Cloud-Enabled Security Strategy | Larry Biagini, GE
Why It Matters
Understanding and applying a risk‑based, identity‑centric security model enables businesses to safely leverage cloud benefits while reducing breach exposure, directly impacting operational resilience and competitive advantage.
Key Takeaways
- •Prioritize risk, understand attackers, and tailor controls per environment.
- •Traditional perimeter defenses are ineffective in cloud and on‑premises.
- •Risk‑based workload placement decides between public, private, or hybrid clouds.
- •Strong identity management and encryption are critical across all cloud models.
- •Cloud insights are reshaping on‑prem security practices and governance.
Summary
In this CIO Talk Radio interview, GE’s chief technology and security officer Larry Biagini explains how enterprises can turn cloud adoption into a security advantage. He argues that the old “inside‑versus‑outside” mindset no longer applies; instead, organizations must prioritize risk, identify likely threat actors, and deploy controls that are specific to each workload and environment. Biagini stresses that traditional perimeter defenses—firewalls and network‑based checks—are largely ineffective in today’s hybrid landscape. Security teams should assess the risk profile of each application, then decide whether a public, private, or hybrid cloud is the optimal destination, applying tailored encryption, key‑management, and identity solutions accordingly. A recurring theme is the need for stronger identity governance and an abstraction layer that lets workloads move between clouds without losing control. “Once you lose the network parameter, identity becomes the new perimeter,” Biagini notes, highlighting gaps in current federated‑login solutions and the importance of enterprise‑wide encryption controls. The conversation concludes that cloud‑driven security innovations are already influencing on‑prem practices, prompting a shift toward encryption‑first, identity‑centric models. As risk‑based decision trees mature, CIOs and CISO’s will gain clearer guidance on when to migrate workloads and how to maintain robust protection across all environments.
Comments
Want to join the conversation?
Loading comments...