Jeff Falcon, also a cybersecurity practice lead with CDW, added that it’s important to meet customers’ needs as they adapt to the cloud.
“The storyline behind this is identifying where customers are on their cloud journeys,” he said. Whether our customers are on-prem, if they’re on their journey to the cloud or they’ve landed in the cloud or some type of hybrid in between, we’re here to support them.”
2. Focus on Zero-Trust Security Strategies
During the initial transition, there was a growing need for IT departments to look closely at zero-trust security, a term that Roumaya explained can mean many different things.
“A lot of our customers just have the very basics that start at the beginning of the zero-trust world,” he said. “I think they should start looking at zero-trust assessments to help get themselves prepared and ready for the future.”
Jeremy Weiss, also a cybersecurity practice lead for CDW, added that zero trust, which operates under the assumption that any users on a network could be dangerous and must prove they can be trusted to gain access, is a best practice that organizations should be building toward.
Watch experts discuss what businesses should prioritize when it comes to security.
“If you’re looking at building up a framework, a lot of those tools are already in place,” Weiss said, citing adjacent examples such as single sign-on. “Let’s leverage those tools so that you can actually be more nimble for your business and your continuity plan.”
3. Embrace New Tools for Managing Cloud Security
As cloud computing changes the dynamic of managing an infrastructure, new strategies are required to keep everything in check.
Falcon pointed at a class of new tools in the cloud security posture management category, which Gartner has recommended that leaders in the security and risk management fields invest in to help manage their cloud security needs.
“These new emerging categories that sit in the capabilities of cloud security posture management become very important,” he said, adding that this is particularly true as organizations increase their cloud presence.
He cited examples including tools that highlight microservices being run in a given environment, the topology of the architecture, and configuration issues.
“These tools bring an important set of capabilities around visibility,” he said.