According to Gartner, the next phase of cloud computing will involve migrating more complex workloads and presenting new options and requirements for cloud customers. Enterprises currently view the cloud as a way to increase capacity, but by 2028, it will be seen as a necessity and a source of innovation. Legacy applications, including those on mainframes or legacy mid-range systems, will need to be converted or rewritten to be compatible with the cloud. Gartner predicts that by 2028, 70% of tech workloads will run in a cloud environment, compared to the current 25%. Cloud computing will not only be necessary for businesses to compete but also for their survival. However, moving critical applications to the cloud may be challenging. Businesses may choose to impose cloud attributes on these workloads while keeping them in their corporate data centers. Gartner also expects more interest in industry cloud platforms, which combine industry-specific offerings with cloud services. By 2028, over 50% of enterprises will use industry cloud platforms to accelerate their initiatives. Companies will have an expanding range of cloud options beyond the major platforms. Cost governance will remain a focus, and companies will need to manage their cloud spend effectively. Cloud computing is increasingly seen as a secure option, but an area of growing interest is digital sovereignty, ensuring that cloud data is held under the correct data protection regime. To join the new wave of cloud computing, companies should audit their in-house systems and evaluate their application portfolio. Staffing is crucial as well, and companies need a plan to integrate cloud into their technology or business strategy. Executives should monitor and control cloud spending to avoid overspending. Evaluating costs, calculating total cost of ownership and return on investment, considering long-term benefits, and focusing on impactful activities are key recommendations. Cloud resilience is also important, and businesses should align resilience requirements with their needs, take a risk-based approach, build dependency graphs, and implement automated disaster recovery.