I.T. Security: A 2013 HorizonWatching Trend Report

on

  • 2,779 views

The slides provide an overview on the I.T. Security trend for HorizonWatching Community members. Summary information about the I.T. Security trend is provided along with many links to additional ...

The slides provide an overview on the I.T. Security trend for HorizonWatching Community members. Summary information about the I.T. Security trend is provided along with many links to additional resources. The slides are meant to be read/studied and the links are there for you to continue your learning. You may want to view the slides in slideshow mode so you can easily follow the links.

Other HorizonWatching Trend Reports are available here on Slideshare. Follow my blog at www.billchamberlin.com for more information on emerging trends and technologies.

Note: This presentation represents my thoughts and ideas….not those of my employer. - Bill Chamberlin,

My LinkedIn Profile: : www.linkedin.com/in/whchamb

My Website: http://www.billchamberlin.com

Statistics

Views

Total Views
2,779
Views on SlideShare
2,008
Embed Views
771

Actions

Likes
2
Downloads
189
Comments
0

4 Embeds 771

http://www.billchamberlin.com 764
http://www.linkedin.com 5
http://cloud.feedly.com 1
http://webcache.googleusercontent.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

I.T. Security:  A 2013 HorizonWatching Trend Report I.T. Security: A 2013 HorizonWatching Trend Report Presentation Transcript

