Premium Content

Access "CISOs key to transition to cloud, says (ISC)2"

Published: 26 Nov 2012

Chief information security officers (CISOs) have an important role in moving their organisations, whether they are public or private, to a cloud computing environment, according to professional certification body (ISC)2. The move is inevitable because of the lower costs and greater efficiencies cloud computing offers, but the CISO’s role is to ensure that it is done securely, said Marc Noble, director of government affairs for (ISC)2. “It is far easier to say no to something, but economic realities are driving organisations to the cloud, and CISOs have to find a way for their businesses to operate securely in that environment,” he said. CISOs should be part of the business, and this is a prime example of how they can be business enablers, according to Noble, who is also co-chair of the (ISC)2 US government advisory board for cyber security. With proper due diligence, he said CISOs can ensure that by moving to the cloud, their organisations will benefit from a much higher level of security than before. “Organisations have had a long-held false sense of ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Cloud likely future for business applications by Andy Hayler, Contributor

      Outsourcing your business application headaches, together with the flexibility of its leasing model will make the cloud the way forward for large enterprises as well as small businesses.

More Premium Content Accessible For Free

  • Computer Weekly buyer's guide to endpoint security
    BG_0714_endpoint_security.jpg
    E-Handbook

    In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...

  • Social Engineering in IT Security
    Social-Engineering-in-IT Security.jpg
    E-Handbook

    This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...

  • Gartner: Digital transformation: How to survive the information crisis
    Gartner-SurviveInformationCrisis.jpg
    E-Handbook

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...