Cloud Security , Next-Generation Technologies & Secure Development

Cloud Computing: Setting Security Expectations

Carson Sweet of CloudPassage on Working with Vendor Partners

As more organizations take advantage of cloud computing, it's essential that they set precise security expectations with their vendor partners, says Carson Sweet of CloudPassage.

See Also: SOC Modernization: Set Plays for Success with Earvin “Magic” Johnson

"The most important thing to understand is the SLA [service level agreement]," he says, stressing the need to understand specifically what the cloud provider will do, when it comes to data security, "and what the provider expects you to do."

In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Sweet:

  • Sorts through the three different types of cloud computing;
  • Describes how healthcare providers and insurers are using cloud computing in very different ways;
  • Outlines how cloud computing could help in the battle against ransomware.

Sweet is co-founder and CTO at CloudPassage. As founding CEO, Carson led the team that created Halo, the patented security platform that changes the way enterprises achieve infrastructure protection and compliance. Carson's information security career spans three decades and includes a broad range of entrepreneurial, management and hands-on technology experience. Carson and his teams have created security solutions across a range of industries and public sectors, with a focus on financial services, federal government and high-tech. He also serves as chairman of the CloudPassage board of directors.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.