Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Security Chiefs Pitch Actionable Strategies to Meet Big Impact IT Trends for 2013

January 2013 by RSA, The Security Division of EMC

RSA®, The Security Division of EMC® Corporation, released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, enterprise mobility and social media will transform enterprise IT and hammer away at the foundations of information security strategies in 2013.

The Security for Business Innovation Council’s latest report, titled "Information Security Shake-Up: Disruptive Innovations to Test Security’s Mettle in 2013," is derived from the expertise and real-world experiences of 19 security leaders, who represent some of the world’s most forward-thinking security organizations.

The Council’s latest report details four strategies to help enterprises adapt information security programs to help enable business innovation over the next 12 months. These strategies include how to boost risk and business skills, court middle management, tackle IT supply chain issues and build tech-savvy action plans. The Council’s guidance will help enterprises face the impact of the technology adoption of cloud computing, social media, mobile and Big Data. The Council also outlines the major impacts of these trends for security teams and how to address them.

 1. Cloud Computing - The accelerated adoption of cloud will push security concerns to the forefront. In order to meet requirements, enterprises will need to find ways to effectively evaluate their providers’ security controls - which also includes implementing continuous monitoring.

 2. Social Media- Security teams will need comprehensive policies and effective security controls to actively manage the risks of social media. A good social media risk management strategy will need to involve a multidisciplinary team.

 3. Mobile- The risks of mobile adoption continue to increase forcing security teams to have to carefully manage these risks to reap the rewards without major incidents. Security teams will need to build strategies with the understanding that the end-point is not trusted.

 4. Big Data - The value of Big Data will require security teams to build out multi-year plans to properly evolve their security management model. These plans will enable security teams to utilize Big Data to detect and more effectively remediate security threats. To be the most effective security teams must also be involved in any new Big Data projects from the onset in order to understand the impending risks and develop the strategies to manage them.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts