
Consider adoption of the cloud as part of your remote work strategy


Marc Ashworth CISSP, CISM, CRISC, Senior VP – Chief Information Security Officer, First Bank
The past year has taught us that even the most rigid businesses can be flexible. A pandemic like Covid-19 can do that to a company. Much of the office staff, IT, engineering and executives all working remotely has shown that efficiencies can take place in a remote working environment. As the pandemic begins to subside and vaccinations increase, companies are evaluating their return to work strategies. A long-term remote strategy is in consideration for many companies.
Part of the strategy is the need for office space and dedicated space for servers and storage. Many systems are another year older now, therefore this may be a good time to evaluate moving to the cloud. R ather t han i nvesting i n new hardware that you may no longer have physical location for due to reduced office space. Times of hardware replacements are the best times to determine strategic s hifts. W hether i t i s for the cloud, virtual desktops, SASE, or even software defined networking may have a reasonable ROI when the timing i s r ight. O ther f actors such as a reduced need for office space and difficulty in finding technical personnel to support the equipment may be another factor to shift to the cloud.
As long-term remote work strategies become more realistic the adoption of cloud technologies from AWS, Azure and GCS will increase. Likewise, I would expect an increase in shared data center spaces to take p lace. T he s hift t o t he cloud will have its challenges in part due to current IT staff obtaining the knowledge to safely running those systems in those new e nvironments. A vailability of experienced resources are limited and very expensive at this time. Therefore, finding a trusted partner for the platform of choice will be the best option. Providing training and encourage certifications to existing IT and security staff will be necessary and will help them grow and stay updated. Keep in mind that with that growth comes at a cost due to your team becoming more valuable and very sought after. This increase in salaries and training must be factored into the budget.
“A simple checkbox can be the difference between secure data or exposed for all to see and ending up on the nightly news for a breach. Having the security team setup the cloud environment in a secure state with proper monitoring and automation will help reduce the risk when other teams begin to create objects in the cloud environment.”
Making any investment in the cloud by either development or IT teams should have a strong partnership with the company’s security team. In fact, I would argue that the security team should own the cloud move. It is a great time to rethink security and how things a re d one i n t he o rganization. J ust like any connection that is done on premise that connects to the internet there is an increase in risk with that system. T he cloud configurations are no different. A simple checkbox can be the difference between secure data or exposed for all to see and ending up on the nightly news for a breach. Having the security team setup the cloud environment in a secure state with proper monitoring and automation will help reduce the risk when other teams begin to create objects in the cloud environment.
We have seen time and time again, that leaked databases and files out on the cloud was not due to the cloud provider but instead misconfiguration by the company that owned t he d ata. C onstant r eview a nd s trict procedures must be developed to reduce the r isk of a m isconfiguration. J ust i n t ime credentials with MFA should be used to make sure that no one has default privileged access. The risk of credential stuffing is too high with billions of credentials available on the internet. A ny sort of access to the cloud environment must have MFA turned on with least privilege access principles in effect.
The move to the cloud and co-location data centers can be an exciting time for IT and security staff. It provides a time to architect the legacy environment into modern day best practices or adopting concepts such as Zero Trust. T he project can be stressful, but very rewarding to the teams when done correctly. It can allow the staff and executives sleep a little better knowing that your company’s data is running faster and safer.
ON THE DECK
Featured Vendors
TEERHUB TECHNOLOGY PRIVATE LIMITED (TTPL): "Collaboration to Cognitive" a Microsoft Services Providers Journey
Integrated Business Systems: Solutions for Accessing and Leveraging Data in a Mobile and Interconnected World
StratusLIVE: Advancing Nonprofit Success with Relationship-Focused Enterprise CRM Software & Business Intelligence Solutions
Data Systems Analysts: Providing Comprehensive Secure Collaboration Solutions to the Federal Government
Kollective Technology: Software Defined Enterprise Content Delivery Network for Scalable, High Quality Video
Highpoint Technology Group: Crafting Business Enabling Solutions through the Power of Microsoft Technologies
IntelliPoint Technologies, LLC: Enabling Efficient Operations through Dynamics GP and Network Automation
Imaginet: Developing InnovativeSolutions, Gaining Productivity and Visibility of the Microsoft Lands
Strategic CRM: Providing CRM Insights, Enhancing Customer Experience, and Promoting Channel Optimiza
Time Saver Technologies: Enabling Construction Companies to perk-up their Business and Planning Proc
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
Ingredients for success in transformation
Ensuring Diligence In The Technology Era
Telecom & Grid Modernization
Unlocking The Power Of Your Asset’s Data
Enterprise Agility In The Face Of Rising Cyber Threats
Digitalizing Energy Asset Management– Not A Walk In The Park
