M
Access personal records, make payments, and see your schedule.

Get into your courses through our learning management system.

Access your university emails.

More resources you may be looking for:

This week, we’re pleased to feature a guest blog post on cloud integration from Chad Eckles, who has over 15 years of technical and leadership experience in the cybersecurity industry and with the Department of Defense. He will teach Technology Leadership in the Winter 2025 term in our IT program.

Cloud computing has become a cornerstone for businesses seeking speed, flexibility, and cost savings. By lowering capital expenditures and reducing the need for additional overhead, cloud computing has become an integral part of nearly every technology executive’s long-term strategy. However, weaving cloud solutions into an organization’s technology fabric requires careful consideration of both security and cost management. In an ever-changing world of cloud technology, finding the right balance can be easier said than done. Here are practical tips to help navigate through this complex terrain.

Developing a Clear Cloud Strategy

Traditionally, leaders have often approached the cloud journey similar to their legacy, on-premise datacenter. But cloud is different – scalability is almost limitless, a vast array of services become instantly available, and software integration shifts dramatically. All of this being said, a clear and well-outlined cloud strategy is absolutely foundational before traveling too far down the path.

Start by thinking through specific needs of the organization and how the core business objectives could be better enabled via the shift towards cloud computing. Is the decision purely financial? Are you hoping to enhance operational effectiveness, improve performance, or have quicker access to more advanced tooling? Understanding the “why” behind the move will help shape and mold your cloud strategy in a way that is meaningful to the business.

Additionally, gaining a firm grasp on your current environment’s inventory and technical landscape is paramount. Identifying mission-critical applications and supporting infrastructure, candidate systems for decommissioning, and any high-risk components of your architecture will help scope and prioritize cloud initiatives in a logical, secure, and purpose-driven manner.

Prioritizing Security and Data Protection

Data protection is a core tenet of doing business in the cloud and many of the traditional cybersecurity guardrails still are in play. First, encrypt data both in-transit and at-rest. Although many cloud service providers now include default encryption, it is advisable to implement key management solutions using customer-managed keys for the most optimal protection.

Identity has become the primary focus of modern security. Experts now agree that, unlike the past emphasis on firewalls, securing identity is the new critical entry point that must be safeguarded. Security measures such as multifactor authentication (MFA), just-in-time (JIT) access, and role-based access controls should be a top priority.

Learning from ransomware cases over the last decade, basics such as backups must not be forgotten. The power of cloud allows organizations to more easily replicate data to various regions to improve disaster recovery and business continuity. Lastly, many cloud vendors offer native intrusion detection systems (IDS), firewalls, and security monitoring solutions to address security threats. Collectively, these capabilities help the business better detect and respond to significant risks that could cause serious damage.

Monitoring and Optimizing Cloud Spend

Rapid deployment and scalability are exciting, but cost still must be managed wisely. Begin by monitoring and establishing a baseline for expenditures. Are costs continually fluctuating or staying relatively flat? While cost estimation calculators provide initial figures, ongoing monitoring aligns expectations with reality. It is also recommended to leverage cost optimization tooling to reveal where saving opportunities could occur. Evaluate the necessity of 24/7 server operation, use autoscaling for high-traffic periods, and right-size resources accordingly. These strategies effectively optimize spending and keep the budget in check.

It is also important to recognize that your cloud journey will evolve. Regularly review and adjust cloud usage to align to strategic business objectives. Conducting periodic assessments focused on efficient resource utilization and cost-saving opportunities will provide up-to-date intelligence that enables better decision-making for the business.

Engaging Stakeholders

One item that unfortunately gets less attention than it truly deserves is stakeholder engagement. Even if the balance sheet looks healthier and advanced technology is enticing, we must not overlook how stakeholders and customers will experience it. Engaging stakeholders from across the organization, as well as external consumer groups, allow you to consider multiple perspectives.

Communication is crucial to stakeholder engagement and embracing a growth mindset is encouraged. Regular updates and transparent communication not only build trust and make participants feel valued, but they also lead to a more robust and improved outcome than initially planned.

Conclusion

Integrating cloud solutions into your corporate technology strategy can provide massive benefits, but it can also present a plethora of risks as well. By educating yourself on these practices, along with other core lessons learned in DU’s Master’s in IT with a concentration in Cybersecurity Management, you will set yourself up for success when navigating the many complexities of operating securely and effectively in the cloud.

 

Chad Eckles (M.S., Regis University) is a seasoned technology professional who currently leads the development and engineering of a large-scale cloud program at a prominent software development company. In this role, he builds security policies, designs technical architectures, and provides advisory services on security best practices. Chad has been teaching at the University of Denver since 2021 and has previously taught at Colorado Technical University, specializing in computer science and cybersecurity studies. With over 15 years of technical and leadership experience in the cybersecurity industry and the Department of Defense (DoD), he has supported a diverse portfolio of high-visibility projects. Additionally, Chad serves as a Maritime Cyber Warfare Officer in the Navy Reserves, where he helps lead Sailors across various cyberspace and intelligence mission sets to support national security.