<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cloud Migration Brief in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/37226#M10</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/545444613"&gt;@N_Bakewell&lt;/a&gt;&amp;nbsp;&amp;nbsp; It does not have to be a long journey, as long as you commence the journey, knowing what you want to achieve:&amp;nbsp; &lt;A href="https://www.ibm.com/services/cloud/migration" target="_blank"&gt;https://www.ibm.com/services/cloud/migration&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Sun, 12 Jul 2020 05:16:16 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2020-07-12T05:16:16Z</dc:date>
    <item>
      <title>Cloud Migration Brief</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/36087#M9</link>
      <description>&lt;P&gt;Good afternoon all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My organization is just starting to progress through the planning and evaluation phase of potentially moving away from a colocation setup to a full cloud deployment for our infrastructure.&amp;nbsp; In an attempt to not reinvent the wheel as far as administrative artifacts go, does anyone have a good template for ET decision briefs, evaluation comparisons, IPRs, or anything else that might come in handy during this long process?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:32:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/36087#M9</guid>
      <dc:creator>N_Bakewell</dc:creator>
      <dc:date>2023-10-09T09:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Migration Brief</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/37226#M10</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/545444613"&gt;@N_Bakewell&lt;/a&gt;&amp;nbsp;&amp;nbsp; It does not have to be a long journey, as long as you commence the journey, knowing what you want to achieve:&amp;nbsp; &lt;A href="https://www.ibm.com/services/cloud/migration" target="_blank"&gt;https://www.ibm.com/services/cloud/migration&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jul 2020 05:16:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/37226#M10</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-07-12T05:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Migration Brief</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/46574#M86</link>
      <description>&lt;P&gt;The journey to the cloud can be challenging and expensive but, a structured approach to cloud adoption and implementation enables organizations to reduce TCO, maximize ROI, and control the full potential of the cloud.&amp;nbsp;&lt;A href="https://www.nousinfosystems.com/competency/cloud" target="_blank"&gt;https://www.nousinfosystems.com/competency/cloud&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 06:34:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/46574#M86</guid>
      <dc:creator>RajeshN</dc:creator>
      <dc:date>2021-07-22T06:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Migration Brief</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/47006#M91</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/458691101"&gt;@RajeshN&lt;/a&gt;However, many companies make the claim, they can do it better than others:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, one needs to do some good research and ensure you use experienced organisations, who do this on a regular basis and fully understand the business strategy, business needs and security strategy of the organisation.&amp;nbsp; Often this means knowing, at least who has ownership for the data and the risks associated with those assets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ibm.com/services/cloud/migration?p1=Search&amp;amp;p4=43700064931718097&amp;amp;p5=e&amp;amp;gclid=CjwKCAjw3_KIBhA2EiwAaAAlit9jSEWCvZCKbS_w-5FlQ6JyMQFVSYtDwB-EBwO4xHf5XTthYAOQ0hoC7xcQAvD_BwE&amp;amp;gclsrc=aw.ds" target="_blank"&gt;https://www.ibm.com/services/cloud/migration?p1=Search&amp;amp;p4=43700064931718097&amp;amp;p5=e&amp;amp;gclid=CjwKCAjw3_KIBhA2EiwAaAAlit9jSEWCvZCKbS_w-5FlQ6JyMQFVSYtDwB-EBwO4xHf5XTthYAOQ0hoC7xcQAvD_BwE&amp;amp;gclsrc=aw.ds&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or one could take a relatively objective and neutral approach by using the Gartner reports:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.opentext.com/info/gartner-cloud-strategy-cookbook/?ldsrc=Marketing%20-%20Paid%20Inbound&amp;amp;elqcampaignid=50284&amp;amp;utm_source=google&amp;amp;utm_medium=ppc&amp;amp;utm_campaign=ecm-gartner-cloud-strategy-cookbook-ppctx&amp;amp;gclid=CjwKCAjw3_KIBhA2EiwAaAAlimhrTWpJT-KSmsDiGko5gA0438kUgBQfpT4YhHSNKxnVN0Zy-M4KthoC1FMQAvD_BwE" target="_blank"&gt;https://www.opentext.com/info/gartner-cloud-strategy-cookbook/?ldsrc=Marketing%20-%20Paid%20Inbound&amp;amp;elqcampaignid=50284&amp;amp;utm_source=google&amp;amp;utm_medium=ppc&amp;amp;utm_campaign=ecm-gartner-cloud-strategy-cookbook-ppctx&amp;amp;gclid=CjwKCAjw3_KIBhA2EiwAaAAlimhrTWpJT-KSmsDiGko5gA0438kUgBQfpT4YhHSNKxnVN0Zy-M4KthoC1FMQAvD_BwE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You definitely have to weight up the resultant changes, in the organisations, culture and what the vision is for this organisation, whilst ensuring the data assets are fully protected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 20:57:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cloud-Migration-Brief/m-p/47006#M91</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-08-18T20:57:32Z</dc:date>
    </item>
  </channel>
</rss>

