Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change.
Time to stop blaming employees and enlist their help.
Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas.
Strong next-generation cybersecurity must be aligned with identity knowledge and enhancements.
Applications, endpoints, networks, and servers will enforce security policies related to identity and data security.
Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response.
Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends.
Large organizations need help monitoring user behavior activity, alternative endpoints, threat intelligence, and sensitive data.
Data collection, analysis tools, and hiring staff top the list of actions.
Sourcefire, architecture, and services place Cisco in the catbird seat for emerging enterprise cybersecurity requirements if Cisco remains aggressive.
Enterprise organizations benefit by monitoring user activity and improving identity and access management (IAM) processes.
FireEye, IBM, and Symantec announcements move the cybersecurity industry in this inevitable direction.
Symantec statement must be put in context of endpoint defense-in-depth.
Many organizations lack the right skills, budgets, and security analysis tools.
New services can help enterprises assess and mitigate risk in the cyber supply chain.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188