Doron Davidson, CEO of CyberProof

Opinion
How cloud services become an attractive target during war

"Migrating to the cloud during wartime necessitates strategic thinking for security and risk management," writes Doron Davidson, Israel GM at CyberProof. 

In recent years, more and more companies have shifted their operations primarily to the cloud—a trend that gains even greater momentum during times of war. The accelerated migration to the cloud allows organizations to benefit from flexibility, cost savings, and continuous upgrades to their information security capabilities. However, alongside these advantages, unprecedented cyber challenges have emerged, as terrorist organizations and enemy states increasingly identify cloud services as attractive targets for attacks aimed at disrupting the operations of Israeli organizations and institutions. In an era where the digital space is a primary battlefield, the cloud has become the new front line in the cyber war.
1 View gallery
Doron Davidson CyberProof
Doron Davidson CyberProof
Doron Davidson, CEO of CyberProof
(Photo: Becky Kestenbaum)
The move to the cloud didn't start yesterday—it began with dedicated applications like Salesforce, but today it encompasses all organizational systems, including advanced security systems such as SIEM (Security Information and Event Management). These systems monitor and detect security incidents in real-time, acting like a guard at the gate, tracking all organizational activities to alert of any suspicious behavior. When these systems migrate to the cloud, they improve their ability to identify threats quickly and efficiently, but at the same time, they introduce new security challenges due to the increased exposure to risks.
The use of cloud-based SIEM systems, such as Microsoft's and Google's solutions, highlights the need for flexible and innovative security measures capable of addressing evolving threats. The cloud enables organizations to respond swiftly and automatically to attacks, but it also exposes the systems to potential vulnerabilities, especially as the attacks become more complex and targeted. The ability to detect attacks in real-time is more critical than ever, but it requires constant upgrades to organizational tools and systems, as well as processes and expertise.
However, the shift to the cloud is not just a technological change but also a conceptual shift, requiring organizations to adapt to new workflows. Organizations must update internal policies, implement regulatory adjustments, and, at times, undergo a full organizational transformation. Additionally, the move to the cloud exposes organizations to challenges in risk management, stemming from increased traffic, a multitude of external connections, and international access to data.
In practice, the migration to the cloud presents challenges that demand thorough organizational preparedness. It is crucial to ensure that the chosen platform aligns with the business needs and to plan the migration by mapping existing infrastructures, applications, and data. This planning includes risk assessment and the adaptation of new workflows to address escalating threats. It is not only important to choose the best platform but also to set clear goals for the migration, such as cost savings, flexibility, innovation, or scaling, and to align the architecture with business processes and risk management.
Even after the transition to the cloud, challenges do not end. Ongoing system maintenance, regular security updates, and regulatory adjustments are required to ensure data safety. Detailed cyber scenarios must be developed to enable the rapid identification of attacks, automation of response, and swift and effective investigation of incidents. The use of security experts skilled in working with cloud systems can help organizations better prepare and manage risks more effectively.
The main challenge in migrating to the cloud stems from the centralization of information and its global accessibility. In the past, data was stored within the organization itself, but the cloud places it in a more open digital space, vulnerable to attacks. This is why managing information security in the cloud requires a comprehensive approach, which includes not only identity and access management but also data encryption, meticulous access control, and advanced tools for monitoring and responding to cyber incidents.
Migrating to the cloud during wartime necessitates strategic thinking for security and risk management, ensuring that organizations can continue operating safely and efficiently amid sophisticated and relentless attacks. In a world where cyber threats are becoming increasingly complex and intense, Israeli organizations must combine advanced technologies, human expertise, and continuous strategic planning. Ultimately, migrating to the cloud is not just a technological process but a strategic challenge that can ensure the continued functioning of organizations in the face of escalating cyberattacks.
Doron Davidson is Israel GM at CyberProof