Information Security as a   Business Enabler?            Nigel Stanley     Practice Leader - Security    nigel.stanley@blo...
Business Risk TodayConfidential © Bloor Research 2011                    telling the right story
2011 Information security                                            landscape…                        Cloud              ...
The cloud comes to the rescue!                        Provides computing resources across                        the inter...
The cloud                        Cloud data is out there, accessible from                        anywhere in or out of you...
The cloud                        Is your data residing alongside your                        competitors?                 ...
2011 Information security                                            landscape…                        Cloud              ...
Confidential © Bloor Research 2011   telling the right story
The latest target…Sources: http://www.guardian.co.uk/technology/blog/2011/mar/02/android-market-apps-malwarehttp://www.met...
2011 Information security                                            landscape…                        Cloud              ...
Cyberwar? cyberterrorism?                                           cybercrime?Confidential © Bloor Research 2011         ...
CyberX effects                                     Source: http://timeslahore.com/2010/11/30/indian-cyber-terrorist-hacked...
Future security issues                        Computer/cybercrime ++++                        Advanced persistent threats+...
Ask the vendor…                   How can I use your product/solution as a                              business enabler?C...
Mitigation Strategies                        Is your organisation a [potential] target?                        Think cyber...
Thank You                                            Nigel Stanley                                     Practice Leader – S...
YOUR YEAR-ROUND  IT RESOURCE – access to everything  you’ll need to know
THE WHOLETECHNOLOGY   STACKfrom start to finish
COMMENT &  ANALYSISInsights, interviews and the latest thinking on technology solutions
VIDEOYour source of live information – all the presentations from         our live events
TECHNOLOGY     LIBRARY   Over 3,000 whitepapers,case studies, product overviews and press releases from all the       lead...
EVENTS, WEBINARS &    PRESENTATIONS           Missed the event?   Download the presentations thatinterest you. Catch up wi...
DirectoryA comprehensive A-Z listing     providing in-depth    company overviews
ALL FREE TO ACCESS    24/7
online.ipexpo.co.uk
Information Security as a Business Enabler?
Information Security as a Business Enabler?
Information Security as a Business Enabler?
Information Security as a Business Enabler?
Information Security as a Business Enabler?
Information Security as a Business Enabler?
Information Security as a Business Enabler?
Information Security as a Business Enabler?
Upcoming SlideShare
Loading in …5
×

Information Security as a Business Enabler?

878 views

Published on

The information security industry is alive with jargon, fear inducing stories and excitable vendors desperate to get hold of your budget. But how can you cut through the hype and get quality products and services that deliver business value and form part of a strategic solution, capable of supporting your ambitions? This session will paint a picture of the current information security threat landscape from an objective, dispassionate viewpoint and provide you with the key questions to ask vendors and suppliers. It will help you understand the realities of topics including mobile device risks, cybercrime, cyber warfare and the protection of your intellectual property. It should provide you with valuable thinking time and a chance to step back and take stock of what you are trying to achieve by securing your business.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
878
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Information Security as a Business Enabler?

  1. 1. Information Security as a Business Enabler? Nigel Stanley Practice Leader - Security nigel.stanley@bloorresearch.com …optimise your IT investments
  2. 2. Business Risk TodayConfidential © Bloor Research 2011 telling the right story
  3. 3. 2011 Information security landscape… Cloud Mobile device security CyberXConfidential © Bloor Research 2011 telling the right story
  4. 4. The cloud comes to the rescue! Provides computing resources across the internet Vendors provide hosting services for applications and data Seen by many to reduce IT costs as services are outsourced But…Confidential © Bloor Research 2011 telling the right story
  5. 5. The cloud Cloud data is out there, accessible from anywhere in or out of your physical control You are responsible for the safety and security of your data, even if it is being hosted by a third party Where is the data being held? In your country? In the EU? Somewhere else?Confidential © Bloor Research 2011 telling the right story
  6. 6. The cloud Is your data residing alongside your competitors? What are the data recovery/integrity provisions? Have these been suitably tested to your satisfaction? How will computer incidents be dealt with? For example e-discovery, criminal investigations How easy will it be for you to move your data to another provider? …Confidential © Bloor Research 2011 telling the right story
  7. 7. 2011 Information security landscape… Cloud Mobile device security CyberXConfidential © Bloor Research 2011 telling the right story
  8. 8. Confidential © Bloor Research 2011 telling the right story
  9. 9. The latest target…Sources: http://www.guardian.co.uk/technology/blog/2011/mar/02/android-market-apps-malwarehttp://www.metro.co.uk/tech/857573-hacking-alert-on-google-phones-as-apps-deleted-without-user-knowledgehttp://www.intomobile.com/2009/02/26/if-you-can-hack-an-iphone-you-can-win-10000/http://www.theregister.co.uk/2011/03/11/iphone_blackberry_hacked/Confidential © Bloor Research 2011 telling the right story
  10. 10. 2011 Information security landscape… Cloud Mobile device security CyberXConfidential © Bloor Research 2011 telling the right story
  11. 11. Cyberwar? cyberterrorism? cybercrime?Confidential © Bloor Research 2011 telling the right story
  12. 12. CyberX effects Source: http://timeslahore.com/2010/11/30/indian-cyber-terrorist-hacked-36-websites-of-pakistani-goverment/Confidential © Bloor Research 2011 telling the right story
  13. 13. Future security issues Computer/cybercrime ++++ Advanced persistent threats+ Targeted attacks (IP especially)++ Sophisticated hacking+ Inside threat++ Lack of expertise++ Olympics++Confidential © Bloor Research 2011 telling the right story
  14. 14. Ask the vendor… How can I use your product/solution as a business enabler?Confidential © Bloor Research 2011 telling the right story
  15. 15. Mitigation Strategies Is your organisation a [potential] target? Think cybercrime, not cyberterrorism(?) Objective risk assessment Good policies, procedures and immediate action plans Converged approach is vital (physical + IT security) User education, user education, user education Less hyperbole, more practical adviceConfidential © Bloor Research 2011 telling the right story
  16. 16. Thank You Nigel Stanley Practice Leader – Security 0207 043 9750 nigel.stanley@bloorresearch.comConfidential © Bloor Research 2011 telling the right story
  17. 17. YOUR YEAR-ROUND IT RESOURCE – access to everything you’ll need to know
  18. 18. THE WHOLETECHNOLOGY STACKfrom start to finish
  19. 19. COMMENT & ANALYSISInsights, interviews and the latest thinking on technology solutions
  20. 20. VIDEOYour source of live information – all the presentations from our live events
  21. 21. TECHNOLOGY LIBRARY Over 3,000 whitepapers,case studies, product overviews and press releases from all the leading IT vendors
  22. 22. EVENTS, WEBINARS & PRESENTATIONS Missed the event? Download the presentations thatinterest you. Catch up with convenient webinars. Plan your next visit.
  23. 23. DirectoryA comprehensive A-Z listing providing in-depth company overviews
  24. 24. ALL FREE TO ACCESS 24/7
  25. 25. online.ipexpo.co.uk

×