Implementing cloud MUST be aligned with security measures to tackle the associated cyber risks.
Security is an advantage, and a competitive value. I believe that the responsibilities of the security professional handling cloud transformation include architecture review and hardening the configuration of the cloud architecture and subsequent security requirements. Amazon’s shared security model outlines the security responsibility under the customer’s obligations, but does not provide detailed guidance on building secure systems.
The popular cloud service providers are Microsoft and Amazon. Recently, I have been working on AWS and would like to have your feedback and comments on the hardening recommendations that I have been advising and putting in place.
Chief Information Security Officer Guide has an objective of giving you some practical advice about the current situation of a CISO role and corporate perception and expectations.
The CISO role has been previously characterized as a technical/IT related role. This has drastically evolved and nowadays, the CISO/CSO role has much wider responsibilities. This guide is structured as a high level, through main considerations and feedback from my own personal experience.
The Impact of the cyber security boom is undeniably important and brings on many additional questions from the InfoSec community.
‘’The white hat hackers guide to hacking & pentesting for the common good’’ will be broadly educating on hacking techniques across cloud, mobile and web applications, as each of these topics requires books on their own to dig into the topics in depth. The book on Amazon costs $0.99. The proceeds of this book will be donated by Peerlyst to http://withoutmyconsent.org, an organization fighting online harassment.