{"id":730424,"date":"2024-10-10T05:40:09","date_gmt":"2024-10-10T10:40:09","guid":{"rendered":"https:\/\/www.capgemini.com\/us-en\/?p=730424&#038;preview=true&#038;preview_id=730424"},"modified":"2025-02-19T00:05:07","modified_gmt":"2025-02-19T05:05:07","slug":"unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","title":{"rendered":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1><strong>Unleash your business edge with a \u201cshared fate\u201d approach to cloud security<\/strong><\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/12\/Profile.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Michael Wasielewski Jr<\/h5><h5 class=\"blog-date\">23 Sep 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-exploring-how-embracing-cloud-security-on-google-cloud-platform-can-transform-your-business-in-an-interconnected-world-nbsp\">Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.&nbsp;<\/h2>\n\n\n\n<p>Many companies are prepared for the security challenges that will come their way, but others are far from ready \u2013 and that is a risky divide. Data security can literally <a href=\"https:\/\/www.forbes.com\/sites\/davidbalaban\/2023\/07\/27\/data-security-can-make-or-break-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">make or break a business<\/a>, but so many enterprises view it solely as a defensive practice. And the threats are significant. The global damage total from cybercrime is\u202f<a href=\"https:\/\/www.esentire.com\/resources\/library\/2023-official-cybercrime-report\" target=\"_blank\" rel=\"noreferrer noopener\">expected to reach<\/a>\u202f$10.5 trillion by 2025. This is only made worse by ongoing global skills shortage, geopolitical challenges, and supply chain vulnerabilities.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The rise of artificial intelligence improves and complicates the situation. Security teams can leverage AI to enhance compliance, data analysis, and defense strategies, but malicious actors will benefit too. AI-driven phishing scams, for example, will threaten both personal information and corporate defenses. Our recent <a href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/08\/CRI_Data-powered-enterprises_03092024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">report&nbsp;<\/a> concluded that \u201c48 percent of business executives rate data protection and privacy concerns as among the biggest risks associated with generative AI.\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/cloud-ciso-perspectives-3-promising-ai-use-cases-for-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">While security for generative AI use cases<\/a> is still a work in progress, any organization using Gen AI applications must consider the <a href=\"https:\/\/www.capgemini.com\/insights\/expert-perspectives\/the-transformative-power-of-generative-ai-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">security implications and put measures in place \u2013 whether using Gen AI tools<\/a> for specific business use cases, or looking at preventing Gen AI-powered malicious activities.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Security is essential for preventing threats but the tendency to see it only as a defense can create negative perceptions and may cause businesses to act out of fear.&nbsp;<\/p>\n\n\n\n<p>There is a different approach: security can be deployed as a business enabler. Of course, security operations and compliance are essential defensive practices as well, but enterprises that consider security operations to be <a href=\"https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2022\/07\/13\/industry-greats-agree-security-is-good-for-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">more than just a necessary part of doing business<\/a> can begin to leverage security as a tool for strategic growth.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-transforming-business-security-google-cloud-platform-s-shared-fate-approach-nbsp\"><strong>Transforming business security: Google Cloud Platform&#8217;s \u201cshared fate\u201d approach<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Unlike other hyperscalers that provide customers with security components but let them assemble these themselves\u2014often leading to errors\u2014<a href=\"https:\/\/www.capgemini.com\/about-us\/technology-partners\/google-cloud\/\">Google Cloud<\/a> Platform (GCP) adopts a more collaborative approach with its clients.&nbsp;<\/p>\n\n\n\n<p>This starts with the build and deployment and continues through the lifecycle of their applications. Google takes a \u201cshared fate\u201d approach to security, meaning the company invests heavily in client outcomes \u2013 providing more prescriptive guidance and blueprints, which optimizes security in an opt-out approach that reduces overall risk as services in the cloud are built and migrated. Google also provides tools like Risk Manager at no additional cost to help clients manage ongoing security and compliance.&nbsp;&nbsp;<\/p>\n\n\n\n<p>We bring GCP into the fold along with our best-in-class tools to manage our clients\u2019 total estate \u2013 whether Google is the sole security vendor or one of many. Then we layer in a nuanced approach based on domain expertise and sector-specific needs. For example, thanks to our in-depth expertise in the unique security needs of the financial services sector, we can bring more specific control blueprints for things like SEC regulation compliance in the US, while also keeping an eye toward the future on new regulations like DORA in the EU. And this is equally the case in a wide range of sectors \u2013 from manufacturing to healthcare to aerospace and defense.