SC World Congress: Cloud computing presents next challenge

Share this article:
If you thought deperimeterization was a daunting concept, you haven't seen anything yet — try securing cloud computing, concluded board members of Jericho Forum Monday.

Speaking at the Jericho Forum's “Breaking Down the Barriers to Secure Collaboration” panel discussion, held in conjunction with this week's inaugural SC World Congress, Paul Simmonds and other panelists discussed the challenges that deperimeterization and cloud computing pose to global enterprises.

The panel also included Jericho Forum board member and Eli Lilly CISO Adrian Seccombe, Echelon One CEO Bob West and Scotland Yard's anti-corruption Command Detective Inspector Kevin Hyland.

Cloud computing will enable businesses to function more efficiently and collaborate with other organizations, but they must recognize the security ramifications, such as safeguarding data and managing identities, the panel said.

The UK-based IT security think tank Jericho Forum -- which has been preaching the notion of security in an open-network environment since the group was founded more than four years ago -- next year plans to focus on the necessary steps to secure the cloud. But the forum is relying on IT security professionals for help, Seccombe said.

“The very idea of bolting on security when you have already moved to the cloud is dumb,” he said. “You can't bolt security into the cloud; you need to build it in.”

Looking at the issue from a law enforcement perspective, information is a valuable commodity and must be treated as real money, Hyland said.

“Criminals are organized networks," Hyland said. “One day they might be dealing with drugs and now they are dealing with this.”

Share this article:

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.