Beyond Cloud Video Interview with James Rees from Razor Thorn Security

IntelligentHQ.com in partnership with Groupe INSEEC London presents: A Beyond Cloud Interview with James Rees from Razor Thorn Security.

The Beyond Cloud Series of video discovery discussions examines the viewpoints of some of the top minds in the UK cloud computing space as they share their views on the trends, issues and realities of the industry – and the industries which it impacts.

Many enterprises today deploy hybrid cloud environments comprised of a combination of private and public clouds , with the knock on effect of generating legitimate concerns about ensuring proper governance of these environments. There are many new security challenges not always well understood by those migrating to the new technology, leaving Businesses apprehensive yet at the same time they are eager to embrace cloud computing and the capabilities it may offer. The recent AIIM Trendscape report, “Content in the Cloud” highlighted several concerns:

  • Privacy, risk and security breaches are top of mind. It’s important for IT leaders to understand country and region-specific laws and location requirements.
  • Cloud computing opens the door to many new challenges when it comes to integration.

Certainly various schemes have been proposed under different systems and security models, taking great effort to design solutions that meet various requirements as diverse as efficient, stateless verification and retrieval of data. It would also appear that the “Snowden effect” and the PRISM fallout has hammered home the fact that companies need to do more to protect client data. Vineet Jain writing in a Pando Daily article describes the reaction of large Corporations to the unfolding drama:

“You, Edward, have shown the public that there is a need for more — more protection, more privacy, and more control. While just over half (52 percent) of companies are storing any files in the cloud, they entrust only a small percentage of files to cloud storage (13 percent of all files, on average). There needs to be a place where their files can sit without being vulnerable to government surveillance. Users want a choice of what they can share, when they want to share it, and with whom they share it. And businesses need to ensure that all of their customers’ private files remain private”.

“I would also like to thank you, Mr. Snowden, for making businesses take action rather than just talk about it. Companies like Lincoln Financial, IKEA, and Bulova are now taking back control of their data, thereby making their IT departments relevant again. When their files cannot be trusted to live in a cloud-only environment, IT ensures that the security, location of data storage, data redundancy, etc. are bullet proof — or PRISM proof, if you will”.

For most companies the path forward to establishing, or re-taking, control over IT services in the cloud involves tech that has been enhanced by secure web gateways, coupled with the correct application of recent developments in encryption and identity management. A key objective would be to establish a ‘security layer’ in between the company and the cloud. While a very simplified definition, such a “layer” would orchestrate multiple functions to enable secure access to enterprise data and applications while reducing or eliminating the loss of information that cannot be compromised.

James Rees makes the point in the discussion which all companies need to bear in mind: “if someone hands you their CRM database you better make sure it is secure and you better make sure you can prove it is secure”.

About

Razor Thorn Security’s head James Rees has worked specialising in Information Security and consultancy for fourteen years, delivering quality advice to some of the largest and most influential organisations in the world. A recognized leader in his field he regularly blogs, writes articles and communicates to the business leaders of the world on the importance of information security in the modern business environment.

During his fourteen years in Information Security, James has had the privilege of working with many of the top global companies from a wide range of industry sectors, from complex financial institutions to cutting edge research and development organisations.

James has helped companies of all sizes become more aware of the increasing dependence that modern society has on its technology, as well as helping those same companies to protect their business critical assets, through effective management of risks and threat to an organisations well-being in a cost effective, realistic and proactive method.

About the Beyond Cloud series

Taking a conversational, interactive approach, we pose four broad but critical questions on the issues impacting businesses today to perspectives including Technologists, Strategists, Users, CEOs, Marketers and other Business and Thought Leaders across the sector. Each session begins with positioning our guest, by means of what Cloud means to their role and their business – either the delivery or use of cloud – including views on the risks and the opportunities. The conversations – each unique but overlapping as a result of the various points of view on offer – then move to the outcomes and promise of this technology and, from there, where and when regulation and standards should (or shouldn’t) come into play. We close with their views on what this cloud thing really means and where it is might take us, going forward.

The nature of our guests and the variety of discussion provides a broad set of insights which in whole or in part promises to deliver some clarity and a framework for understanding of the impact of cloud technology to all audience. We welcome your comments and feedback.

James Rees Interview with Daniel Steeves Intelligenthq

Produced by IntelligentHQ, hosted by Groupe INSEEC London and presented by Daniel Steeves, Beyond Cloud is a “mostly pitch-free” environment: discussions will necessarily include product and company references but, hopefully, used to illustrate rather than to sell.