&nbsp;<\/p>\n\n\n\n<p>While GCP\u2019s security blueprints provide very good baselines, our experience and expertise in industry empowers us to bring more granular and audit-proven security controls for client-specific verticals. We build on top of GCP security solutions to add our compliance and regulatory expertise and augment risk transfer solutions by way of continuous compliance, which allows clients a real-time understanding of their security state.&nbsp;<\/p>\n\n\n\n<p>This level of granularity often relieves security concerns at the board level and enables enterprises to better optimize their cyber insurance posture, to keep insurance costs down while maintaining advanced coverage.&nbsp;<\/p>\n\n\n\n<p>Security can be an accelerator for business, paving the way for innovation and growth by fostering trust and confidence. That\u2019s why we go beyond safety and compliance: we aim to deliver security solutions that allow our partners to grow and thrive. Here&#8217;s how.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-security-operations-as-a-business-enabler-nbsp\"><strong>Security operations as a business enabler<\/strong>&nbsp;<\/h4>\n\n\n\n<p>Capgemini\u2019s approach to building and delivering cloud security solutions is both progressive and pragmatic \u2013 and driven by four key principles.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cloud infrastructure as an enabler<\/strong> \u2013 Cloud infrastructure enables all facets of security operations to be accomplished faster, more transparently, and more completely. Cloud security tools offer flexibility and agility, which ultimately improves security.&nbsp;<\/li>\n\n\n\n<li><strong>Security is as much about culture as it is about strategy<\/strong> \u2013 When building and implementing a cloud security strategy, we believe it\u2019s important to create support at all layers of the organization. Security needs to be an embedded partner and cannot be perceived as outside the team.&nbsp;<\/li>\n\n\n\n<li><strong>The importance of starting with a solid foundation<\/strong> \u2013 Security has a critical role to play in overall delivery velocity, and automation here is key. But when you\u2019re building automation, you need to have the right foundation first.&nbsp;<\/li>\n\n\n\n<li><strong>Consider the future carefully<\/strong> \u2013 You don\u2019t necessarily need to immediately adopt new security paradigms such as Zero Trust, self-healing apps, or AI for Security, but you do need to understand how they may change your business in the long run.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>We take a lifecycle approach to our cloud security portfolio, ensuring we fulfill clients\u2019 needs no matter where they are on their journey to a secure cloud. For example, clients in the beginning of their cloud maturity model often benefit from quickly establishing effective governance and building appropriate compliance tooling. We work with them to establish their security foundations, while clients that already have governance or a consolidated cloud team often look for validation and ongoing assessment support. For them we look at cloud adoption, modern framework and workload assessments, and ongoing support as they establish their cloud security best practices.&nbsp;&nbsp;<\/p>\n\n\n\n<p>We leverage our experiences across more than 3,900 customers and 15 operations centers, as well as the best of GCP\u2019s tools, such as Chronicle SecOps\u2019 speed and scale, threat hunting capabilities, and advanced analytics to ensure comprehensive security protocols are in place for all Gen AI applications and use cases. Together with Capgemini\u2019s 24&#215;7 monitoring and expertise with almost 100 playbooks, it\u2019s a winning combination to help our clients achieve concrete business outcomes \u2013 over and over again.&nbsp;<\/p>\n\n\n\n<p><em>Interested in exploring the \u201cshared fate\u201d approach to cloud security with Google Cloud Platform? Contact us for more information and an assessment<\/em>\u202f\u2013\u202f<a href=\"mailto:googlecloud.global@capgemini.com\" target=\"_blank\" rel=\"noreferrer noopener\">googlecloud.global@capgemini.com<\/a>&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Author<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/12\/Profile.png\" alt=\"Michael Wasielewski Jr\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/mwasielewskijr\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Michael Wasielewski Jr<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Global Head of Cloud and Gen AI &#8211; Security Strategy and Portfolio, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/mwasielewskijr\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Michael leads global cloud security and Gen AI \u2013 Security Strategy and Portfolio, leveraging extensive experience in network operations, information security, and cloud modernization. <\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":388,"featured_media":730425,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"fd066e34-e810-49c0-9871-9c2b9d407283\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"5251fcff-712a-486c-81f0-761252c29890\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"506","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[506],"service":[47],"industry":[],"partners":[168],"blog-topic":[153],"content-group":[],"class_list":["post-730424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","brand-capgemini","service-cybersecurity","partners-google-cloud","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0<\/title>\n<meta