{"id":79762,"date":"2023-06-30T04:02:35","date_gmt":"2023-06-30T04:02:35","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79762"},"modified":"2023-11-21T11:43:23","modified_gmt":"2023-11-21T11:43:23","slug":"ciso-cloud-security-issues","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/","title":{"rendered":"Approach Towards Cloud Security Issues: A CISO\u2019s Perspective\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79762\" class=\"elementor elementor-79762\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33c86e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33c86e9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3710e2b\" data-id=\"3710e2b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-110bfc2 elementor-widget elementor-widget-text-editor\" data-id=\"110bfc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The 2022 Check Point Cloud Security Report found that 27 percent of organizations experienced a security incident in their public cloud infrastructure in the past year.<\/p>\n<p>Cloud computing is one of the most widely used enterprise IT innovations in decades. According to Flexera\u2019s 2021 \u201cState of the Cloud\u201d report, 99 percent of organizations report using at least one public or private cloud offering.<\/p>\n<p>Businesses often switch to cloud computing because it offers advantages over traditional on-premises IT. However, despite\u2014or perhaps because of\u2014the success of the cloud, companies who use it have their own cloud security risks to worry about. Chief Information Security Officers (Certified CISOs) need to be vigilant about managing cloud security risks to protect their IT infrastructure and sensitive data.<\/p>\n<p>This article will discuss some of the major cloud security issues, as well as how Certified CISOs can help improve cloud security within their organization.<\/p>\n<h2>A Certified CISO\u2019s Major Challenges with Cloud Security<\/h2>\n<p>A Certified CISO is the organization\u2019s chief security officer when it comes to protecting the integrity of the organization\u2019s information technology. With many businesses heavily reliant on cloud technologies, cloud security issues should be a significant concern for chief information security officers. This section will review 4 of the most significant cloud security risks that Certified CISOs need to know.<\/p>\n<h2>1. Data breaches<\/h2>\n<p>Data breaches are as much a risk in the cloud as they are on-premises and can lead to devastating or irreversible damage to a company\u2019s finances and reputation. One well-known example is the 2019 Capital One cloud data breach, which occurred due to a cloud firewall vulnerability and led to the theft of more than 100 million customers\u2019 personal information. Both the customer and the cloud service provider (CSP) are responsible for patching security vulnerabilities that can lead to the exposure of sensitive or confidential information.<\/p>\n<h2>2. Misconfiguration errors<\/h2>\n<p>Many organizations believe that the public cloud is safer than on-premises IT since the cloud provider assumes responsibility for security issues. However, if companies leave their cloud infrastructure misconfigured, this can leave the door open for attackers. One major issue is access controls that need to be more generous, giving users more responsibilities than they need. This can make it easier for malicious actors to spread themselves throughout the cloud infrastructure once they have gained entry.<\/p>\n<h2>3. Weak identity and access management<\/h2>\n<p>Many cybersecurity incidents occur due to problems with identity and access management (IAM) problems, i.e., verifying cloud users&#8217; credentials. The issues with IAM in the cloud may include the following:<\/p>\n<ul>\n<li>Weak passwords and other credentials or the inability to protect them from attackers<\/li>\n<li>Lack of two-factor or multi-factor authentication (MFA)<\/li>\n<li>Failure to rotate passwords, certificates, and cryptographic keys regularly.<\/li>\n<li>\u201cZombie accounts\u201d that still retain access to cloud services when the user has left the organization<\/li>\n<\/ul>\n<h2>4. Multi-cloud complications<\/h2>\n<p>According to the Flexera report, 92 percent of companies have adopted a multi-cloud strategy, i.e., using two or more cloud providers simultaneously. The more providers there are present in the cloud environment, however, the harder it becomes to successfully monitor and manage this more extensive and more complex attack surface. Also, organizations have to ensure that every cloud provider meets their stringent security requirements. Many organizations suffer from the lack of a comprehensive, overarching multi-cloud strategy, leaving Certified CISOs to play \u201cwhack-a-mole\u201d and deal with problems as they crop up.<\/p>\n<h2>How Certified CISOs Can Help Improve Cloud Security<\/h2>\n<p>The good news is that despite the cloud security challenges and risks, chief information security officers can still improve cloud security within their organization. This section will suggest various approaches a Certified CISO can take to tackle the escalating crisis in the cloud.