Counterintuitive perspective but in the end, mobile computing chaos may help improve enterprise cybersecurity strategy.
Outsource tasks and understand what motivates security professionals.
Random observations about last week’s show.
Discussions focused on enterprise customer requirements rather than silver bullet solutions.
The industry should be talking about the security skills shortage, open security standards, and automation but these subjects will get minimal lip service.
Mostly the same as last year but with more innovation, startups, and excitement.
FIDO specification introduced this week with broad support and lots of potential.
Data security, security policies, and integration top the list of problems.
In order to accurately assess organizations’ mobile computing adoption, strategies, and security, ESG recently surveyed 242 members of IT and security personnel working at enterprise-class (1,000 employees or more) organizations in North America. All respondents were responsible for mobile computing initiatives, operations, and security.
Enterprise organizations proclaim that cybersecurity initiatives are one of their highest priorities. Should fuel the rhetoric at the RSA Conference.
ESG data indicates that many enterprise organizations are not only consuming commercial threat intelligence, but also using it to improve risk management. In fact, advanced organizations seem to include security intelligence as a best practice as they claim to get a lot of value from external security intelligence. While this is encouraging, the fact remains that not all security intelligence is created equally. New independent security intelligence services from providers like Norse are starting to emerge in the market. This type of intelligence can provide real-time, detailed intelligence focused on cybercriminal activities. Enterprise organizations can use this type of focused data to make timely risk management decisions, automate security operations, and improve incident detection/response.
Soon-to-be-published ESG research indicates lots of acute needs at enterprise for information security professionals at large and small organizations
Enterprise security professionals point to problems with integration, scale, and support for various mobile device types.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2014 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe