of duties — paving the way for cloud adoption even for companies that have critical information. Mike Watson, CISO State of Virginia
  • 6. In 2016, the biggest challenge for cloud-based companies will be to leverage privacy in their business models, as the Safe-Harbor invalidation by EU will trigger new incentives, not only for European companies, but globally. Digital trust will certainly be the most important trend and a business enabler if branded efficiently. Proactive data asset management is becoming fundamental, to keep real-time inventory of where, how and by which company corporate information is handled. Failing to do so is simply accepting the risk of data loss. Bruno Kerouanton, CISO Canton of Jura, Switzerland
  • 7. As for my own predictions, I believe 2016 will usher in a new age in the cloud economy, which will bring a new set of challenges for companies. They will start to worry less about whether their cloud provider will be breached, and more about whether employee error or stolen passwords will lead to a breach. The majority of cloud incidents in 2016 will come from employee insiders, whether through error or malicious intent. Security budgets will adapt to reflect the maturity of cloud adoption, as companies pay off cloud security debt. According to Gartner, companies currently allocate just 3.8 percent of cloud spending to security, compared to 11 percent from overall IT budgets. Finally, I think 2016 will shutter the approach to simply block or eliminate cloud services. Risk to data in the cloud is contextual, and security policies will evolve accordingly. Rajiv Gupta, CEO