Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.
In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.
So far, I’ve written two blogs about my expectations for the upcoming RSA Security Conference next week. The first blog was about my outlook for endpoint security while the second focused on network security.
Earlier this week, I posted a blog about my expectations for endpoint security at the upcoming RSA Conference. Similarly, here’s what I anticipate hearing about network security:
“IoT introduces an avalanche of new devices, network traffic, and protocols to the mix,” writes Jon Oltsik, senior principal analyst at The Enterprise Strategy Group. “The security team will need the right skills and tools to identify IoT devices, secure IoT data and traffic, and recognize the difference between legitimate and suspicious communications.”