Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Key questions to ask when building a cloud security strategy

By Brian Knudtson
cloud-sec-freepik1170x658v98.jpg

Image by peachfreepix via Freepik

August 18, 2022

With the rise in remote work and the increasing threat of ransomware, the pace of digital transformation has placed a hefty burden on IT infrastructure. 


Early this year, Foundry (formerly IDG Communications) released its 2022 Cloud Computing Survey detailing the latest cloud computing trends among technology decision-makers. The findings indicated a number of common obstacles technology decision-makers face when implementing a cloud strategy, including controlling costs, data privacy and security, and a lack of in-house expertise.


As businesses grapple with these challenges, there are three questions every cloud leader must ask when building a cloud strategy:

  • What are our cost and performance needs? 
  • What is our approach to data privacy and security?
  • How will we address the cyber skills shortage? 


Cost and Performance

The common assumption is that moving to the cloud will save a business money. When it comes to cloud services, price does not necessarily equal cost, especially when considering hyperscale clouds like Amazon, Azure, and Google. Before deploying a cloud solution, it’s important to fully understand the best combination of cost and performance for the specific business and application needs, keeping in mind that there are often transactional costs that may get overlooked until the first bill arrives.


When evaluating multiple cloud service providers, look at how each offers an economic or performance advantage, understanding and assessing all the potential costs ahead of time. Consider capabilities like real-time alerting to help control costs and make real-time adjustments to utilization. 


Data Privacy and Security

With global cybercrime costs expected to grow by 15% year-over-year, it is no surprise that 35% of IT decision-makers listed data privacy and security as their top cloud obstacle. 


While data security solutions are built into many cloud platforms, it is a shared responsibility between the cloud services provider and the customer. This can complicate the support model and lead to gaps in protection. So when evaluating a provider, what should a decision maker look for to alleviate security concerns? 


1.   How will the provider help guide and educate you throughout the process? 

2.   What does the ongoing upkeep of the security strategy look like? 

3.   What compliance needs does your organization have, and how does your provider meet those needs? 


Cyber Skills Gap

In the United States alone, there are currently over 700,000 cybersecurity job openings, with only enough qualified workers to fill less than 70% of them, according to Cyber Seek data. 


The Foundry study found that 41% of IT decision makers cited needing “security expertise” the most from their future or current providers, and 34% noted “a lack of cloud security expertise” as their top challenge when implementing a cloud strategy. The issue of high demand and low retention has challenged organizations to fill the skills gap, with many turning to cloud providers as a solution.


At first, the top cloud obstacle being security and the top need from cloud providers being security expertise may be contradictory. However, given how important security is at every level of the infrastructure, it makes sense that IT teams want to make sure their providers can bring a wealth of cybersecurity experience to supplement their own team’s lack of resources. It should be at the forefront of their mind that their cloud is up to the task.


For any business looking to build a cloud strategy, addressing the foundational questions around cost and performance, privacy and security, and the growing talent gap should provide a solid starting point. 

KEYWORDS: cloud security cyber security data privacy risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brian Knudtson is Director of Product Market Intelligence at iland, an 11:11 Company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Questions to Ask Before Choosing a Cloud Platform

    See More
  • Working in the Cloud: Critical Security Questions to ask any SaaS provider

    See More
  • cybersecurity-resilience-fp1170v1.jpg

    5 questions CISOs should ask when evaluating cyber resiliency

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing