SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Cybersecurity in the Cloud:
Safer Than You Think
The explosion of cloud computing has
connected more people than anyone
ever imagined...
But the massive number of companies
migrating to the cloud has amplified the
urgency of data security and regulatory
compliance.
Cloud Migration Is Relentless
It turns out that 96% of today’s enterprises are using
at least one public or private cloud, according to
RightScale’s 2018 State of the Cloud Report.
Forrester’s experts predict that public cloud
expenditures will grow from $146 billion in 2017
to $236 billion in 2020.
Approximately 80% of tech company professionals are
using cloud-based apps, according to Citrix.
At companies with flexible workplaces, 57% of
professionals are working in the cloud.
Don’t Get Snagged on the Insecurity Myth
The skeptics get snagged on lingering assumptions that cloud
technology is insecure.
Perhaps the trust gap is perpetuated by the numerous data
breach horror stories that litter the Web.
But don’t let the cyber smash and grab headlines stop you from
giving cloud the benefit of the doubt.
“You have to institutionalize security as part of your business model.”
- Omesh Agam, Chief Information Security Officer at Appian.
Raising the Bar on Security Standards
“We have a myriad of compliance certifications
that we have to maintain to provide a base level of
assurance to customers, as well to ourselves, that
we're operating in accordance with the highest
security standards.”
- Omesh Agam
Cyber Attacks Spreading Like Wildfire
Anywhere from 300,000 to a million viruses and other
malicious software products are created by hackers every
day.
This includes the usual suspects—DDoS attacks, data
breaches, ransom demands, and theft of proprietary
information.
And that’s just the tip of the iceberg.
From a business standpoint, cybercrime drains a staggering
$600 billion a year from the global economy, according to
the Center for Strategic & International Studies.
!
Cloud Is Safer than Many Legacy Systems
Gartner predicts that worldwide security spending will reach
$96 billion in 2018, up 8% from 2017.
CNBC recently reported that cybercrime is the fastest-growing
crime in the U.S.
In 2018, the 60% of enterprises that implement the right cloud
security tools will experience one-third fewer security failures.
Through 2020, public cloud Infrastructure as a Service
workloads will suffer at least 60% fewer security incidents than
those in traditional data centers.
Through 2022, at least 95% of cloud security failures will be the
customer’s fault.
HACKED
The Security Risk Is Marvin in Marketing,
not the Cloud
Human error is the main cause of security breaches.
Yep, it’s usually just Marvin in marketing, who unknowingly
downloads a malicious file and exposes your organization
to cyber attacks.
On average, employees receive less than two hours of
security training per year, according to the FPA study.
48% of enterprises don’t have an employee security
awareness program, according to Forbes.
Compliance in the Cloud
On the compliance side, the best cloud services cover all
of the major security domains and controls, including:
Association of International Certified Professional
Accountants (AICPA) cybersecurity risk management
reporting framework
Payment Card Industry Data Security Standard (PCI DSS),
which is an international framework for data
security standards
Health Insurance Portability and Accountability Act of 1996
(HIPAA), which is US law that provides data privacy
andsecurity provisions for safeguarding medical information.
Sharing the Control Stack
Without the enormous security intelligence capability of
a cloud platform, detecting suspicious patterns in massive
amounts of operational data would be like mission impossible
for most enterprises.
Managed cloud services makes it easier to keep up with
security upgrades and scale up operations at speeds not
possible before.
“Now, that doesn’t mean you can forget about compliance
in business and security requirements.”
- Omesh Agam, Appian
“It means moving towards a shared controls framework. And what that
means is that you’re now sharing the control stack with someone else.”
Continuous Multi-layer Monitoring
At Appian, we have continuous monitoring of multiple layers
with our infrastructure providers at their physical hardware
level, their data centers, servers, and platform level as well.
“You don’t get to ignore basic logging and monitoring hygiene just
because you’re using a SAAS provider.”
More than 85% of enterprise IT organizations will commit to
multi-cloud architecture by 2018, according to IDC.
About 75% of developer teams will include cognitive/artificial
intelligence functionality in cloud applications. And most of
these will be sourced from the cloud.
Are You Ready for General Data
Protection Regulation?
With the implementation of GDPR, companies will have to report data
breaches to regulators—and inform customers—within 72 hours.
And the cost of non-compliance? In a word, steep. Violators could get
hit with a €20 million euro fine, or forfeit up to 4% of their global
revenues, whichever is greater.
GDPR hasn’t stopped digital leaders from migrating to the cloud.
To put things in perspective, public cloud spending will grow at nearly
seven times the rate of overall IT spending, according to IDC.
By 2020, public cloud spending will reach $203.4 billion worldwide,
from an estimated $122.5 billion in 2017.
€
Experts: Public Cloud to Continue Trending Up
So, if you’re thinking about stepping up to cloud adoption,
but you’re worried about data security in your enterprise
operations, what should you do?
Take stock of your most critical internal assets, and
understand how data flows both inside and outside
your organization.
Number one, from your own internal organization, you
should take stock of your most critical assets, and
understand how data flows inside and outside your
organization.
Know Security Requirements for Your Data
It's essential to know your data security
requirements, because that'll let you have a more
open and honest conversation with your cloud
vendor’s security officer about your compliance
and regulatory requirements.
Security Review Not Just Cloud Vendor’s Job
It’s a continuous process that’s continuously evolving. You should
constantly maintain it, which means conducting security
reviews on a regular basis.
Conduct audits by reading your vendors audit reports, their SOC
reports, their PCI reports.
The essential lesson: Take a policy-based approach to controlling
what people can and can’t do with your business-critical
data, across your organization.
facebook.com/AppianCorporation
linkedin.com/appian-Corporation
appian.com/appian-cloud-trust
instagram.com/appiancorp
youtube.com/appian
twitter.com/appianLEARN MORE

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud mrp a great choice for manufacturers of any size
Cloud mrp a great choice for manufacturers of any sizeCloud mrp a great choice for manufacturers of any size
Cloud mrp a great choice for manufacturers of any sizeMRPeasy
 
Business first cloud architecture model Making Performance Matter
Business first cloud architecture model Making Performance MatterBusiness first cloud architecture model Making Performance Matter
Business first cloud architecture model Making Performance MatterMarvin Harris
 
2018 ERP Trends - Macola - Nick Mears - Columbus Ohio
2018 ERP Trends - Macola - Nick Mears - Columbus Ohio2018 ERP Trends - Macola - Nick Mears - Columbus Ohio
2018 ERP Trends - Macola - Nick Mears - Columbus OhioNick Mears
 
11 Reasons Companies Will Move Their Accounting To The Cloud in 2016
11 Reasons Companies Will Move Their Accounting To The Cloud in 201611 Reasons Companies Will Move Their Accounting To The Cloud in 2016
11 Reasons Companies Will Move Their Accounting To The Cloud in 2016Dean Dorton Software Team
 
5 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 20215 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 2021CompunnelDigital1
 
OpsRamp 5.0 Webinar
OpsRamp 5.0 WebinarOpsRamp 5.0 Webinar
OpsRamp 5.0 WebinarOpsRamp
 
Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017SMAU
 
SMAC Keynote by Malay Shah from Ernst & Young
SMAC Keynote by Malay Shah from Ernst & YoungSMAC Keynote by Malay Shah from Ernst & Young
SMAC Keynote by Malay Shah from Ernst & YoungTiE Bangalore
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationEric Lightfoot
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
A report into the future of erp part 1 of 3 dh
A report into the future of erp part 1 of 3 dhA report into the future of erp part 1 of 3 dh
A report into the future of erp part 1 of 3 dhDenitza Harizanova
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
MT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsMT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsDell EMC World
 
Vmw top5-reasons-infographic
Vmw top5-reasons-infographicVmw top5-reasons-infographic
Vmw top5-reasons-infographicVMware Academy
 
IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0Rahul Singh
 
Impact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look atImpact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look atVivek Mishra
 
Back Office Transformation | Accenture
Back Office Transformation | AccentureBack Office Transformation | Accenture
Back Office Transformation | Accentureaccenture
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu India
 

Was ist angesagt? (20)

Cloud mrp a great choice for manufacturers of any size
Cloud mrp a great choice for manufacturers of any sizeCloud mrp a great choice for manufacturers of any size
Cloud mrp a great choice for manufacturers of any size
 
Business first cloud architecture model Making Performance Matter
Business first cloud architecture model Making Performance MatterBusiness first cloud architecture model Making Performance Matter
Business first cloud architecture model Making Performance Matter
 
Erp – facts, statistics, and trends in 2017
Erp – facts, statistics, and trends in 2017Erp – facts, statistics, and trends in 2017
Erp – facts, statistics, and trends in 2017
 
