How to Enable Secure Cloud Computing

Cloud - How to Enable Secure Cloud Computing

Three security issues loom large over the future of Cloud Computing: 1) Will corporate IT security policies still apply to the applications and services delivered via the cloud? 2) How will a CIO prove to management and clients that the company’s applications and services are as secure as before the cloud and meeting all SLAs? 3) Will security be robust enough to pass any compliance audits required? Only when each of these 3 concerns can be answered with a resounding “YES!”, will cloud computing be finally considered secure. Meanwhile, what will IT leaders and vendors have to consider, change, revamp, or manage differently in order to achieve this end goal?


Elayne Starkey

Elayne Starkey, CSO, Department of Technology and Information (DTI), Delaware

Elayne Starkey is the Chief Security Officer for the State of Delaware/Department of Technology and Information (DTI) and responsible for the protection of information assets from high consequence events, including cyber and physical terror... More   View all posts
Dan Lohrmann

Dan Lohrmann, CSO, Department of Technology, Management & Budget (DTMB), Cybersecurity & Infrastructure Protection, State of Michigan

Daniel J. Lohrmann (Dan) is an internationally recognized security leader, technologist and author. He is best known for his refreshingly practical commentary on technology and clear advice on computer security and ethics for home and work.... More   View all posts
Add Comment
Click here to post a comment


Hexaware 1 - Automation to Autonomous MPU 250X300


Elayne Starkey


Not Member Yet?


  • Name

  • Contact Info

  • About Yourself

  • Minimum length of 8 characters
  • Upload
  • Location

  • Professional Background

  • Other Social Profiles

  • Areas of Interest