  • Contact: Bill Chamberlin, HorizonWatching Community LeaderJanuary 17, 2013I.T. SecurityA 2013 HorizonWatching Trend Report
  • HorizonWatching CommunityAbout This Trend Report  Purpose: The slides provide an overview on the Analytics trend for HorizonWatching Community members  Content: Summary information about the Analytics trend is provided along with many links to additional resources. The slides are meant to be read/studied and the links are there for you to continue your learning. You may want to view the slides in slideshow mode so you can easily follow the links  Other HorizonWatching Trend Reports: Are announced/discussed on the HorizonWatching blog and slide decks are posted on the Horizonwatching channel on Slideshare  HorizonWatching Community: For more on the HorizonWatching community please see the appendix Note: This presentation represents my thoughts and ideas….not those of my employer. - Bill Chamberlin, whchamb@gmail.com2 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySince Cybersecurity is so important to the Government of the UnitedStates, should it not be one of the most important trends forenterprises? President Obama (U.S.A.) speaking on CyberSecurity “President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter.” – whitehouse.gov (link) “The average company’s computer infrastructure is attacked nearly 60,000 times every day.” – IBM (link)3 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunityThe forces of consumerization, social, mobile and cloud are allcontributing an increased risk of security and data breaches “Todays security landscape has grown substantially more complex. The evolution of a highly networked, data-intensive computing model has introduced significant Infographic Sourced from IBM (link) security risks to IT infrastructures. And, the increasing prevalence of social, mobile, virtualization “We have moved from the office, to the corporate and cloud technologies network perimeter, to linked businesses, to a world of present a profound security interconnected devices and services. A lapse in challenge.” – IBM (link) policy or technology at any point in the system can and will shake the whole foundation.” – IBM (link)4 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunityTrends in IT Security for 2013 1. Complexity Increases: IT Security continues to become very complex, thanks to mobile, social, big data, and cloud trends. 2. Mobile is a Target: Hackers and criminals increasingly target Mobile Platforms, Mobile Wallets, and App Stores, causing CIOs ro allocate more resources towards securing Mobile Device Management and BYOD policies. 3. Malware Sophistication: Criminals target enterprise infrastructures with sophisticated malware at all potential endpoints. 4. Cyber Wars: Government and Terrorist-sponsored attacks increase on all institutions. 5. Targeted Attacts: Expect more targeted and coordinated attacks that are successful in disrupting service and fraudulently obtaining significant amounts of intellectual property. 6. Cloudy Forecast #1: Expect a few very large and public attacks on clouds. 7. Cloudy Forecast #2: CIOs look to Cloud-based Security Services for help. 8. Security Automation: Enterprises will invest in better security management facilities, the use of analytics and intelligence to identify trends and usage patterns, and the ability to monitor, report, and act on security intelligence. 9. Security Leadership: More enterprises will institute the Chief Information Security Officer role.5 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySocial, Mobile, Analytics, Cloud and Virtualization will all put morestress on Security Proffesionals in for 2013 Key Trends Impacting Security • Increased # of Virtualized Devices Predictions 2013: • Cloud The Evolving • Mobile Enterprise Security Ecosystem – IDC • Consumerization via BYOD & Apps • Big Data • Advanced Analytics • Lack of Integration of Security Products, Services and Solutions • More sophisticated hackers and criminals Security Predictions for 2013 by Marc van Zadelhoff, VP IBM Security Systems, The Biggest Cybersecurity Threats of 2013 - Forbes6 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySecurity – Overview of TrendToday, our worlds infrastructure is both more sophisticated and more interconnected than ever before - linking vastamounts of information and services in new ways, but also introducing more security complexities and challenges inroughly equal proportion. For this reason, it is no longer enough for organizations, or even entire governments, to try toaddress security strictly within their own enterprises.Drivers “Gartner expects demand for• Cloud applications result in greater separation of data user and data owner. security products and services to• Consumerization of Industries• Mobile - Employees want access anytime, anywhere be driven by the persistent threat• Virtualization landscape and influenced by the• Increased threats, including malware, cybercrime, Phishing, SPAM, bots increasingly targeted and• Business continuity and disaster recovery evolving attack patterns that are• Compliance. Fraud control breach notification & data privacy regulations growing in sophistication.” –• Trusted Identity - trusted, privacy-enabling, shared and easy-to-use identities Gartner (link)• A high profile security breach can cause major damage to a customer’s brandInhibitors/Challenges• Security is a major barrier to cloud adoption• ROI is still not a true value of measurement of security investment• Pureplay security vendors continue to be challenged by the most dominant software providers and by nimble andinnovative new entrants• Employees use of personal devices or consumer grade applications.Implications• Increased role for Managed Security Service Providers• Businesses need to manage risk end-to-end across all areas of the organization and every external system theyconnect to• Compliance will require continued investment• IT depts, must understand implications of key trends such as cloud, mobility, and social business• Biometrics continues to be an emerging technology that can be embedded into solutions to enhance informationsecurity7 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunityThe Security trend is a long term trend that just continues to grow inimportance and size. Top Security Trends and Takeaways for 2013 – “Worldwide spending on security is expected Gartner Webinar (registration required) to rise to $60 billion in 2012, up 8.4 percent from $55 billion in 2011. Gartner expects this trajectory to continue, reaching $86 billion in 2016. ” – Gartner (link) “Security in the Data Center finally gets serious growing 9.3% CAGR from $10.7B in 2011 to $16.7B in 2016. High growth in Web (Web Application Firewalls) at 14.7% CAGR” – IDC (link) “IT outsourcing (managed security services), secure Web gateway (appliance), and security information and event management (SIEM) are the fastest-growing security segments. ” – Gartner (link) “As organizations have rushed to embrace next-generation architectures, security has often been an afterthought. Both users and vendors are beginning to address this issue, and IDC expects to see strong growth in this segment moving forward” – IDC (link)8 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunityEach year, security professionals are faced with new challenges aseach new emerging technology