Cloud Computing: Setting Security ExpectationsCarson Sweet of CloudPassage on Working with Vendor Partners
As more organizations take advantage of cloud computing, it's essential that they set precise security expectations with their vendor partners, says Carson Sweet of CloudPassage.
See Also: Top 50 Security Threats
"The most important thing to understand is the SLA [service level agreement]," he says, stressing the need to understand specifically what the cloud provider will do, when it comes to data security, "and what the provider expects you to do."
In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Sweet:
- Sorts through the three different types of cloud computing;
- Describes how healthcare providers and insurers are using cloud computing in very different ways;
- Outlines how cloud computing could help in the battle against ransomware.
Sweet is co-founder and CTO at CloudPassage. As founding CEO, Carson led the team that created Halo, the patented security platform that changes the way enterprises achieve infrastructure protection and compliance. Carson's information security career spans three decades and includes a broad range of entrepreneurial, management and hands-on technology experience. Carson and his teams have created security solutions across a range of industries and public sectors, with a focus on financial services, federal government and high-tech. He also serves as chairman of the CloudPassage board of directors.