{"id":533823,"date":"2024-09-23T20:58:00","date_gmt":"2024-09-23T20:58:00","guid":{"rendered":"https:\/\/www.capgemini.com\/au-en\/?p=533823&#038;preview=true&#038;preview_id=533823"},"modified":"2025-02-20T21:01:55","modified_gmt":"2025-02-20T21:01:55","slug":"unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","title":{"rendered":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Unleash your business edge with a \u201cshared fate\u201d approach to cloud security<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2024\/06\/Profile.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Michael Wasielewski Jr<\/h5><h5 class=\"blog-date\">23 Sep 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-exploring-how-embracing-cloud-security-on-google-cloud-can-transform-your-business-in-an-interconnected-world-nbsp\">Exploring how embracing cloud security on Google Cloud can transform your business in an interconnected world.&nbsp;<\/h2>\n\n\n\n<p>Many companies are prepared for the security challenges that will come their way, but others are far from ready \u2013 and that is a risky divide. Data security can literally <a href=\"https:\/\/www.forbes.com\/sites\/davidbalaban\/2023\/07\/27\/data-security-can-make-or-break-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">make or break a business<\/a>, but so many enterprises view it solely as a defensive practice. And the threats are significant. The global damage total from cybercrime is\u202f<a href=\"https:\/\/www.esentire.com\/resources\/library\/2023-official-cybercrime-report\" target=\"_blank\" rel=\"noreferrer noopener\">expected to reach<\/a>\u202f$10.5 trillion by 2025. This is only made worse by ongoing global skills shortage, geopolitical challenges, and supply chain vulnerabilities.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The rise of artificial intelligence improves and complicates the situation. Security teams can leverage AI to enhance compliance, data analysis, and defense strategies, but malicious actors will benefit too. AI-driven phishing scams, for example, will threaten both personal information and corporate defenses. Our recent <a href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/08\/CRI_Data-powered-enterprises_03092024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">report&nbsp;<\/a> concluded that \u201c48 percent of business executives rate data protection and privacy concerns as among the biggest risks associated with generative AI.\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/cloud-ciso-perspectives-3-promising-ai-use-cases-for-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">While security for generative AI use cases<\/a> is still a work in progress, any organization using Gen AI applications must consider the <a href=\"https:\/\/www.capgemini.com\/insights\/expert-perspectives\/the-transformative-power-of-generative-ai-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">security implications and put measures in place \u2013 whether using Gen AI tools<\/a> for specific business use cases, or looking at preventing Gen AI-powered malicious activities.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Security is essential for preventing threats but the tendency to see it only as a defense can create negative perceptions and may cause businesses to act out of fear.&nbsp;<\/p>\n\n\n\n<p>There is a different approach: security can be deployed as a business enabler. Of course, security operations and compliance are essential defensive practices as well, but enterprises that consider security operations to be <a href=\"https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2022\/07\/13\/industry-greats-agree-security-is-good-for-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">more than just a necessary part of doing business<\/a> can begin to leverage security as a tool for strategic growth.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-transforming-business-security-google-cloud-s-shared-fate-approach-nbsp\"><strong>Transforming business security: Google Cloud&#8217;s  \u201cshared fate\u201d approach<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Unlike other hyperscalers that provide customers with security components but let them assemble these themselves\u2014often leading to errors\u2014<a href=\"https:\/\/www.capgemini.com\/about-us\/technology-partners\/google-cloud\/\">Google Cloud<\/a> adopts a more collaborative approach with its clients.&nbsp;<\/p>\n\n\n\n<p>This starts with the build and deployment and continues through the lifecycle of their applications. Google takes a \u201cshared fate\u201d approach to security, meaning the company invests heavily in client outcomes \u2013 providing more prescriptive guidance and blueprints, which optimizes security in an opt-out approach that reduces overall risk as services in the cloud are built and migrated. Google also provides tools like Risk Manager at no additional cost to help clients manage ongoing security and compliance.&nbsp;&nbsp;<\/p>\n\n\n\n<p>We bring GC into the fold along with our best-in-class tools to manage our clients\u2019 total estate \u2013 whether Google is the sole security vendor or one of many. Then we layer in a nuanced approach based on domain expertise and sector-specific needs. For example, thanks to our in-depth expertise in the unique security needs of the financial services sector, we can bring more specific control blueprints for things like SEC regulation compliance in the US, while also keeping an eye toward the future on new regulations like DORA in the EU. And this is equally the case in a wide range of sectors \u2013 from manufacturing to healthcare to aerospace and defense.&nbsp;<\/p>\n\n\n\n<p>While GC\u2019s security blueprints provide very good baselines, our experience and expertise in industry empowers us to bring more granular and audit-proven security controls for client-specific verticals. We build on top of GC security solutions to add our compliance and regulatory expertise and augment risk transfer solutions by way of continuous compliance, which allows clients a real-time understanding of their security state.