2018 ERP Trends - Macola - Nick Mears - Columbus Ohio
2018 ERP Trends - Macola - Nick Mears - Columbus Ohio2018 ERP Trends - Macola - Nick Mears - Columbus Ohio
2018 ERP Trends - Macola - Nick Mears - Columbus Ohio
 
11 Reasons Companies Will Move Their Accounting To The Cloud in 2016
11 Reasons Companies Will Move Their Accounting To The Cloud in 201611 Reasons Companies Will Move Their Accounting To The Cloud in 2016
11 Reasons Companies Will Move Their Accounting To The Cloud in 2016
 
5 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 20215 Digital Transformation Resolutions CIOs Need to Keep in 2021
5 Digital Transformation Resolutions CIOs Need to Keep in 2021
 
OpsRamp 5.0 Webinar
OpsRamp 5.0 WebinarOpsRamp 5.0 Webinar
OpsRamp 5.0 Webinar
 
Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017
 
SMAC Keynote by Malay Shah from Ernst & Young
SMAC Keynote by Malay Shah from Ernst & YoungSMAC Keynote by Malay Shah from Ernst & Young
SMAC Keynote by Malay Shah from Ernst & Young
 
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business TransformationIDC- BMC Digital Enterprise Management Powers Digital Business Transformation
IDC- BMC Digital Enterprise Management Powers Digital Business Transformation
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
A report into the future of erp part 1 of 3 dh
A report into the future of erp part 1 of 3 dhA report into the future of erp part 1 of 3 dh
A report into the future of erp part 1 of 3 dh
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
MT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsMT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing Innovations
 
Achieving Cloud Relevance
Achieving Cloud RelevanceAchieving Cloud Relevance
Achieving Cloud Relevance
 
Vmw top5-reasons-infographic
Vmw top5-reasons-infographicVmw top5-reasons-infographic
Vmw top5-reasons-infographic
 
IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0IoT Manufacturing Solutions For Industry-4.0
IoT Manufacturing Solutions For Industry-4.0
 
Impact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look atImpact of Coronavirus on Software and Services: Top Figures to Look at
Impact of Coronavirus on Software and Services: Top Figures to Look at
 
Back Office Transformation | Accenture
Back Office Transformation | AccentureBack Office Transformation | Accenture
Back Office Transformation | Accenture
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
 

Ähnlich wie Cybersecurity in the Cloud: Safer Than You Think

5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPEric Opp
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already BehindAvni Rajput
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 
50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The Cloud50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The CloudApptix
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
How You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital ExperienceHow You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital ExperienceAlaina Carter
 

Ähnlich wie Cybersecurity in the Cloud: Safer Than You Think (20)

5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WP
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already Behind
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The Cloud50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The Cloud
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Oracle
OracleOracle
Oracle
 
Schoology cloud assignment
Schoology cloud assignmentSchoology cloud assignment
Schoology cloud assignment
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
How You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital ExperienceHow You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital Experience
 

Mehr von Appian

How to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit CentersHow to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit CentersAppian
 
Digital Transformation for Turnaround Processes
Digital Transformation for Turnaround ProcessesDigital Transformation for Turnaround Processes
Digital Transformation for Turnaround ProcessesAppian
 
The Next Generation of Contact Centers
The Next Generation of Contact CentersThe Next Generation of Contact Centers
The Next Generation of Contact CentersAppian
 
How Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected ProcessesHow Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected ProcessesAppian
 
The Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life SciencesThe Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life SciencesAppian
 
Why Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent AutomationWhy Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent AutomationAppian
 
The Top 5 Trends in Customer Centers
The Top 5 Trends in Customer CentersThe Top 5 Trends in Customer Centers
The Top 5 Trends in Customer CentersAppian
 
Six Myths of Digital Transformation Debunked
Six Myths of Digital Transformation DebunkedSix Myths of Digital Transformation Debunked
Six Myths of Digital Transformation DebunkedAppian
 
COTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good EnoughCOTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good EnoughAppian
 
How to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPMHow to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPMAppian
 
Keeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation JourneyKeeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation JourneyAppian
 
Process Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological ChangeProcess Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological ChangeAppian
 
How Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around DigitalHow Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around DigitalAppian
 
Digital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the HolidaysDigital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the HolidaysAppian
 
Future Trends in Federal Grants Management
Future Trends in Federal Grants ManagementFuture Trends in Federal Grants Management
Future Trends in Federal Grants ManagementAppian
 
