“Cloud is about how you do computing, not where you do computing.” The essence of this statement seeks to debunk certain misconceptions around cloud. The most common one is, that all remote computing equals cloud computing.
According to Amazon Web Services, “cloud computing is the on-demand delivery of computing power, database storage, applications, and other IT resources through a cloud services platform via the Internet with pay-as-you-go pricing.” This definition depicts the most precise narrative that describes this modern age digital framework.
As organizations rapidly adopt cloud networks, due to flexibility, scalability, cost effectiveness and more, security needs to be at the front and centre. Security can be understood in many aspects. It could be the strengthening of core systems to prevent cyber attacks, or it could be a changing of the entire thought process and understanding organisations ability to prepare, respond, and recover when cyberattacks happen is what is of essence.
An organization has cyber resilience if it can defend itself against these attacks, limit the effects of a security incident, and guarantee the continuity of its operation during and after the attacks.
Organizations today are beginning to complement their cybersecurity strategies with cyber resilience. While cybersecurity’s main aim is to protect information technology and systems, cyber resilience focuses more on making sure the business is delivered. Its intended outcome is business delivery, keeping business goals intact rather than the IT systems.
Cyber resilience in Kenya and the East African community, and Protec go hand in hand. In times of the drastic and fast change, they provide the best information security, risk management and audit services – bringing stability and peace of mind to their customers. Their approach is based on the NIST Cybersecurity Framework but always take into account a cyber resilient strategy that works.
The biggest risk with the cloud is that there is no perimeter. Traditional cyber security focuses on protecting the perimeter, but cloud environments are highly connected which means insecure APIs (Application Programming Interfaces) and account hijacks can pose real problems. Faced with cloud computing security risks, cyber security professionals need to shift to a data-centric approach.
Interconnectedness and a data-centric approach points to one thing: Cyber resilience. Join the information security industry experts as they discuss strategies, tools and solutions to ensure your organisation is secure. Especially now with cyber resilience bringing a new avenue to security conversations.
Register for the virtual Cloud and Security summit here: https://cioea.glueup.com/event/east-africa-virtual-cloud-security-summit-27158/?pk_campaign=widget-event-list
Write to us firstname.lastname@example.org