name=\"description\" content=\"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini USA\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-10T10:40:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T05:05:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Wasielewski Jr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"naveenkumarkannan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\",\"name\":\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg\",\"datePublished\":\"2024-10-10T10:40:09+00:00\",\"dateModified\":\"2025-02-19T05:05:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555\"},\"description\":\"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/us-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/\",\"name\":\"Capgemini USA\",\"description\":\"Just another www.capgemini.com site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555\",\"name\":\"naveenkumarkannan\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/author\/naveenkumarkannan\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","description":"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","og_description":"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.","og_url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","og_site_name":"Capgemini USA","article_published_time":"2024-10-10T10:40:09+00:00","article_modified_time":"2025-02-19T05:05:07+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"author":"Michael Wasielewski Jr","twitter_card":"summary_large_image","twitter_title":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","twitter_misc":{"Written by":"naveenkumarkannan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","name":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","isPartOf":{"@id":"https:\/\/www.capgemini.com\/us-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg","datePublished":"2024-10-10T10:40:09+00:00","dateModified":"2025-02-19T05:05:07+00:00","author":{"@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555"},"description":"Exploring how embracing cloud security on Google Cloud Platform can transform your business in an interconnected world.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#primaryimage","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg","contentUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/us-en\/"},{"@type":"ListItem","position":2,"name":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/us-en\/#website","url":"https:\/\/www.capgemini.com\/us-en\/","name":"Capgemini USA","description":"Just another www.capgemini.com site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/5431e26851c0d327d26d3e9558eee555","name":"naveenkumarkannan","url":"https:\/\/www.capgemini.com\/us-en\/author\/naveenkumarkannan\/"}]}},"blog_topic_info":[{"id":153,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"brand":[{"id":506,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurity","slug":"cybersecurity"}],"partners":[{"id":168,"name":"Google Cloud","slug":"google-cloud"}],"blog-topic":[{"id":153,"name":"Cybersecurity","slug":"cybersecurity"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0","url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini USA","logo":""},"keywords":[],"dateCreated":"2024-10-10T10:40:09Z","datePublished":"2024-10-10T10:40:09Z","dateModified":"2025-02-19T05:05:07Z"},"rendered":"<meta name=\"parsely-title\" content=\"Unleash your business edge with a \u201cshared fate\u201d approach to cloud security\u00a0\u00a0\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-your-business-edge-with-a-shared-fate-approach-to-cloud-security\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-10-10T10:40:09Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":712405,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/celebrating-google-cloud-partner-of-the-year\/","url_meta":{"origin":730424,"position":0},"title":"Celebrating Google Cloud Partner of the Year","author":"naveenkumarkannan","date":"January 30, 2024","format":false,"excerpt":"Celebrating Google Cloud Partner of the YearGenevieve ChamardSep 1, 2023 FacebookTwitterLinkedin What does a powerful partner look like? I believe that a strong partnership adds value and uncovers new opportunities by combining the strengths from each angle, to create a unique, collaborative advantage. This is exactly how I see Capgemini\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/01\/Web-preview-banner-600-375.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/01\/Web-preview-banner-600-375.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/01\/Web-preview-banner-600-375.