3 Signs RPA is For You
3 Signs RPA is For You3 Signs RPA is For You
3 Signs RPA is For YouAppian
 
Is Low-Code Enough to Build Enterprise-Class Apps?
Is Low-Code Enough to Build Enterprise-Class Apps?Is Low-Code Enough to Build Enterprise-Class Apps?
Is Low-Code Enough to Build Enterprise-Class Apps?Appian
 
Low-Code vs. Programming – It Isn’t an Either/Or Decision
Low-Code vs. Programming – It Isn’t an Either/Or DecisionLow-Code vs. Programming – It Isn’t an Either/Or Decision
Low-Code vs. Programming – It Isn’t an Either/Or DecisionAppian
 
How Smart Software Drives Down the Cost of Pension Operations
How Smart Software Drives Down the Cost of Pension OperationsHow Smart Software Drives Down the Cost of Pension Operations
How Smart Software Drives Down the Cost of Pension OperationsAppian
 
How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...
How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...
How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...Appian
 

Mehr von Appian (20)

How to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit CentersHow to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit Centers
 
Digital Transformation for Turnaround Processes
Digital Transformation for Turnaround ProcessesDigital Transformation for Turnaround Processes
Digital Transformation for Turnaround Processes
 
The Next Generation of Contact Centers
The Next Generation of Contact CentersThe Next Generation of Contact Centers
The Next Generation of Contact Centers
 
How Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected ProcessesHow Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected Processes
 
The Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life SciencesThe Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life Sciences
 
Why Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent AutomationWhy Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent Automation
 
The Top 5 Trends in Customer Centers
The Top 5 Trends in Customer CentersThe Top 5 Trends in Customer Centers
The Top 5 Trends in Customer Centers
 
Six Myths of Digital Transformation Debunked
Six Myths of Digital Transformation DebunkedSix Myths of Digital Transformation Debunked
Six Myths of Digital Transformation Debunked
 
COTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good EnoughCOTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good Enough
 
How to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPMHow to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPM
 
Keeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation JourneyKeeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation Journey
 
Process Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological ChangeProcess Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological Change
 
How Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around DigitalHow Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around Digital
 
Digital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the HolidaysDigital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the Holidays
 
Future Trends in Federal Grants Management
Future Trends in Federal Grants ManagementFuture Trends in Federal Grants Management
Future Trends in Federal Grants Management
 
3 Signs RPA is For You
3 Signs RPA is For You3 Signs RPA is For You
3 Signs RPA is For You
 
Is Low-Code Enough to Build Enterprise-Class Apps?
Is Low-Code Enough to Build Enterprise-Class Apps?Is Low-Code Enough to Build Enterprise-Class Apps?
Is Low-Code Enough to Build Enterprise-Class Apps?
 
Low-Code vs. Programming – It Isn’t an Either/Or Decision
Low-Code vs. Programming – It Isn’t an Either/Or DecisionLow-Code vs. Programming – It Isn’t an Either/Or Decision
Low-Code vs. Programming – It Isn’t an Either/Or Decision
 
How Smart Software Drives Down the Cost of Pension Operations
How Smart Software Drives Down the Cost of Pension OperationsHow Smart Software Drives Down the Cost of Pension Operations
How Smart Software Drives Down the Cost of Pension Operations
 
How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...
How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...
How to Deliver Your Digital Insurance Strategy with a Digital Transformation ...
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Cybersecurity in the Cloud: Safer Than You Think