&nbsp;<\/p>\n\n\n\n<p>This level of granularity often relieves security concerns at the board level and enables enterprises to better optimize their cyber insurance posture, to keep insurance costs down while maintaining advanced coverage.&nbsp;<\/p>\n\n\n\n<p>Security can be an accelerator for business, paving the way for innovation and growth by fostering trust and confidence. That\u2019s why we go beyond safety and compliance: we aim to deliver security solutions that allow our partners to grow and thrive. Here&#8217;s how.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-security-operations-as-a-business-enabler-nbsp\"><strong>Security operations as a business enabler<\/strong>&nbsp;<\/h4>\n\n\n\n<p>Capgemini\u2019s approach to building and delivering cloud security solutions is both progressive and pragmatic \u2013 and driven by four key principles.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cloud infrastructure as an enabler<\/strong> \u2013 Cloud infrastructure enables all facets of security operations to be accomplished faster, more transparently, and more completely. Cloud security tools offer flexibility and agility, which ultimately improves security.&nbsp;<\/li>\n\n\n\n<li><strong>Security is as much about culture as it is about strategy<\/strong> \u2013 When building and implementing a cloud security strategy, we believe it\u2019s important to create support at all layers of the organization. Security needs to be an embedded partner and cannot be perceived as outside the team.&nbsp;<\/li>\n\n\n\n<li><strong>The importance of starting with a solid foundation<\/strong> \u2013 Security has a critical role to play in overall delivery velocity, and automation here is key. But when you\u2019re building automation, you need to have the right foundation first.&nbsp;<\/li>\n\n\n\n<li><strong>Consider the future carefully<\/strong> \u2013 You don\u2019t necessarily need to immediately adopt new security paradigms such as Zero Trust, self-healing apps, or AI for Security, but you do need to understand how they may change your business in the long run.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>We take a lifecycle approach to our cloud security portfolio, ensuring we fulfill clients\u2019 needs no matter where they are on their journey to a secure cloud. For example, clients in the beginning of their cloud maturity model often benefit from quickly establishing effective governance and building appropriate compliance tooling. We work with them to establish their security foundations, while clients that already have governance or a consolidated cloud team often look for validation and ongoing assessment support. For them we look at cloud adoption, modern framework and workload assessments, and ongoing support as they establish their cloud security best practices.&nbsp;&nbsp;<\/p>\n\n\n\n<p>We leverage our experiences across more than 3,900 customers and 15 operations centers, as well as the best of GC\u2019s tools, such as Chronicle SecOps\u2019 speed and scale, threat hunting capabilities, and advanced analytics to ensure comprehensive security protocols are in place for all Gen AI applications and use cases. Together with Capgemini\u2019s 24&#215;7 monitoring and expertise with almost 100 playbooks, it\u2019s a winning combination to help our clients achieve concrete business outcomes \u2013 over and over again.&nbsp;<\/p>\n\n\n\n<p><em>Interested in exploring the \u201cshared fate\u201d approach to cloud security with Google Cloud? Contact us for more information and an assessment<\/em>\u202f\u2013\u202f<a href=\"mailto:googlecloud.global@capgemini.com\" target=\"_blank\" rel=\"noreferrer noopener\">googlecloud.global@capgemini.com<\/a>&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Author<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2024\/06\/Profile.png\" alt=\"Michael Wasielewski Jr\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/mwasielewskijr\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Michael Wasielewski Jr<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Global Head of Cloud Security Services, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/mwasielewskijr\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Michael is responsible for global cloud security and next-gen secure architecture portfolio development. He brings a robust background ranging from network operations and engineering to running global information security teams and modernizing enterprises through their cloud and workplace journeys, as well as executing as a global cloud security specialist for AWS. When not playing video games with his two kids or struggling to learn French, you can often find Michael arguing about what zero trust really means, why you are almost always more secure in the cloud, and why New York-style pizza is the best.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":388,"featured_media":533824,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"fd066e34-e810-49c0-9871-9c2b9d407283\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"5251fcff-712a-486c-81f0-761252c29890\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[66],"service":[42],"industry":[],"partners":[52],"blog-topic":[85],"content-group":[],"class_list":["post-533823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","brand-capgemini","service-cybersecurity","partners-google-cloud","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0<\/title>\n<meta name=\"description\" content=\"Exploring how embracing cloud security on Google Cloud can transform your business in an interconnected world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Australia\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-23T20:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-20T21:01:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Wasielewski Jr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"naveenkumarkannan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\",\"name\":\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg\",\"datePublished\":\"2024-09-23T20:58:00+00:00\",\"dateModified\":\"2025-02-20T21:01:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555\"},\"description\":\"Exploring how embracing cloud security on Google Cloud can transform your business in an interconnected world.