Security Chiefs Pitch Actionable Strategies to Meet Big Impact IT Trends for 2013
Latest SBIC Report Reveals Accelerated Enterprise Adoption of Big Data, Mobile, Social Media and Cloud Computing Introduce Significant Gaps in Information Security Programs
STORY HIGHLIGHTS
- A special report from the Security for Business Innovation Council (SBIC) urges rapid-fire changes to information security strategies to take on the transformational forces of cloud computing, social media, mobile, and Big Data.
- As enterprises intensify their adoption of advanced technologies, it is exposing significant gaps in information security programs such as lack of business skills and relationships, supply chain management and tech-savvy action plans.
- Recommendations outline how security teams can reduce risk through rapid innovation.
BEDFORD, MASS , JANUARY 3, 2013 -
RSA®, The Security Division of EMC® Corporation (NYSE:EMC), released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, enterprise mobility and social media will transform enterprise IT and hammer away at the foundations of information security strategies in 2013.
The Security for Business Innovation Council’s latest report, titled “Information Security Shake-Up: Disruptive Innovations to Test Security’s Mettle in 2013,” is derived from the expertise and real-world experiences of 19 security leaders, who represent some of the world’s most forward-thinking security organizations.
The Council’s latest report details four strategies to help enterprises adapt information security programs to help enable business innovation over the next 12 months. These strategies include how to boost risk and business skills, court middle management, tackle IT supply chain issues and build tech-savvy action plans. The Council’s guidance will help enterprises face the impact of the technology adoption of cloud computing, social media, mobile and Big Data. The Council also outlines the major impacts of these trends for security teams and how to address them.
- Cloud Computing – The accelerated adoption of cloud will push security concerns to the forefront. In order to meet requirements, enterprises will need to find ways to effectively evaluate their providers’ security controls - which also includes implementing continuous monitoring.
- Social Media- Security teams will need comprehensive policies and effective security controls to actively manage the risks of social media. A good social media risk management strategy will need to involve a multidisciplinary team.
- Mobile– The risks of mobile adoption continue to increase forcing security teams to have to carefully manage these risks to reap the rewards without major incidents. Security teams will need to build strategies with the understanding that the end-point is not trusted.
- Big Data – The value of Big Data will require security teams to build out multi-year plans to properly evolve their security management model. These plans will enable security teams to utilize Big Data to detect and more effectively remediate security threats. To be the most effective security teams must also be involved in any new Big Data projects from the onset in order to understand the impending risks and develop the strategies to manage them.
EXECUTIVE QUOTES:
Eddie Schwartz, Chief Information Security Officer, RSA, The Security Division of EMC
“Information security must evolve in 2013 from reactive perimeter and signature-based approaches, to risk-based programs that protect the most important business assets in whatever context they may exist – cloud, mobile, or traditional data center. To succeed security leaders must invest in intelligence-driven strategies that harness the power of Big Data analytics and agile decision support.”
Dr. Martijn Dekker, Senior Vice President, Chief Information Security Officer, ABN Amro
“Information security isn’t just about IT anymore. Trends like cloud computing and consumerization are quickly extending the information-security role. It’s about business. It’s about people. It’s about risk management.”
ABOUT THE SECURITY FOR BUSINESS INNOVATION COUNCIL
The Security for Business Innovation Council is a group of top security leaders from Global 1000 enterprises committed to advancing information security worldwide by sharing their diverse professional experiences and insights. The Council produces periodic reports exploring information security’s central role in enabling business innovation.
Contributors to this report include 19 security leaders from some of the largest global enterprises:
Contributors to this report include 19 security leaders from some of the largest global enterprises:
ABN Amro | FedEx | Nokia |
ADP, Inc. | Fidelity Investments | SAP AG |
Airtel | Intel | TELUS |
AstraZeneca | HDFC Bank | T-Mobile USA |
Coca-Cola | HSBC Holdings plc. | Walmart |
eBay | Johnson & Johnson | |
EMC | JPMorgan Chase |
ADDITIONAL RESOURCES
- Download the Security for Business Innovation Council Report
- Watch Video of Dave Martin on 2013 SBIC Trends Report
- Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast
ABOUT RSA
RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance- management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.
Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visitwww.EMC.com/RSA.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.