Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

Top Cloud Priorities for CxOs
Top Cloud Priorities for CxOs

Top Cloud Priorities for CxOs

Release Date: 05/13/2021

Working Group: CxO Trust

The Top Cloud Priorities for CxOs was created to equip C-level executives with industry guidance to build pragmatic cloud security projects and strategies that accelerate the secure use of cloud and bring added value to the business. Even though the content analysis is catered towards C-level technology owners, the entire C-suite can benefit from these guidelines for integrating and defining corporate level cloud security strategies. 

The twelve priorities covered in this document were selected for further analysis based on popularity and applicable content found within CSA and industry publications. Other topics will continue to be assessed and can be found later in this document. Some of the priorities are explicitly related to security, while in other cases addressing the cloud priority is enabled by implementing the appropriate security strategy.

The twelve priorities covered include:
  1. How do I explain cloud strategy to the board?
  2. How do I reduce IT overhead moving to the cloud?
  3. How do I manage 3rd party cloud security risks?
  4. How do I develop a secure enterprise cloud operating model?
  5. How do I cultivate the skills to support cloud environments?

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
C-Level Guidance to Securing Serverless Architectures
C-Level Guidance to Securing Serverless Archite...
The Leadership Tightrope: Why Leading in Today's Workforce is a Balancing Act
The Leadership Tightrope: Why Leading in Today's Workforce is a Bal...
Published: 07/17/2024
The Cybersecurity Tower of Babel Requires Focus on Business Fundamentals: Part 1
The Cybersecurity Tower of Babel Requires Focus on Business Fundame...
Published: 07/11/2024
PCI DSS for Security Leaders – How to Take a Proactive Approach
PCI DSS for Security Leaders – How to Take a Proactive Approach
Published: 06/20/2024
From the Trenches: A CISO's Guide to Threat Intelligence
From the Trenches: A CISO's Guide to Threat Intelligence
Published: 06/13/2024

Acknowledgements

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Jim Reavis
Jim Reavis
Co-founder and Chief Executive Officer, CSA

Jim Reavis

Co-founder and Chief Executive Officer, CSA

For over 30 years, Jim Reavis has worked in cybersecurity industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging trends have been published and presented widely throughout the industry and have influenced many.
Jim launched Cloud Security Alliance (CSA) in 2009 and has led its global growth and position as among the most vital cybersecurity communities worldwide. Under Ji...

Read more

John DiMaria
John DiMaria
Director of Operations Excellence, CSA

John DiMaria

Director of Operations Excellence, CSA

Craig Balding
Craig Balding

Craig Balding

I help enable organisations to safely operate and transact online in the face of dynamic and adaptive threats. After 20 years of attacking and defending top tier firms I founded Resilient Security to provide cyber risk and security advisory, consulting and services.

Read more

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Daniele Catteddu
Daniele Catteddu
Chief Technology Officer, CSA

Daniele Catteddu

Chief Technology Officer, CSA

Daniele Catteddu is an information security and risk management practitioner, technologies expert and privacy evangelist with over 15 of experience. He worked in several senior roles both in the private and public sector. He is member of various national and international security expert groups and committees on cyber-security and privacy, keynote speaker at several conferences and author of numerous studies and papers on risk management, ...

Read more

Pete Chronis Headshot Missing
Pete Chronis

Pete Chronis

Illena Armstrong
Illena Armstrong
President, CSA

Illena Armstrong

President, CSA

Illena Armstrong is a long-time international media and business development leader who, with the help of the talented teams she has managed over the years, successfully built and maintained a wide range of award-winning, digitally-driven multimedia, intelligence/research, and educational offerings serving targeted audiences. Along with her current role as President of CSA, she serves as a Fellow with the International Association of Certif...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training