Cloud Security , Security Operations , Video

Cloud Security: Dealing with SaaS - the New Shadow IT

Phyllis Woodruff of Global Payments on Managing Challenges in Hybrid Environments
Phyllis Woodruff, vice president, IT risk and compliance, Global Payments

Software as a service - it's the new shadow IT, says Phyllis Woodruff of Global Payments. And it highlights the new challenges arising for security leaders overseeing their organizations' cloud migrations. She discusses how to make cloud "bulletproof" for business teams.

See Also: Core Elements of Modern Workforce Identity Security

"We have to get ahead of it," Woodruff says. "We have to be prepared and we have to tell them how to do it safely. They actually don't want to know about safe. They just want to know: How do I get this done? The safety is in the background."

In this video interview with Information Security Media Group, Woodruff discusses:

  • The new urgency of cloud migration;
  • How to deal effectively with SaaS needs;
  • What compliance looks like in a hybrid environment.

Woodruff joined Global Payments two years ago to build IT risk and compliance teams. She has focused on shifting compliance to the left, incorporating those principles into the fabric of all build activities, building a new cloud compliance team and making IT risk more data-driven and actionable. She has more than 25 years of management experience and a strong track record of building resilient and nimble teams. Her domain has been financial services with a focus on security, risk and compliance.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.