  • 1. Cybersecurity in the Cloud: Safer Than You Think
  • 2. The explosion of cloud computing has connected more people than anyone ever imagined... But the massive number of companies migrating to the cloud has amplified the urgency of data security and regulatory compliance.
  • 3. Cloud Migration Is Relentless It turns out that 96% of today’s enterprises are using at least one public or private cloud, according to RightScale’s 2018 State of the Cloud Report. Forrester’s experts predict that public cloud expenditures will grow from $146 billion in 2017 to $236 billion in 2020. Approximately 80% of tech company professionals are using cloud-based apps, according to Citrix. At companies with flexible workplaces, 57% of professionals are working in the cloud.
  • 4. Don’t Get Snagged on the Insecurity Myth The skeptics get snagged on lingering assumptions that cloud technology is insecure. Perhaps the trust gap is perpetuated by the numerous data breach horror stories that litter the Web. But don’t let the cyber smash and grab headlines stop you from giving cloud the benefit of the doubt. “You have to institutionalize security as part of your business model.” - Omesh Agam, Chief Information Security Officer at Appian.
  • 5. Raising the Bar on Security Standards “We have a myriad of compliance certifications that we have to maintain to provide a base level of assurance to customers, as well to ourselves, that we're operating in accordance with the highest security standards.” - Omesh Agam
  • 6. Cyber Attacks Spreading Like Wildfire Anywhere from 300,000 to a million viruses and other malicious software products are created by hackers every day. This includes the usual suspects—DDoS attacks, data breaches, ransom demands, and theft of proprietary information. And that’s just the tip of the iceberg. From a business standpoint, cybercrime drains a staggering $600 billion a year from the global economy, according to the Center for Strategic & International Studies. !
  • 7. Cloud Is Safer than Many Legacy Systems Gartner predicts that worldwide security spending will reach $96 billion in 2018, up 8% from 2017. CNBC recently reported that cybercrime is the fastest-growing crime in the U.S. In 2018, the 60% of enterprises that implement the right cloud security tools will experience one-third fewer security failures. Through 2020, public cloud Infrastructure as a Service workloads will suffer at least 60% fewer security incidents than those in traditional data centers. Through 2022, at least 95% of cloud security failures will be the customer’s fault. HACKED
  • 8. The Security Risk Is Marvin in Marketing, not the Cloud Human error is the main cause of security breaches. Yep, it’s usually just Marvin in marketing, who unknowingly downloads a malicious file and exposes your organization to cyber attacks. On average, employees receive less than two hours of security training per year, according to the FPA study. 48% of enterprises don’t have an employee security awareness program, according to Forbes.
  • 9. Compliance in the Cloud On the compliance side, the best cloud services cover all of the major security domains and controls, including: Association of International Certified Professional Accountants (AICPA) cybersecurity risk management reporting framework Payment Card Industry Data Security Standard (PCI DSS), which is an international framework for data security standards Health Insurance Portability and Accountability Act of 1996 (HIPAA), which is US law that provides data privacy andsecurity provisions for safeguarding medical information.
  • 10. Sharing the Control Stack Without the enormous security intelligence capability of a cloud platform, detecting suspicious patterns in massive amounts of operational data would be like mission impossible for most enterprises. Managed cloud services makes it easier to keep up with security upgrades and scale up operations at speeds not possible before. “Now, that doesn’t mean you can forget about compliance in business and security requirements.” - Omesh Agam, Appian “It means moving towards a shared controls framework. And what that means is that you’re now sharing the control stack with someone else.”
  • 11. Continuous Multi-layer Monitoring At Appian, we have continuous monitoring of multiple layers with our infrastructure providers at their physical hardware level, their data centers, servers, and platform level as well. “You don’t get to ignore basic logging and monitoring hygiene just because you’re using a SAAS provider.” More than 85% of enterprise IT organizations will commit to multi-cloud architecture by 2018, according to IDC. About 75% of developer teams will include cognitive/artificial intelligence functionality in cloud applications. And most of these will be sourced from the cloud.
  • 12. Are You Ready for General Data Protection Regulation? With the implementation of GDPR, companies will have to report data breaches to regulators—and inform customers—within 72 hours. And the cost of non-compliance? In a word, steep. Violators could get hit with a €20 million euro fine, or forfeit up to 4% of their global revenues, whichever is greater. GDPR hasn’t stopped digital leaders from migrating to the cloud. To put things in perspective, public cloud spending will grow at nearly seven times the rate of overall IT spending, according to IDC. By 2020, public cloud spending will reach $203.4 billion worldwide, from an estimated $122.5 billion in 2017. €
  • 13. Experts: Public Cloud to Continue Trending Up So, if you’re thinking about stepping up to cloud adoption, but you’re worried about data security in your enterprise operations, what should you do? Take stock of your most critical internal assets, and understand how data flows both inside and outside your organization. Number one, from your own internal organization, you should take stock of your most critical assets, and understand how data flows inside and outside your organization.
  • 14. Know Security Requirements for Your Data It's essential to know your data security requirements, because that'll let you have a more open and honest conversation with your cloud vendor’s security officer about your compliance and regulatory requirements.
  • 15. Security Review Not Just Cloud Vendor’s Job It’s a continuous process that’s continuously evolving. You should constantly maintain it, which means conducting security reviews on a regular basis. Conduct audits by reading your vendors audit reports, their SOC reports, their PCI reports. The essential lesson: Take a policy-based approach to controlling what people can and can’t do with your business-critical data, across your organization.