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/au-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/au-en\/\",\"name\":\"Capgemini Australia\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555\",\"name\":\"naveenkumarkannan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/au-en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/01575bdf68b49df1225695b846e260e6e3694dc69c8c1649d7a695be465a5826?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/01575bdf68b49df1225695b846e260e6e3694dc69c8c1649d7a695be465a5826?s=96&d=mm&r=g\",\"caption\":\"naveenkumarkannan\"},\"url\":\"https:\/\/www.capgemini.com\/au-en\/author\/naveenkumarkannan\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","description":"Exploring how embracing cloud security on Google Cloud can transform your business in an interconnected world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","og_description":"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.","og_url":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","og_site_name":"Capgemini Australia","article_published_time":"2024-09-23T20:58:00+00:00","article_modified_time":"2025-02-20T21:01:55+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"author":"Michael Wasielewski Jr","twitter_card":"summary_large_image","twitter_title":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","twitter_misc":{"Written by":"naveenkumarkannan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","url":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","name":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","isPartOf":{"@id":"https:\/\/www.capgemini.com\/au-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg","datePublished":"2024-09-23T20:58:00+00:00","dateModified":"2025-02-20T21:01:55+00:00","author":{"@id":"https:\/\/www.capgemini.com\/au-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555"},"description":"Exploring how embracing cloud security on Google Cloud can transform your business in an interconnected world.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage","url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg","contentUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/au-en\/"},{"@type":"ListItem","position":2,"name":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/au-en\/#website","url":"https:\/\/www.capgemini.com\/au-en\/","name":"Capgemini Australia","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/au-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/au-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555","name":"naveenkumarkannan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/au-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/01575bdf68b49df1225695b846e260e6e3694dc69c8c1649d7a695be465a5826?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01575bdf68b49df1225695b846e260e6e3694dc69c8c1649d7a695be465a5826?s=96&d=mm&r=g","caption":"naveenkumarkannan"},"url":"https:\/\/www.capgemini.com\/au-en\/author\/naveenkumarkannan\/"}]}},"blog_topic_info":[{"id":85,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"brand":[{"id":66,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":42,"name":"Cybersecurity","slug":"cybersecurity"}],"partners":[{"id":52,"name":"Google Cloud","slug":"google-cloud"}],"blog-topic":[{"id":85,"name":"Cybersecurity","slug":"cybersecurity"}],"following_users":[{"id":419,"name":"naveenkumarkannan","slug":"naveenkumarkannan"},{"id":376,"name":"shilpasingh","slug":"shilpasingh"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","url":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Australia","logo":""},"keywords":[],"dateCreated":"2024-09-23T20:58:00Z","datePublished":"2024-09-23T20:58:00Z","dateModified":"2025-02-20T21:01:55Z"},"rendered":"<meta name=\"parsely-title\" content=\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/au-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-09-23T20:58:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Australia","distributor_original_site_url":"https:\/\/www.capgemini.com\/au-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2025\/02\/Secirity-Ops.jpg","author_title":"Michael Wasielewski Jr","author_thumbnail_url":"https:\/\/www.capgemini.com\/au-en\/wp-content\/uploads\/sites\/10\/2024\/06\/Profile.png?w=768","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/posts\/533823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/users\/388"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/comments?post=533823"}],"version-history":[{"count":1,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/posts\/533823\/revisions"}],"predecessor-version":[{"id":533826,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/posts\/533823\/revisions\/533826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/media\/533824"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/media?parent=533823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/categories?post=533823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/tags?post=533823"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/brand?post=533823"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/service?post=533823"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/industry?post=533823"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/partners?post=533823"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/blog-topic?post=533823"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/au-en\/wp-json\/wp\/v2\/content-group?post=533823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}