Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Cybersecurity Standards Protect the Innovative Tech That’s Driving Sustainability
Cybersecurity

How Cybersecurity Standards Protect the Innovative Tech That’s Driving Sustainability

Chris HughesBy Chris HughesMarch 30, 20233 Mins Read
Facebook Twitter LinkedIn Email
sustainability cybersecurity
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

We continue to see a push for sustainability in the technology sector. It’s receiving greater attention due to political and social discourse on climate change and the growth of massive cloud computing facilities and their environmental footprint.

Innovative technologies including digital sensors, Internet of Things (IoT) devices, and others support the push for sustainability but they need to be safeguarded — along with the data they process, store, and utilize — in ways that don’t apply to the legacy technologies they are replacing.

Perils of Integrating Sustainable Technologies

As these “smart” devices get integrated into our operational technology (OT) footprint and critical infrastructure, they increase the attack surface that malicious actors can target. Massive growth in IoT and connected devices creates a need for modernized data security standards that takes these innovative technologies, and their expanding usage, into consideration

Additionally, sustainable technologies, much like the broader IT and OT ecosystem, rely heavily on open-source software (OSS), which requires its own unique cybersecurity safeguards. This includes understanding your OSS component inventory, the provenance of those OSS components, and being prepared to “virtually patch” components if project maintainers don’t respond to vulnerabilities in the timelines you require.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Attacks and the Need for Modernized Data Standards

Sustainable technologies play a key role in critical infrastructure and citizen services upon which our society relies. We know that critical infrastructure is regularly under attack, not just from run-of-the-mill malicious actors, but also national state-sponsored attackers, as we saw in the case of the Colonial Pipeline ransomware attack.

That attack impacted millions of Americans and cost a significant amount to both the organization and citizens due to panic buying and other responses to the pipeline’s shutdown. It also sparked a response from the Transportation Security Agency, which issued new guidance and requirements to pipeline operators.

This is where secure data standards for sustainable technology and efforts come into play. Organizations should be deliberate in their efforts to examine their sustainability efforts, the technologies involved and, most importantly, the data involved.

From there, they can create secure data standards that leverage existing frameworks such as the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF), which is currently undergoing its largest-ever update. As an indicator of the breadth of this work, NIST has even gone as far as producing a “Manufacturing Profile,” which is tailored for managing risk associated with manufacturers.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Continue the Conversation

NIST isn’t the only organization discussing cybersecurity and its relationship to sustainability and associated technologies. The World Economic Forum (WEF) states that cybersecurity should also be a part of environmental, social, and governance (ESG) efforts, saying that cyber threats pose risks to corporate value and to society, and that insurance cannot mitigate risk indefinitely.

Leaders from some of the world’s largest technology organizations, such as Julie Sweet, CEO of Accenture, are echoing this sentiment, noting that sustainability is driving business objectives and that corporate leadership must also consider cybersecurity in its conversations around sustainability.

Final Thoughts

While organizations are integrating sustainability considerations and goals into their key business objectives and strategies, they are faced with cyber threats that continue to evolve and a threat landscape that remains dynamic. This requires a comprehensive approach that considers cybersecurity as part of broader sustainability goals tied to business objectives. If we neglect to incorporate cybersecurity into emerging sustainability initiatives, we risk ending up with an approach that is “bolted-on” rather than “built-in.”


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cloud Compliance featured governance Internet of Things IoT Open-Source Software Sustainability sustainability-archive vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Marc Benioff AI Report Card Includes A+ for Vision but C- for Math

June 30, 2025

OpenAI Partners with Google Cloud Amid Soaring AI Demand, Reshaping Ties with Microsoft

June 30, 2025

Dear Marc Benioff: If AI Does 50% of Work at Salesforce, Layoffs Looming?

June 30, 2025

How One Company Added 20% to Profit with Cloud Optimization

June 27, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Marc Benioff AI Report Card Includes A+ for Vision but C- for Math
  • OpenAI Partners with Google Cloud Amid Soaring AI Demand, Reshaping Ties with Microsoft
  • Dear Marc Benioff: If AI Does 50% of Work at Salesforce, Layoffs Looming?
  • AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare
  • How One Company Added 20% to Profit with Cloud Optimization

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.