Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityPhysicalTechnologies & Solutions

As demand for cloud grows, here’s how to make security an essential line item

By Ron Bennatan
migrating physical security to the cloud
June 24, 2021

Pre-pandemic, most organizations had digital transformation projects in place for migrating their workloads to more modern, cloud-based infrastructures. When the pandemic hit, these digital transformation projects didn’t necessarily change. However, the onslaught of acute challenges brought on by the pandemic caused organizations to dramatically accelerate their digital transformation and infrastructure modernization plans. Suddenly grappling with the necessity of remote work, thinner operating margins and evolving customer needs, organizations recognized a savior in fast, nimble and relatively affordable cloud technology.

Accelerated infrastructure modernization is a positive side-effect of the pandemic. With rapid, widespread cloud adoption, more organizations gain the ability to bring new applications and services to market faster, reduce the cost and complexity of their database operations, and provide greater overall flexibility and accessibility. But it can also be a disaster if organizations, so motivated to accelerate their digital transformation projects as a result of the pandemic, neglect to also accelerate their security. Workload migration into the Cloud cannot be done without also migrating security controls and good security practices.

Today, organizations that modernized their infrastructure without also modernizing corresponding security, face chronic visibility, control, compliance and privacy issues. And these issues span beyond fundamental cybersecurity implications. When infrastructure modernization outpaces security, organizations’ risk and resiliency as a whole are impacted. Chief Security Officers (CSOs), Chief Information Security Officers (CISOs) and other security leaders have learned this the hard way over the past 20 years and, as an industry, we have finally got to a point that security and privacy are not left to the last minute; we just need to make sure that in our scramble to accelerate everything we don’t leave these controls behind.

4 best practices for closing the digital transformation security gap

To close the gap between digital transformation and security, cyber and physical security leaders (or a combination of the two) must work to make security an essential line item within their organizations. Below are four best practices for comprehensively improving enterprise risk and resiliency, and boosting security resource budgets:

  1. Understand who’s responsible for securing what. Security teams can’t monitor and protect their organization’s most valuable assets if they don’t know the assets exist and/or if it’s unclear where security responsibility lies. For example, nearly all cloud service providers follow an industry-standard shared responsibility model where service providers are responsible for securing the system and customer organizations are responsible for securing the data. If security teams are responsible for protecting their organization’s cloud-based data, then in addition to owning that responsibility, they’ll need to work closely with DevOps, a group who’s constantly spinning up new databases that require protection. It’s impossible for security teams to secure data they’re not aware of, so they’ll require regular updates from DevOps teams on every database currently in use (even off-the-radar ones) and where the most sensitive and valuable data is being stored.
  2. Create a unified set of security policies. To be able to quickly identify and respond to any unusual activity, security teams need to establish a baseline of what normal behavior looks like via a unified set of security policies. These policies should incorporate all facets of an organization’s security, including which employees are allowed to access what data, how customer communication is dispersed in the event of a security breach and even how visitors or remote employees are granted access to physical properties, for instance. In addition to alerting security teams when any out-of-policy activity occurs, unified security policies are vital for demonstrating compliance during audits.
  3. Establish security representation in the boardroom. The most direct way to rally greater support for security is to make sure security leadership is represented at all board meetings. Too often, security voices aren’t heard (or even present) when a board of directors meets and as a result, security teams miss out on the opportunity to offer guidance on where investments need to be made. To ensure executive advocacy, security teams should appoint their CSO, CISO (or closet equivalent) to regularly liaise with their organization’s board of directors. In particular, the CISO should make sure the board’s efforts are aligned with existing and new regulations and client requirements, and that there’s an appropriate level of urgency and funding to evaluate security risks around any new business project.
  4. Set expectations on security goals and ROI. Given the myriad of different components involved, validating the success of security is highly nuanced. It’s not nearly as straightforward as an auditor informing an organization that they’ve achieved compliance, so appropriate expectations and benchmarks need to be set. For example, in terms of data security, with unlimited time, budget and resources, any enterprise can achieve complete security coverage of all data sources and transform the raw data they collect into contextually rich information for security analytics. However, for most organizations, this is rarely reality or even a necessity. Security teams may want to set the goal of achieving 100% coverage of all databases and providing teams with ready-to-use data for analytics, however to bolster ROI and efficiency they should take advantage of automation tools and security controls orchestration. By starting small and gradually scaling their efforts to unify and secure all data sources, security teams can optimize their efforts and resources as time goes on.

Keeping pace with the risk climate

Too often, technological innovation, market disruptions and customer priorities take precedence over security. But the complexity and ubiquity of security risks in today’s business landscape demand that security no longer be viewed as secondary. Long-term viability requires organizations to make security an essential line item and collective priority. By assigning clear responsibility, creating unified policies, ensuring representation in the boardroom, and setting expectations for goals and ROI, security leaders can remediate pandemic-induced digital transformation security gaps -- and at the same time, prepare their organizations’ security for whatever infrastructure modernizations the future may bring.

KEYWORDS: cloud migration cloud security physical security physical security systems security education security operations security training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ron Bennatan is Senior Vice President and General Manager, Data Security, at Imperva.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-enews

    How to Make Informed Risk Management Decisions about What to Store in the Cloud

    See More
  • security guard freepik

    The fine line of security’s role as a deterrent: How people process and technology influence response

    See More
  • Half open laptop in blue

    Closing the cloud skills gap as adoption grows

    See More

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!