This talk will deliver two different real-life examples of an enterprise cloud transformation with emphasis on security implementation. Attendees will gain insight into security architecture details across three main categories: security and data privacy integration bottom-up, applying security in depth by peeling down the layers of defense, and breaking down the setup of secure cloud operations.