Security - A 2012 HorizonWatching Trend Report

  • 6,912 views
Uploaded on

This deck provides an introduction and overview to the I.T. Security trend along with pages of links to other resources to help you understand this important trend.

This deck provides an introduction and overview to the I.T. Security trend along with pages of links to other resources to help you understand this important trend.

More in: Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
6,912
On Slideshare
0
From Embeds
0
Number of Embeds
7

Actions

Shares
Downloads
92
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Contact: Bill Chamberlin, HorizonWatching Community Leader January 17, 2012 Information Technology Security A HorizonWatching Trend ReportNote: This presentation represents my thoughts and ideas….not those of my employer. - Bill Chamberlin, HorizonWatching Community Leader - whchamb@gmail.com
  • 2. HorizonWatching CommunityAbout This Trend Report  Purpose: The slides provide an overview on Security trend for HorizonWatching Community members  Content: Summary information about the Security trend is provided along with many links to additional resources. The slides are meant to be read/studied and the links are there for you to continue your learning. You may want to view the slides in slideshow mode so you can easily follow the links  Other HorizonWatching Trend Reports: Are announced/discussed on the HorizonWatching blog and slide decks are posted on the Horizonwatching channel on Slideshare  HorizonWatching Community: For more on the HorizonWatching community please see the appendix Note: This presentation represents my thoughts and ideas….not those of my employer. - Bill Chamberlin, whchamb@gmail.com2 January 17, 2012 Security: A HorizonWatching Trend Report © 2012 HorizonWatching Creative Commons Attribution License
  • 3. HorizonWatching CommunitySecurity – Overview of TrendToday, our worlds infrastructure is both more sophisticated and more interconnected than ever before - linking vastamounts of information and services in new ways, but also introducing more security complexities and challenges inroughly equal proportion. For this reason, it is no longer enough for organizations, or even entire governments, to try toaddress security strictly within their own enterprises.Drivers• Applications are migrating toward the cloud resulting in greater separation of data user and data owner.• Consumerization – employees want to use their own devices• Growth in Mobile - devices are changing the way employees access data centers and networks• Virtualization - Increasing need to secure virtualized environments• Increased threats, including malware, cybercrime, Phishing, SPAM, bots• Business continuity and disaster recovery – Need to protect data• Compliance. Fraud control breach notification & data privacy regulations• Trusted Identity - trusted, privacy-enabling, shared and easy-to-use identities• A high profile security breach can cause major damage to a customer’s brand (ex: Sony)Inhibitors/Challenges• Security is a major barrier to cloud adoption• ROI is still not a true value of measurement of security investment• Pureplay security vendors continue to be challenged by the most dominant software providers and by nimble andinnovative new entrants• Employees use of personal devices or consumer grade applications.Implications• Increased role for Managed Security Service Providers• Businesses need to manage risk end-to-end across all areas of the organization and every external system theyconnect to• Compliance will require continued investment• IT depts, must understand implications of key trends such as cloud, mobility, and social business• Biometrics continues to be an emerging technology that can be embedded into solutions to enhance informationsecurity3 January 17, 2012 Security: A HorizonWatching Trend Report © 2012 HorizonWatching Creative Commons Attribution License
  • 4. HorizonWatching CommunitySecurity is a long term trend that just continues to grow in importanceand size. Worldwide Security Service Spending by Subsegment (Millions of U.S. Dollars) Growth “Worldwide security services spending is on pace to reach $35.1 billion in 2011, up from $31.1 billion in 2010, according to Gartner, Inc. The market is forecast to total $38.3 billion in 2012, and surpass $49.1 billion in 2015” – Gartner (link) (Link) “The growth of the security software market is fuelled by the increasingly sophisticated threats and management overheads each organization and user face. The overwhelming personal and confidential information interact and collaborate each other through web applications also exacerbates security threats in terms of information leakage” – IDC (link) Importance of “President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter.” – whitehouse.gov (link) 4 January 17, 2012 Security: A HorizonWatching Trend Report © 2012 HorizonWatching Creative Commons Attribution License
  • 5. HorizonWatching CommunityEach year, security professionals are faced with new challenges aseach new emerging technology opens up new risks.Trend Drivers IDC Video “Gartner has identified volatility, multiplicity, versatility, and mobility as the key macro trends driving IT and IT security in 2012. Other security market drivers are the effects of volatility on security, a more dangerous threat landscape, complex and evolving regulatory standards of protection, consumerization and mobility, and the ongoing transformative effects of cloud computing.” – Gartner (link) http://www.youtube.com/watch?v=Hg3taa98YREChallenges “The environment is changing: the boundaries of business infrastructure are being extended – and sometimes obliterated – by the emergence of cloud, mobility, social business, big data and more, while the attacks are getting more and more sophisticated, often showing evidence of extensive pre-operation intelligence collection and careful, patient, long term planning. ” – IBM (link) “The average company’s computer infrastructure is attacked nearly 60,000 times every day.” – IBM (link) “The rapid adoption of the newest mobile devices -- especially the Apple iPhone and iPad and the Google Android-based equivalents -- will be a huge disruptive force in enterprise security next year. ” – CIO.com (link) 5 January 17, 2012 Security: A HorizonWatching Trend Report © 2012 HorizonWatching Creative Commons Attribution License
  • 6. HorizonWatching CommunitySecurity – Additional Information and Resources • ABI Research - Security & Identification • CIO.com: Security “The bad guys are simply • Gartner: Security Trends and Security and Privacy moving on to new attack • IDC: Security Research surfaces, and one of those new • IBM: Security and Security Services battlefields is smartphones.” – • IBM xForce and X-Force Report IBM (link) • Information Week: Security • Infotech: Security and Identity and Access Management “Overall, we believe this market • NetworkWorld: Security Research Center will go through a strong • Twitter: #security consolidation where large • Whitehouse.gov: CyberSecurity security, software, and services • Wikipedia: Information Security companies acquire medium- sized firms.” – IDC (link)6 January 17, 2012 Security: A HorizonWatching Trend Report © 2012 HorizonWatching Creative Commons Attribution License
  • 7. HorizonWatching CommunitySecurity – IBMer Resources and Links White Paper: Securing virtualization in real-world environmentsibm.com links• IBM Security portal• IBM Security Services• IBM xForceIBM Social Media Platforms• Twitter: @ibmsecurity and @IBMPrivacy• LinkedIn Group: IBM Security• Blog: FrequencyX and IBM Privacy• YouTube: IBM Security• Community: IBM Security Community and IBMInstitute for Advanced Security7 January 17, 2012 Security: A HorizonWatching Trend Report © 2012 HorizonWatching Creative Commons Attribution License
  • 8. HorizonWatching CommunityAppendix: About The HorizonWatching Community  Launched in 2006  An overview of HorizonWatching is located here: About HorizonWatching  Blogs – Typepad = Horizonwatching – Thought Leadership Blog – Tumblr = HorizonWatching – Quote Blog  Twitter = HorizonWatching  Slideshare = HorizonWatching (an external version of this deck will be posted here)  Facebook = HorizonWatching  LinkedIn Community = HorizonWatching8 January 17, 2012 Security: A HorizonWatching Trend Report © 2012 HorizonWatching Creative Commons Attribution License