APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • CXO Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Security
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Security
    Editor's Pick (1 - 4 of 8)
    left
    The Organization's Responsibility for its Own Protection

    Michael Wallmannsberger, Chief Information Security Officer, Wynyard Group

    Don't Rush to Hire an Anti-DDoS Expert!

    Barry Greene, Co-founder and Chief, Technical Officer, GETIT

    Attaining the Needs of Infrastructure Investment

    Yong Chiang Neo, CIO

    Constructing a Marketing IT Collaboration

    Jenny Williams,

    The Organic Adaptability of IT

    Pedro Sttau,

    The Weakest Link Is Your Strongest Security Asset

    Christian Anschuetz, CIO & Security Practitioner, UL

    Achieving Greater Business Value with Innovation

    Denise A. Saiki, CIO& VP Enterprise Business Services, Lockheed Martin

    Using Data Analytics for Loss Prevention

    Jonathan Lowsley, CIO, ADrive

    right

    Cloud Adoption Rate Hike Spurs Demand for Security Professionals

    Julie Peeler, Foundation Director, (ISC)²

    Tweet
    content-image

    Julie Peeler, Foundation Director, (ISC)²

    For many organizations, cloud adoption is no longer a question of if, but how much. Several factors are contributing to rapid growth and change in the cloud computing market. The cloud provides multiple business and consumer benefits, many of which relate to business agility and cost of ownership. In the coming years, cloud computing will grow largely at the expense of traditional IT. As organizations replace traditional IT architectures with cloud models, cloud expertise will move from a “nice to have” capability to a “must have.”

    "The growing adoption of cloud services will increase the demand for security professionals who can apply the proper controls to public, private, community and hybrid cloud models"

    In fact, of nearly 14,000 respondents from the 2015 (ISC)² Global Information Security Workforce Study (GISWS) by Frost & Sullivan, 43 percent state that cloud is a priority for their organizations and 57 percent of total respondents state it will become even more of a priority over the next two years. Cloud computing was also identified as the top area of information security with growing demand for education and training within the next three years. Further, 73 percent of respondents believe it will require information security professionals to develop new skills.

    According to the 2015 Cloud Security Spotlight Report—a survey of over 1,000 cyber security professionals—cloud computing is delivering on the hype in terms of flexibility, availability and cost reductions. However, security and compliance remain the biggest concerns. Security is still the biggest perceived barrier to further cloud adoption, and nine out of ten organizations are very or moderately concerned about public cloud security. Cloud computing has emerged as a critical topic area within IT that requires further security considerations.

    Despite growing cloud adoption rates, information security professionals are concerned over data breaches, data loss and other security risks. Specialized skills will be required in cloud security to close the gap between increasing cloud adoption and high levels of security concerns.

    The growing adoption of cloud services will increase the demand for security professionals who can apply the proper controls to public, private, community and hybrid cloud models. With more organizations moving infrastructure to the cloud, protecting and securing data has become increasingly complex. Cloud service providers, organizations adopting cloud services and professional service firms assisting with cloud management and implementation will all need qualified cloud professionals.

    Many long-standing information security best practices are appropriate for cloud computing environments. However, managing and utilizing cloud computing introduces new complexities and challenges that cannot be addressed with traditional information security approaches. The industry needs professionals who understand and can apply effective security measures to cloud environments.

    For instance, consider the architecture: Cloud computing not only uses multiple layers of virtualized computing, it automates “on-demand” provisioning and configuration of those layers, enabling extremely dynamic systems whose resources can appear and disappear in seconds and minutes. Now, it is often the case that critical communications data relevant to information security no longer traverses a network topology, instead using a hypervisor backplane. With the physical infrastructure dynamically divorced from the server, application and networking functions, security practices must adjust. Further complicating the security challenge are the many variations of cloud models, each with its own risk profile.  Detailing the prevalence of various cloud models, the 2015 (ISC)² GISWS found that cloud is primarily used for Software as a Service (SaaS)(44 percent of respondents), followed by Infrastructure as a Service (IaaS), and the least common is Platform as a Service (PaaS)(24 percent).

    The largest proportion of cloud usage centers on private cloud usage (52 percent of respondents), while other uses comprise less than half of total cloud usage – public cloud computing services (22 percent), hybrid cloud computing services (16 percent), and community cloud computing services (10 percent).  So what methods should information security professionals employ to increase cloud assurance? Further from these findings, the largest proportion of information security professionals believes that data encryption (18 percent of respondents) is the surest path to elevating cloud assurance. The second and third methods include continuous monitoring (11 percent) and incorporating security into design and implementation (9 percent), respectively.  In addition to the model and cloud assurance consideration aspects, when organizations consider cloud adoption, the people aspect should be a crucial component of the evaluation and ultimate decision making processes. Having qualified people lead a thorough evaluation process can help organizations responsibly take advantage of cloud services. IT professionals who understand how cloud services can be securely implemented and managed within their organization’s IT strategy and governance requirements are essential.   

    tag

    Cloud Computing

    Information Security

    SaaS

    Weekly Brief

    loading
    25 Most Promising Enterprise Security Solutions Providers
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Advancing Retail through E-Commerce, Cloud and Cyber security

    Advancing Retail through E-Commerce, Cloud and Cyber security

    John Gaspar Antonio, CIO/Vice President for Information Technology & E-Commerce / Data Protection Officer, Metro Retail Stores Group
    From Code To Impact: Leading Enterprise Ai With Purpose

    From Code To Impact: Leading Enterprise Ai With Purpose

    Jingting Cher, Deputy Director, Data Science, Sp Group
    Reimagining Pension Services Through Responsible Innovation

    Reimagining Pension Services Through Responsible Innovation

    Maz Mirza, Chief Digital Officer, KWAP Malaysia
    Maritime: Beyond Systems, Beyond Seas

    Maritime: Beyond Systems, Beyond Seas

    Ron Fong, Cio, Station Satcom
    Human-Centered Innovation in the GenAI Era

    Human-Centered Innovation in the GenAI Era

    CJ Meadows, Head of Innovation-Asia, Executive Education Designer, Professor & Head of Mbaconsulting, S P Jain School Of Global Management
    The Art and Science of Selling

    The Art and Science of Selling

    Scott White, Senior Manager Sales and Marketing Operations, Airbus
    Responsible Data Leadership in an AI-Driven World

    Responsible Data Leadership in an AI-Driven World

    Gemma Dias, Head of Data Governance, Tyro Payments
    Driving Guest-Centric IT Innovation in Integrated Resorts

    Driving Guest-Centric IT Innovation in Integrated Resorts

    Ching Yip, Vice President of Information Technology, Hoiana Resort & Golf
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://security.apacciooutlook.com/cxoinsights/cloud-adoption-rate-hike-spurs-demand-for-security-professionals-nwid-278.html