Grant Asplund: Proven multi-channel senior sales and marketing executive with history of exemplary achievement introducing/launching new products and establishing large, long-lasting pipelines and revenue growth within leading technology companies and start-ups.

Shawn Luyke: Cloud Security Architect at Check Point across APAC with 18 years of experience in the Vendor, ISP’s and Enterprise industry, focusing on network infrastructure optimization, network security improvements, and securing cloud environments.

Get insights into leading cloud security best practices and more. Join cyber security experts in a compelling discussion that will enable you to competently develop reliable, competitive, and secure strategies for your distributed cloud environment. Innovate, excel and increase your organization’s agility by dramatically evolving your cloud security best practices.

What are essential considerations for leaders in developing a cloud-native security platform?

Cloud network security and posture management. We can’t stress these items enough. The fact is that the cloud is really quite challenging and complex when compared to on premise. There are many variations of cloud, and it’s critical that leaders seek out security platforms that offer a broad range of capabilities in order to support the organization.

The nine best practices that organizations should be considering when looking at cloud security?

  1. Plan properly. Otherwise, your organization might end up on the front page of the Wall Street Journal. The nuances and subtleties of cloud can really take organizations by surprise. Consult with a trusted cloud security advisor. Use their knowledge to help you build security from the get-go.
  2. Prevention is the only option. Detection exposes organizations to risky and expensive cloud threats. What you need to do is to really think about preventing threats, and architecting with micro-segmentation and zero trust practices to minimize any potential compromises that you may experience. There is real danger before the threat is managed.
  3. Protect all of your perimeters. On-premise, there is only one perimeter to protect. In the cloud, each service, access role and workload creates new perimeters. Each of those perimeters needs to be managed. So this really is an area that’s quite a bit different from what we’re used to.
  4. Visibility is everything. You can’t secure what you cannot see. And if you can’t secure it, you’re in trouble. You need tools that give you broad “peripheral vision,” so to speak, into the entire platform.
  5. Prepare for all scenarios. The cloud is constantly evolving. What we’ve seen within the past 18 months is that we should be expecting the unexpected; we need to be prepared for the next disaster because resiliency has become a part of the new normal.
  6. Trust no one. Adopt zero trust security in everything that you do. Networks, people, devices, data and workloads all have their own perimeter and their own access and identity privileges. This is absolutely critical.
  7. Use cloud-native solutions. The cloud is scalable, dynamic and agile. Using old-school tools is a faulty methodology. Seek out tools that are built and designed for the cloud. That’s the only way to really get the most and the best out of the cloud.
  8. Secure containers and serverless. Wake up! Your cloud security solutions need to move into the modern age. You need to invest in partners and experts who can help you architect your solution for the long-haul. Also, recognize that you need to invest in a platform that’s going to be able to keep up with the fast pace of the new technologies within the cloud.
  9. Choose solutions with broad capabilities. More disparate cloud security solutions = more complexity + integration spaghetti + more staffing training + maintenance overheads, which turns into a small nightmare.  Instead of multiple solutions with narrower functionalities that don’t play nicely together, obtain a unified cloud security solution.

In conclusion

Progressively increase your state-of-the-art security development and in the process, leverage idea-sharing modalities, like expert-led webinars. Get more great insights into top security considerations -from advanced threat prevention, to integration, to visibility- in Shawn Luyke and Grant Asplund’s dynamic and informative BrightTALK presentation. Lastly, to receive impactful insights, cutting-edge analysis and robust resources each week, sign up for the Cyber Talk newsletter.