Don't Fear the Cloud

- Adopting high-level information security policies as well as granular procedures and standards for implementing those policies;
- Including specific security provisions, such as breach notification methods and compliance strategies, in contracts with cloud vendors;
- Creating formal processes for reviewing and proving the effectiveness of cloud implementations.