APAC CIO Outlook
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Agile

    AI Healthcare

    Artificial Intelligence

    Aviation

    Bi and Analytics

    Big Data

    Cloud

    Cyber Security

    Digital Infrastructure

    Digital Marketing

    Digital Transformation

    Digital Twin

    Drone

    Internet of Things

    Low Code No Code

    Networking

    Remote Work

    Smart City

    Startup

    Unified Communication

    Wireless

  • E-Commerce

    Education

    FinTech

    Healthcare

    Manufacturing

    Pharma and Life Science

    Retail

    Travel and Hospitality

  • Dell

    IBM

    Microsoft

    Salesforce

    SAP

  • Cognitive

    Compliance

    Contact Center

    Corporate Finance

    Data Center

    Data Integration

    Digital Asset Management

    Full Stack Development

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    Proptech

    RegTech

Menu
    • Travel and Hospitality
    • Compliance
    • IBM
    • Big Data
    • Unified Communication
    • Digital Infrastructure
    • Data Center
    • Salesforce
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Travel and Hospitality
    Editor's Pick (1 - 4 of 8)
    left
    How Cloud Systems are Impacting Business Environments

    Martin Stegner, CIO, NOVUM Hospitality

    The Impact Of Technology On Travel And Hospitality

    Steve Traplin, CEO, Groupon APAC

    Infinite Retailing, And Beyond

    Frank Trampert, Managing Director & Chief Commercial Officer, Sabre Hospitality Solutions, APAC

    Which Technology Best Suits the Hospitality Sector?

    Jessie Burgess, Executive Vice President, CIO, G6 Hospitality LLC

    Enter into the World of the Internet-of-Things or IOT

    Alfonso Venturi, CIO, Lease Plan Australia

    UX-The Broad Picture from 'What was' to 'What it's going to be'

    Kamal Sharma, CIO, Tally Solutions Pvt. Ltd.

    Wearables to Play an Integral Role in Guest Service

    Monika Nerger, Chief Information Officier, Mandarin Oriental Hotel Group

    How to Systemize Business Travel and Take Out Every Pain Point

    Ross Fastuca, CIO & Co-founder, Locomote

    right

    Using Cloud migration as security opportunity

    Cyril Segretain, Information Security Officer Europe, Uniqlo

    Tweet
    content-image

    Cyril Segretain, Information Security Officer Europe, Uniqlo

    Security needs to be thought by design. Included in the early stage of any application or digital project to be as efficient as possible and address the accurate risks. But security appeared after applications and securing legacy IT systems turned out to be a real challenge.

    The multiplication of public and private cloud and solutions as a service such as SaaS, PaaS and IaaS answers a new trend to use external hosting providers and suppliers for applications. Most of the companies now use multiple cloud providers and solutions for their core business or support applications. Either cloud brought them new project and usage, or just a simple way to migrate existing applications to a cheaper hosting solution with great performance.

    Migration to the Cloud is a real opportunity for Information Security departments and I feel that we can include ourselves directly in the migration project and review the security by design of the legacy application. The exact legacy application that we would never have been allowed to understand the windings and security only because “it works”. Moving this application to the Cloud is a good opportunity to change this to “it works, and it is secure” by understanding risks and reducing them.

    Building a Cloud project management methodology will enable companies to introduce security by design and start the security by default for the next projects.

    As Information Security professionals, we need to be proactive on understanding Cloud technologies and their security. Cloud solutions were built to answer most of the problematics of their customers, so they often include security tools or capabilities. Enabling and using the embedded security in the Cloud solutions might already raise the security maturity of the company and answer to some main business risks such as resilience.

    If security, instead of being an obstacle in application development and deployment, becomes a driving force for Cloud migration and implementation, there will be a possibility to review the global architecture to adapt it to the Cloud by including security and performance at the same time. And your company will be able to present a more secure and efficient product to your customers based on these enhancements.

    Legacy systems can be a real problem for companies as they need to be maintained for a very specific business purpose that tends to accept all risks linked to discovered vulnerabilities or depreciation. Migrating these systems to a Cloud solution will help covering new vulnerabilities in a more timely manner and limit technical depreciation.

    But the ease of access and use of Cloud technologies brings an important risk around shadow IT where applications and systems are neither secured nor known by the Information Security department of your company. With any incident on these specific unknown systems, such liabilities will only be noticed when impacts are no longer acceptable. Using Cloud solutions in a company needs to be driven to avoid shadow solutions and unidentified risks.

    Cloud solutions are still new and constantly changing, therefore risks linked to these technologies need to be assessed. Indeed, Cloud is used to transfer some availability and material risks to the Cloud provider. Risk analysis must be performed on Cloud systems to implement security and define clear scopes of responsibility of different stakeholders.

    The growing use of Cloud solutions and platforms is a great opportunity for every company to include information security by design, but it needs to be framed by a risk analysis to define responsibilities and security needs.

    tag

    Information Security

    SaaS

    Weekly Brief

    loading
    Top 10 Travel and Hospitality Solution Companies - 2021

    Featured Vendors

    techhighway systems

    Dipali Bendre & Fabian Fernandes, CEO & CIO

    pt realtachakradarma

    G. Hidayat Tjokrodjojo, Chairman

    ON THE DECK

    Travel and Hospitality 2021

    Top Vendors

    Travel and Hospitality 2020

    Top Vendors

    Travel and Hospitality 2019

    Top Vendors

    Travel and Hospitality 2018

    Top Vendors

    Travel and Hospitality 2017

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Future-Proofing Data Center Designs with a Dash of Innovation

    Future-Proofing Data Center Designs with a Dash of Innovation

    Kevin Miller, Principal, Digital Management, Aurecon
    How Agile Adapted In A Covid-19 World

    How Agile Adapted In A Covid-19 World

    Beth Schmidt, Director, It Delivery And Agile Operations, Markel
    Agile Mindset in a Nutshell

    Agile Mindset in a Nutshell

    An Interview With Samuel Calan, Head Web Frontend, Raiffeisen Switzerland
    Agile Delivery of Semiconductor Facilities

    Agile Delivery of Semiconductor Facilities

    Manuel Magg, Project Director, Exyte
    For a Smarter City: Trust the Data, Ignore the Hype

    For a Smarter City: Trust the Data, Ignore the Hype

    BRAD DUNKLE, DEPUTY CIO, CITY OF CHARLOTTE
    How to Create and Implement Scalable Digital Solutions for Smart Factory

    How to Create and Implement Scalable Digital Solutions for Smart Factory

    MARKO YLI-PIETILÄ, HEAD OF SMART OPERATIONS, STORA ENSO (HEL: STERV)
    What it Takes to be a 21st Century Public Safety Provider!

    What it Takes to be a 21st Century Public Safety Provider!

    Ned Pettus, Jr., Ph.D. Public Safety Director, The city of Columbus, Ohio
    Introducing Smart City Solutions into Highly Regulated Municipal Environments

    Introducing Smart City Solutions into Highly Regulated Municipal Environments

    Nelson Gonzalez, Assistant It Director/Ciso, City Of Coral Gables
    Loading...

    Copyright © 2022 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    |  Sitemap |  Subscribe |   About us

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://travel-and-hospitality.apacciooutlook.com/cxoinsights/using-cloud-migration-as-security-opportunity-nwid-7894.html