Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Key questions to ask when building a cloud security strategy

By Brian Knudtson
cloud-sec-freepik1170x658v98.jpg

Image by peachfreepix via Freepik

August 18, 2022

With the rise in remote work and the increasing threat of ransomware, the pace of digital transformation has placed a hefty burden on IT infrastructure. 


Early this year, Foundry (formerly IDG Communications) released its 2022 Cloud Computing Survey detailing the latest cloud computing trends among technology decision-makers. The findings indicated a number of common obstacles technology decision-makers face when implementing a cloud strategy, including controlling costs, data privacy and security, and a lack of in-house expertise.


As businesses grapple with these challenges, there are three questions every cloud leader must ask when building a cloud strategy:

  • What are our cost and performance needs? 
  • What is our approach to data privacy and security?
  • How will we address the cyber skills shortage? 


Cost and Performance

The common assumption is that moving to the cloud will save a business money. When it comes to cloud services, price does not necessarily equal cost, especially when considering hyperscale clouds like Amazon, Azure, and Google. Before deploying a cloud solution, it’s important to fully understand the best combination of cost and performance for the specific business and application needs, keeping in mind that there are often transactional costs that may get overlooked until the first bill arrives.


When evaluating multiple cloud service providers, look at how each offers an economic or performance advantage, understanding and assessing all the potential costs ahead of time. Consider capabilities like real-time alerting to help control costs and make real-time adjustments to utilization. 


Data Privacy and Security

With global cybercrime costs expected to grow by 15% year-over-year, it is no surprise that 35% of IT decision-makers listed data privacy and security as their top cloud obstacle. 


While data security solutions are built into many cloud platforms, it is a shared responsibility between the cloud services provider and the customer. This can complicate the support model and lead to gaps in protection. So when evaluating a provider, what should a decision maker look for to alleviate security concerns? 


1.   How will the provider help guide and educate you throughout the process? 

2.   What does the ongoing upkeep of the security strategy look like? 

3.   What compliance needs does your organization have, and how does your provider meet those needs? 


Cyber Skills Gap

In the United States alone, there are currently over 700,000 cybersecurity job openings, with only enough qualified workers to fill less than 70% of them, according to Cyber Seek data. 


The Foundry study found that 41% of IT decision makers cited needing “security expertise” the most from their future or current providers, and 34% noted “a lack of cloud security expertise” as their top challenge when implementing a cloud strategy. The issue of high demand and low retention has challenged organizations to fill the skills gap, with many turning to cloud providers as a solution.


At first, the top cloud obstacle being security and the top need from cloud providers being security expertise may be contradictory. However, given how important security is at every level of the infrastructure, it makes sense that IT teams want to make sure their providers can bring a wealth of cybersecurity experience to supplement their own team’s lack of resources. It should be at the forefront of their mind that their cloud is up to the task.


For any business looking to build a cloud strategy, addressing the foundational questions around cost and performance, privacy and security, and the growing talent gap should provide a solid starting point. 

KEYWORDS: cloud security cyber security data privacy risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brian Knudtson is Director of Product Market Intelligence at iland, an 11:11 Company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • 5 Questions to Ask Before Choosing a Cloud Platform

    See More
  • Working in the Cloud: Critical Security Questions to ask any SaaS provider

    See More
  • cybersecurity-resilience-fp1170v1.jpg

    5 questions CISOs should ask when evaluating cyber resiliency

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing