The Need to Adopt a Business Systems Approach to Cloud Security

tobias-fischer-PkbZahEG2Ng-unsplash

Posted: November 15, 2016 | By: Larry Clinton

References

[1] PricewaterhouseCoopers, Respected, but still restrained, findings from the 2011 Global State of Information Security Survey, 2011.
[2] PricewaterhouseCoopers, The Global State of Information Security, 2008. Center for Strategic & International Studies, In the Crossfire: Critical Infrastructure in the Age of Cyber War, 2010.
McAfee, Unsecured Economies: Protecting Vital Information, January 2009.
[3] Internet Security Alliance, Navigating Compliance and Security for Unified Communication, 2009 p21.
[4] “Business partners with Shoddy Security; Cloud Providers with Dubious Risk Controls; What’s a CIO to do?” CIO Magazine October 2010
[5] Yoo, Christopher S., Cloud Computing: Architectural and Policy Implications, (Technology Policy Institute), January 2011 p6.
[6] Vivek Kundra “Federal Cloud Computing Strategy” February 8, 2011
[7] Friedman, Allan, “Economic and Policy Frameworks for Cybersecurity Risks, Center for Technology Innovation at Brookings, July 21, 2011.
[8] The Chapter entitled Cyber Security Social Contract by Larry Clinton will appear in Scott Jasper, ed. Conflict and Cooperation in the Commons, forthcoming from Georgetown University Press (2012).
[9] Clinton, Larry, A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense, Journal of Strategic Security, Volume 4, #2, Summer 2011.
Clinton, Larry, A Theory to Guide US Cyber Security Policy, Cutter IT Journal, May 2011.
[10] American National Standards Institute and the Internet Security Alliance, The Financial Impact of Cyber Risk: 50 Questions every CFO Should Ask, 2008.
[11] American National Standards Institute and Internet Security Alliance, “The Financial Impact of Cyber Risk: An Implementation Framework for CFO’s”, 2010.
[12] Baudoin, Claude R., How the cloud Impacts IT Governance, Cutter IT Journal Vol 24 # 7 July 2011
[13] Westby, Jody, Governance of Enterprise Security: CyLab 2010 Report, Carnegie Mellon CyLab, June 15, 2010.
Westby, Jody & Power, Richard, Governance of Enterprise Security: CyLab 2008 Report, Carnegie Mellon CyLab, December 1, 2008.
[14] PricewaterhouseCoopers, Respected-but still restrained, findings from the 2011 Global State of Information Security Survey, 2011.

Want to find out more about this topic?

Request a FREE Technical Inquiry!