Cybersecurity event brings together an army of infosec nerds with a focus on threats, vulnerabilities, and innovative defenses.
Lots of money, lots of opportunity, and lots of risk. VCs should abandon status quo investment strategies and look toward services, industry solutions, middleware, and data security.
Enterprises should prepare for, and take advantage of, the consumerization of authentication technology.
In April, Trend Micro announced additions and updates to its Complete User Protection solution and changes to its licensing model that focus on improving its compatibility with cloud computing. Trend Micro’s strategy aids partners in protecting their customers from unnecessary upselling or licensing confusion, while allowing customers to combine on-premises security solutions with cloud-based security services. This strategy can put Trend Micro at a competitive advantage moving forward, provided it educates the market aggressively as to the true extent and benefits of its endpoint security portfolio.
Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN, and middleware.
A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.
CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition.
High demand will drive new intelligence, services, tools, and executive cybersecurity skill sets.
Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change.
Time to stop blaming employees and enlist their help.
Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas.
Strong next-generation cybersecurity must be aligned with identity knowledge and enhancements.
Applications, endpoints, networks, and servers will enforce security policies related to identity and data security.
Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response.
Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
© 2016 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188