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":666519,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/employing-a-data-first-approach-to-connected-products-with-a-cloud-native-platform\/","url_meta":{"origin":730424,"position":1},"title":"Employing a data-first approach to connected products with a cloud-native platform","author":"mamtarane","date":"March 15, 2023","format":false,"excerpt":"Employing a data-first approach to connected products with a cloud-native platformArne Rossmann15th March 2023 FacebookTwitterLinkedinConnected products increase revenue and create smoother customer experiences, but only with the correct use of data amid data-explosion in the current connected world. Data generated throughout a connected product\u2019s lifecycle can be used to introduce\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/03\/MicrosoftTeams-image-43-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/03\/MicrosoftTeams-image-43-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/03\/MicrosoftTeams-image-43-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/03\/MicrosoftTeams-image-43-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":662179,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/envisioning-the-future-of-accounts-receivable\/","url_meta":{"origin":730424,"position":2},"title":"Envisioning the future of accounts receivable","author":"Sai Kiran","date":"February 15, 2023","format":false,"excerpt":"BlackLine is a leader in accounting automation software, with a portfolio that includes BlackLine Cash Apps \u2013 an AI-powered cloud-based platform that enables accounts receivable automation and digital transformation","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/Capture-3.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/Capture-3.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/Capture-3.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":693081,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-connectivity-will-accelerate-the-deployment-of-autonomous-mobility-solutions\/","url_meta":{"origin":730424,"position":3},"title":"How connectivity will accelerate the deployment of autonomous mobility solutions","author":"anujapotnis","date":"June 27, 2023","format":false,"excerpt":"How connectivity will accelerate the deployment of autonomous mobility solutionsOussama Ben Moussa28 June 2023 FacebookTwitterLinkedin Why connectivity in autonomous vehicles and robots matters Across industries, big bets are being placed on business models that leverage autonomous vehicles and robots. The trend seems irreversible - from fleets of drones in our\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/06\/REMOTIS_Barcelona_II-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":662208,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/achieving-net-zero-aviation-will-need-rapid-innovation-digital-engineering-can-deliver-it\/","url_meta":{"origin":730424,"position":4},"title":"Achieving net zero aviation will need rapid innovation. Digital engineering can deliver it","author":"jayantapakrashi","date":"February 16, 2023","format":false,"excerpt":"Achieving net zero aviation will need rapid innovation. Digital engineering can deliver itCapgemini16 Feb 2023 FacebookTwitterLinkedin The aviation industry is committed to net zero emissions by 2050. To enable them to achieve this, aerospace manufacturers are adopting a range of approaches, including sustainable aviation fuels (SAFs), lighter airframes, optimising and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/Future-of-engineering.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/Future-of-engineering.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/Future-of-engineering.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/Future-of-engineering.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":663293,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/evolving-5g-experiences\/","url_meta":{"origin":730424,"position":5},"title":"Evolving 5G experiences","author":"anujapotnis","date":"February 27, 2023","format":false,"excerpt":"Evolving 5G ExperiencesAshish Yadav27 Feb 2023 FacebookTwitterLinkedin Several innovative technologies are just now reaching maturity. When they come together, the results are on a whole new level. Wireless internet continues to evolve with each generation of 3GPP, and today connectivity has revolutionized how we design and consume internet in our\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/shutterstock_1930856735.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/shutterstock_1930856735.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/shutterstock_1930856735.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/02\/shutterstock_1930856735.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini USA","distributor_original_site_url":"https:\/\/www.capgemini.com\/us-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/Secirity-Ops.jpg","author_title":"Michael Wasielewski Jr","author_thumbnail_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/12\/Profile.png?w=768","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/730424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/users\/388"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/comments?post=730424"}],"version-history":[{"count":3,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/730424\/revisions"}],"predecessor-version":[{"id":737176,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/730424\/revisions\/737176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media\/730425"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media?parent=730424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/categories?post=730424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/tags?post=730424"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/brand?post=730424"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/service?post=730424"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/industry?post=730424"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/partners?post=730424"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/blog-topic?post=730424"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/content-group?post=730424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}