<\/p>\n<h2>1. Data breaches<\/h2>\n<p>While data breaches have become an all-too-common occurrence, the following tactics can help prevent or limit their damage in a cloud environment:<\/p>\n<ul>\n<li><strong>Taking stock of data:<\/strong> Certified CISOs should understand the data assets that their organization possesses, as well as the value of each asset and the damage that it would cause if it were leaked.<\/li>\n<li><strong>Encryption:<\/strong> Confidential data should be protected by encryption in transit and while at rest. Industry-specific regulations such as HIPAA and PCI DSS may place additional requirements on handling sensitive information.<\/li>\n<li><strong>Information security management system (ISMS):<\/strong> Certified CISOs should develop an information security management system (ISMS): a framework of IT security policies and procedures that defines how to manage an organization\u2019s sensitive data.<\/li>\n<\/ul>\n<h2>2. Misconfiguration errors<\/h2>\n<p>Insecure data storage, too generous permissions, and default credentials are just a few causes of misconfiguration issues. Businesses can detect misconfiguration errors and other vulnerabilities in their cloud infrastructure through <a href=\"https:\/\/www.eccouncil.org\/cybersecurity\/what-is-penetration-testing\/\" target=\"_blank\" rel=\"noopener\">penetration testing<\/a>, i.e., simulating cyberattacks on an IT environment to detect any flaws that need to be patched. Organizations must also proactively develop and test a robust incident response plan that governs how to respond and recover in the wake of an attack to limit the damage and restore normal business operations.<\/p>\n<h2>3. Weak identity and access management<\/h2>\n<p>Users of cloud services must select solid and complex passwords that dramatically lower the chances of an attacker breaking into their account. Enabling multi-factor authentication and training employees to recognize phishing attacks intended to bypass MFA can help reduce this risk. Organizations may also explore using alternative credentials, such as keys and tokens, that further strengthen account security.<\/p>\n<h2>4. Multi-cloud complications<\/h2>\n<p>Multi-cloud environments present additional challenges in visibility, security, and governance, but these difficulties are manageable. Centralized cloud monitoring and management tools can provide CISOs with the visibility and insights they need into the entire cloud environment within a single pane of glass. In addition, Certified CISOs must take the time to understand how each resource in their multi-cloud environment is used in terms of customer personas and workload so that they can apply the proper security controls to each one.<\/p>\n<h2>How the Certified CISO Program Can Help Improve Cloud Security<\/h2>\n<p>While cloud computing presents its security challenges and risks, C-Suite executives can become more well-versed in cloud security issues to protect the integrity and confidentiality of their data and IT assets.<\/p>\n<p>EC-Council\u2019s <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">Certified CISO (Certified Chief Information Security Officer) program<\/a> was curated for current and aspiring Certified CISOs. The CCISO certification provides theoretical and practical training in all five domains of information security management, from governance to strategic planning. As businesses rapidly move to the cloud for smooth operations, current and aspiring C-Suite executives and information security leaders can leverage the Certified CISO curriculum to <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cloud-security-engineer-course\/\">learn how to redesign cloud security<\/a> strategies and chalk novel approaches to handle multi-cloud domains, cloud governance, compliance, etc.<\/p>\n<p>Ready to start down the path to your role as a CISO? Learn more about EC-Council\u2019s CCISO certification and how it can enhance your career.<\/p>\n<h2>References<\/h2>\n<p>Flexera 2021 State of the Cloud Report. (2021). <em>https:\/\/lp.tufin.com\/rs\/769-ICF-145\/images\/report-cm-state-of-the-cloud-2021.pdf<\/em><\/p>\n<p>The Biggest Cloud Security Challenges in 2022 &#8211; Check Point Software. (2022). <em>https:\/\/www.checkpoint.com\/cyber-hub\/cloud-security\/what-is-cloud-security\/the-biggest-cloud-security-challenges-in-2022\/<\/em><\/p>\n<p>Lessons learned: the Capital One breach. (2019). <em>https:\/\/resources.infosecinstitute.com\/topic\/lessons-learned-the-capital-one-breach\/<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The 2022 Check Point Cloud Security Report found that 27 percent of organizations experienced a security incident in their public cloud infrastructure in the past year.