It is very easy to subscribe to a cloud service. You do not need any specialized IT knowledge and any department can do that using a credit card. In consequence you will face an astonishingly increasing amount of cloud services in your company. What most cloud providers won't tell you is that your lately subscribed cloud service is mostly empty. How do you populate those cloud services? Putting everyone in any cloud could not be the right answer regarding information security and data protection law. Cloud-services are fast moving targets. Updates and changes are driven by the cloud vendor. How do you keep up with user provisioning? Since cloud services are regarded as essential part of the digital transformation - at least they will bring more flexibility and speed of change into IT - IDM should rather be enabler than a showstopper. The challenge is how to identify what is really important and how to find a suitable model for reducing IDM to its minimum.
Key topics:
There is no question that a multi-cloud environment is fast becoming the dominant IT model of the future, and securing data in this new model has emerged as one of the top challenges for most organizations. If data security used to be a serious challenge when all your data was in one place, what does it now mean to have that data spread across multiple places; from private data centers to hosting partners, to a variety of cloud service providers.
And to further complicate matters, your organization is probably required to comply with an ever-increasing set of industry and government mandated regulations across all these different cloud environments. We have fundamentally gone from a one-dimensional data security nightmare to a multi-dimensional data security nightmare!
Join this session and learn about how this new reality can impact your organization’s data security posture, even with the right security technologies in place such as encryption and key management.
Key Takeaways: