Cloud workloads are here, and as the CISO, it's your responsibility to protect them. To protect your sensitive data in the cloud from security breaches, privacy abuses, and other incidents, you need an overarching strategy and a detailed road map that includes cloud discovery and workload management, data protection, activity and threat monitoring, data loss prevention, and identity and access management. This report helps CISOs create a cloud security technology strategy and road map with a systematic and repeatable process.