<\/p>\n","protected":false},"author":33,"featured_media":80032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[3444],"tags":[],"class_list":{"0":"post-79762","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-executive-management"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top Four CISO Challenges With Cloud Security &amp; How CISOs Can Improve | EC-Council<\/title>\n<meta name=\"description\" content=\"Learn about the top four challenges that CISOs face in cloud security &amp; discover strategies to enhance their capabilities. Explore how chief information security officers can effectively deal with cloud security issues with insights from EC-Council.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Approach Towards Cloud Security Issues: A CISO\u2019s Perspective\u00a0\" \/>\n<meta property=\"og:description\" content=\"Learn about the top four challenges that CISOs face in cloud security &amp; discover strategies to enhance their capabilities. Explore how chief information security officers can effectively deal with cloud security issues with insights from EC-Council.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-30T04:02:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-21T11:43:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/CCISO-ciso-cloud-security-issues-feature.png\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Approach Towards Cloud Security Issues: A CISO\u2019s Perspective\u00a0\",\"datePublished\":\"2023-06-30T04:02:35+00:00\",\"dateModified\":\"2023-11-21T11:43:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/\"},\"wordCount\":1162,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"articleSection\":[\"Executive Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/\",\"name\":\"Top Four CISO Challenges With Cloud Security & How CISOs Can Improve | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"datePublished\":\"2023-06-30T04:02:35+00:00\",\"dateModified\":\"2023-11-21T11:43:23+00:00\",\"description\":\"Learn about the top four challenges that CISOs face in cloud security & discover strategies to enhance their capabilities. Explore how chief information security officers can effectively deal with cloud security issues with insights from EC-Council.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"width\":521,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/executive-management\\\/ciso-cloud-security-issues\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Executive Management\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/executive-management\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Approach Towards Cloud Security Issues: A CISO\u2019s Perspective\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Four CISO Challenges With Cloud Security & How CISOs Can Improve | EC-Council","description":"Learn about the top four challenges that CISOs face in cloud security & discover strategies to enhance their capabilities. Explore how chief information security officers can effectively deal with cloud security issues with insights from EC-Council.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/","og_locale":"en_US","og_type":"article","og_title":"Approach Towards Cloud Security Issues: A CISO\u2019s Perspective\u00a0","og_description":"Learn about the top four challenges that CISOs face in cloud security & discover strategies to enhance their capabilities. Explore how chief information security officers can effectively deal with cloud security issues with insights from EC-Council.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-06-30T04:02:35+00:00","article_modified_time":"2023-11-21T11:43:23+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/CCISO-ciso-cloud-security-issues-feature.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Approach Towards Cloud Security Issues: A CISO\u2019s Perspective\u00a0","datePublished":"2023-06-30T04:02:35+00:00","dateModified":"2023-11-21T11:43:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/"},"wordCount":1162,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","articleSection":["Executive Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/","name":"Top Four CISO Challenges With Cloud Security & How CISOs Can Improve | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","datePublished":"2023-06-30T04:02:35+00:00","dateModified":"2023-11-21T11:43:23+00:00","description":"Learn about the top four challenges that CISOs face in cloud security & discover strategies to enhance their capabilities. Explore how chief information security officers can effectively deal with cloud security issues with insights from EC-Council.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/ciso-cloud-security-issues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Executive Management","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/executive-management\/"},{"@type":"ListItem","position":4,"name":"Approach Towards Cloud Security Issues: A CISO\u2019s Perspective\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79762"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80032"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}