Cloud Security , Security Operations , Video

Navigating the Nuances of Cloud Concentration Risks

Axiata's Abid Adam Discusses Factors to Keep in Mind When Choosing a Cloud Vendor
Abid Adam, group chief risk and compliance officer, Axiata

The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Cloud transition often highlights the problem of cloud concentration risk - a multifaceted challenge encompassing vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.

See Also: 2024 Threat Hunting Report: Insights to Outsmart Modern Adversaries

"For vendor risk, if you are exposed highly to one cloud provider, the risk you may face is reduced negotiation power when you have to renew the contract," Adam said. "Then there is availability risk. We have seen quite a few times now that there has been a broad scope of impact and outages globally. So, when you put all eggs in one basket, you have availability risk that you need to manage."

In this video interview with Information Security Media Group, Adam discussed:

  • How to ensure a clear exit strategy;
  • Various aspects of cloud concentration risk;
  • The top considerations when selecting a cloud services provider.

Adam provides strategic direction, implementation, oversight and guidance on cybersecurity, data privacy, enterprise risk management and compliance/ethics.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.