Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Information Security as a Business Enabler?

605
views

Published on

The information security industry is alive with jargon, fear inducing stories and excitable vendors desperate to get hold of your budget. But how can you cut through the hype and get quality products …

The information security industry is alive with jargon, fear inducing stories and excitable vendors desperate to get hold of your budget. But how can you cut through the hype and get quality products and services that deliver business value and form part of a strategic solution, capable of supporting your ambitions? This session will paint a picture of the current information security threat landscape from an objective, dispassionate viewpoint and provide you with the key questions to ask vendors and suppliers. It will help you understand the realities of topics including mobile device risks, cybercrime, cyber warfare and the protection of your intellectual property. It should provide you with valuable thinking time and a chance to step back and take stock of what you are trying to achieve by securing your business.

Published in: Technology

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
605
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Information Security as a Business Enabler? Nigel Stanley Practice Leader - Security nigel.stanley@bloorresearch.com …optimise your IT investments
  • 2. Business Risk TodayConfidential © Bloor Research 2011 telling the right story
  • 3. 2011 Information security landscape… Cloud Mobile device security CyberXConfidential © Bloor Research 2011 telling the right story
  • 4. The cloud comes to the rescue! Provides computing resources across the internet Vendors provide hosting services for applications and data Seen by many to reduce IT costs as services are outsourced But…Confidential © Bloor Research 2011 telling the right story
  • 5. The cloud Cloud data is out there, accessible from anywhere in or out of your physical control You are responsible for the safety and security of your data, even if it is being hosted by a third party Where is the data being held? In your country? In the EU? Somewhere else?Confidential © Bloor Research 2011 telling the right story
  • 6. The cloud Is your data residing alongside your competitors? What are the data recovery/integrity provisions? Have these been suitably tested to your satisfaction? How will computer incidents be dealt with? For example e-discovery, criminal investigations How easy will it be for you to move your data to another provider? …Confidential © Bloor Research 2011 telling the right story
  • 7. 2011 Information security landscape… Cloud Mobile device security CyberXConfidential © Bloor Research 2011 telling the right story
  • 8. Confidential © Bloor Research 2011 telling the right story
  • 9. The latest target…Sources: http://www.guardian.co.uk/technology/blog/2011/mar/02/android-market-apps-malwarehttp://www.metro.co.uk/tech/857573-hacking-alert-on-google-phones-as-apps-deleted-without-user-knowledgehttp://www.intomobile.com/2009/02/26/if-you-can-hack-an-iphone-you-can-win-10000/http://www.theregister.co.uk/2011/03/11/iphone_blackberry_hacked/Confidential © Bloor Research 2011 telling the right story
  • 10. 2011 Information security landscape… Cloud Mobile device security CyberXConfidential © Bloor Research 2011 telling the right story
  • 11. Cyberwar? cyberterrorism? cybercrime?Confidential © Bloor Research 2011 telling the right story
  • 12. CyberX effects Source: http://timeslahore.com/2010/11/30/indian-cyber-terrorist-hacked-36-websites-of-pakistani-goverment/Confidential © Bloor Research 2011 telling the right story
  • 13. Future security issues Computer/cybercrime ++++ Advanced persistent threats+ Targeted attacks (IP especially)++ Sophisticated hacking+ Inside threat++ Lack of expertise++ Olympics++Confidential © Bloor Research 2011 telling the right story
  • 14. Ask the vendor… How can I use your product/solution as a business enabler?Confidential © Bloor Research 2011 telling the right story
  • 15. Mitigation Strategies Is your organisation a [potential] target? Think cybercrime, not cyberterrorism(?) Objective risk assessment Good policies, procedures and immediate action plans Converged approach is vital (physical + IT security) User education, user education, user education Less hyperbole, more practical adviceConfidential © Bloor Research 2011 telling the right story
  • 16. Thank You Nigel Stanley Practice Leader – Security 0207 043 9750 nigel.stanley@bloorresearch.comConfidential © Bloor Research 2011 telling the right story
  • 17. YOUR YEAR-ROUND IT RESOURCE – access to everything you’ll need to know
  • 18. THE WHOLETECHNOLOGY STACKfrom start to finish
  • 19. COMMENT & ANALYSISInsights, interviews and the latest thinking on technology solutions
  • 20. VIDEOYour source of live information – all the presentations from our live events
  • 21. TECHNOLOGY LIBRARY Over 3,000 whitepapers,case studies, product overviews and press releases from all the leading IT vendors
  • 22. EVENTS, WEBINARS & PRESENTATIONS Missed the event? Download the presentations thatinterest you. Catch up with convenient webinars. Plan your next visit.
  • 23. DirectoryA comprehensive A-Z listing providing in-depth company overviews
  • 24. ALL FREE TO ACCESS 24/7
  • 25. online.ipexpo.co.uk