"The cloud is not such a special technology necessarily that it is exempt from a security perspective, but is just another implementation of IT, and is a natural evolution of where we come from," Federal CIO Vivek Kundra says.
The key tenet of the cloud is availability. But, asks the former White House official who led President Obama's Cyberspace Policy Review, where are the other cornerstones of information security: integrity and confidentiality?
With a steep growth in fraud committed by employees - identifying and stopping it is a primary objective for internal audit, compliance managers and fraud prevention departments. Technology can make fraud detection, documentation and prevention more efficient and effective for these stakeholders.