Taking a Data-Centric Approach to Security in the Cloud

As organizations move business-critical applications from legacy on-premises systems to the Cloud, they need to fully evaluate their approach to security. Traditionally, IT security has focused on strong perimeter security – “keeping the good stuff in and the bad guys out.” But moving to the cloud – where business-critical data may be stored by cloud service providers in distributed locations – necessitates companies to rethink how to provide security, compliance, and peace-of-mind.

During this Boardroom, attendees will cover the following topics: · Principles and advantages of a data-centric approach to cloud security
· Considerations when assessing and deploying security for varying types of cloud data and applications
· Encryption and tokenization – what, when and how, including requirements such as access controls, key management and searchability