Key Learning Points:
- 5 focal areas that need operational resilience.
- Achieving balance between privacy, security, and risks.
- Understanding the pre-work involved for successful cloud integration.
Level: Intermediate
As cloud-based services permeate the industry with promises of security resilience, newer technologies, and reduced operational costs, many organizations now have a mindset of considering cloud services wherever and whenever possible. But is your organization ready to integrate with cloud services? Is your organization aware of the areas that need transformation? Leveraging cloud services is one way to mitigate risks, but the organization’s information assurance accountability must extend beyond its own boundaries to include the cloud infrastructure. Cloud adaption requires operational resiliency to realize your capabilities as an organization; to manage your partnership with the cloud service provider through trust; and to achieve governance over various levels of your organization. This session will offer practical steps to achieving operational resiliency by evaluating the top 5 focal areas in your organization that must be addressed prior to adapting any type of cloud-based service.
About Maria Schuett
Maria Schuett is a Certified Risk and Information Systems Control (CRISC) Security Professional and Client Advisor for Clango Group. She has over 15 years of technical experience in Information Security and Technology focusing in Identity and Access Management.
As an Advisor, Maria helps organizations build an Identity and Access Management Program; recommends ways on how to mitigate risks, provides clarity where complexities exist, and architects solutions that posture the organization to meet the demands of the business. She helps bridge the gaps between the client’s business objectives and the products for an effective Identity and Access Governance infrastructure resulting to overall Information Assurance. Maria has delivered solutions in the education, state government, healthcare, and insurance industries. She has written and presented topics regarding Privileged Access Management, and Cloud Security. One of her works is about Reduced Sign‐On and is included in the Encyclopedia of Information Assurance (http://isbn.nu/9781420066203/)