opens up new risks. Top tips for securing “We are seeing more than ever how interconnected big data environments - IBM systems, poor policy enforcement, and human error is far more influential than any single security vulnerability.” – IBM (link) “The rapid adoption of the newest mobile devices -- especially the Apple iPhone and iPad and the Google Android-based equivalents -- will be a huge disruptive force in enterprise security next year. ” – CIO.com (link) “The environment is changing: the boundaries of business infrastructure are being extended – and sometimes obliterated – by the emergence of cloud, mobility, social business, big data and more, while the attacks are getting more and more sophisticated.” – IBM (link) 9 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySecurity – Selected Additional Information and Resources • ABI Research: Security “The global mobile security market is poised for explosive • Forrester: growth over the next five years, • Security Research as revenues reach $10.7 billion in • Security Blog Posts 2017.” – ABI Research (link) • Frost & Sullivan: Network Security • Gartner: • Security and Risk Management “As billions of devices connect via • Security Blog posts the Internet, exchanging • Webinar: Top Security Trends and Take- information and taking autonomous Aways for 2013 actions based on continuous • Security and Privacy input, we will face a paradigm • Identity and Access Management change that will transform our personal lives and revolutionize • IDC: business. These radical • Security and Business Continuity, transformations will pose • Security Research unprecedented data privacy and • Search for Security security challenges to security and risk (S&R) professionals..” – Forrester (link)10 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySecurity – Selected Media Websites and Other Resources • Businessweek: Search for Cyber-Security, Cyber- Security • CIO.com: Security 32 Articles Discussing IT Security • ComputerWorld: Security Trends for 2013 - HorizonWatching • eWeek: Security • Forbes: CyberSecurity and Information Security • InformationWeek: Security • Infotech: Security • InfoWorld: Security and Security-related Blog posts • Network Computing: Data Protection Channel • Network World: Security Research Center • NY Times: CyberSecurity • VentureBeat: Security • Whitehouse.gov: CyberSecurity 11 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySecurity – Selected IT Vendor & Consultant Websites & Resources • Accenture: Security Services Finding a Strategic Voice - IBM • Amazon Web Services: AWS Security and Compliance Center • Booz Allen: Cyber Security Solutions • Cisco: Security • Deloitte: Security & Privacy • EMC: Security • HP: Security Offerings • IBM: IBM Content on Websites, Social Media, White • Infosys: Security Offerings • Microsoft: Safety & Security Center • Oracle: Security Solutions • Q1 Labs: Resource Center • SAP: Application Performance & Security • Tata Consultancy Services: Managed Security Services and Cybersecurity • VMware: Security and Compliance • Wipro: Enterprise Information Security 12 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching Community Security – Selected Social Media Sites and Searches• Google Blog Search: CyberSecurity and Information Security Shake-Up –“Information Security” and “IT Security” via Slideshare• Technorati Blog Search: Blog posts taggedSecurity• Google+ Communities Search: Security• LinkedIn Group Search: Security• Pinterest Search: Information Security andCybersecurity• Slideshare: IT Security and InformationSecurity and Cybersecurity• Twitter hashtag searches: #security and#cybersecurity• Tumblr Search: Cybersecurity• YouTube: Security Playlists and SecurityChannels• Wikipedia: Information Security andcyberSecurity13 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySecurity – Other Selected Reports and Presentation Decks• Evolving Security Threats and Countermeasures, A presentation by Stewart Cawthray, Chief Security Architect atIBM, Published December 2012, 20 slides• Security Predictions for 2013, Marc van Zadelhoff, VP Strategy and Product Management, IBM Security Systems• Information Security in Transition: Top things to consider in 2013, A Webcast featuring Jon Oltsik of ESG and MichaelApplebaum of Q1 Labs, an IBM Company• IBM Addresses Security Challenges of Big Data, Mobile and Cloud Computing, An IBM Press Release, October 2012• Fighting to Close the Gap, Ernst & Young’s 2012 Global Information Security Survey, Published October 2012, 54 pages• Top tips for securing big data environments: Why big data doesn’t have to mean big security challenges, An IBM Softwarereport, October 2012, 13 pages• A Compendium of Perspectives, A report from Deloitte’s Center for Security & Privacy Solutions, Published October 2012, 64pages• Information Security: Better Implementation of Controls for Mobile Devices Should Be Encouraged, a U.S. GAO Report toCongressional Committees, published September 2012, 54 pages• IBM X-Force 2012 Mid-Year Trend & Risk Report, An IBM Security Systems in-depth analysis of the latest internet securitythreats, September 2012, 108 pages• Changing the game. Key Findings from The Global State of Information Security Survey 2013, A report by PWC, publishedSeptember 2012, 32 pages• Securing the Mobile Enterprise with IBM Security Solutions, An IBM Software Solution Brief, July 2012, 8 Pages• Safeguarding the cloud with IBM Security solutions: Maintain visibility and control with proven security solutions forpublic, private and hybrid clouds, An IBM Software Solution Brief, July 2012, 8 pages• Finding a strategic voice: Insights from the 2012 IBM Chief Information Security Officer Assessment, An IBM Center for AppliedInsights report, by David Jarvis, Marc van Zadelhoff, and Jack Danahy, 12 pages, May 2012• The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Report by DimensionalResearch, Published January 2012, 7 pages14 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunitySecurity – IBM Resources and Linksibm.com links•Smarter Planet: Security and Resillience•Smarter Computing: Security•Services: IT Security Services , Secure Engineering•Software: IBM Security•Cloud Computing: Cloud Security•developerWorks: SecurityIBM Social Media Platforms•Twitter: @ibmsecurity, @InstituteAdvSec, @IBMPrivacy•Twitter Hashtag: #ibmsecurity•Facebook: IBM Security Systems IBM X-Force 2012 Mid-Year•Blogs: IBM Institute for Advanced Security, and IBM Trend and Risk ReportApplication Security Insider , and FrequencyX, and IBMPrivacy•YouTube: IBM Security•LinkedIn Group: IBM Security•Slideshare: IBM decks tagged Security and Resilience•Community: IBM Security Community and IBM Institute forAdvanced Security See more at: I.T. Security: IBM Content on Websites, Social Media, White Papers and Reports15 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License
  • HorizonWatching CommunityAppendix: About The HorizonWatching Community  Launched 2006: About HorizonWatching  Blog: Horizonwatching – Thought Leadership Blog  Tumblr Quote Blog = HorizonWatching  Twitter = HorizonWatching  Slideshare = HorizonWatching (an external version of this deck will be posted here)  Facebook = HorizonWatching  LinkedIn Community = HorizonWatching16 January 17, 2013 I.T. Security: A 2013 HorizonWatching Trend Report © 2013 HorizonWatching Creative Commons Attribution License