How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center

Authors

  • Charla Griffy-Brown Pepperdine University
  • Demetrios Lazarikos Blue Lava Consulting
  • Mark Chun Pepperdine University

Keywords:

Business, Economics, Finance, Cost-Effective, Technology

Abstract

Cloud computing has transformed businesses, enabling agile and cost-effective IT infrastructure. The critical problem is that these new opportunities resulted in a co-mingled architecture which is difficult to secure. Based on interviews with boards of directors and executive leadership teams facing these new environments, our research question was: How do we secure increasingly dynamic architecture in an environment without a perimeter? The research involved an in-depth exploration of this problem using a survey instrument and interviews with 204 executives from 80 companies throughout 2014. From this work we developed an information security framework for executives in this new environment.

Downloads

Published

2016-03-01

How to Cite

Griffy-Brown, C., Lazarikos, D., & Chun, M. (2016). How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center. Journal of Applied Business and Economics, 18(1). Retrieved from https://mail.articlegateway.com/index.php/JABE/article/view/832

Issue

Section

Articles