2014 Identity, Security and Cloud Predictions
 

2014 Identity, Security and Cloud Predictions

on

  • 679 views

With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior ...

With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior years like cloud, mobility, social and big data have been key challenges recently that are reflected in this year’s predictions.

The large amount of information compromised last year have destined privacy and IT security to be topics of interest in 2014, including the consumerization of IT and how organizations will respond.

Privacy, will become a major concern in the mainstream this year, and consumers will respond proactively. Consumers will increasingly adopt authentication alternatives, acknowledging that standalone passwords are insecure. Data security, resilience, availability and recovery are the next step in the consumerization of IT, as individuals strive to backup their critical data.

Another topic of interest in 2014 is how organizations will respond to the heightened security risks. Trust in public cloud providers decreased significantly with the revelation of the NSA spying allegations in 2013. This year, organizations will shift their focus to on-premise cloud solutions that inherently offer more control over critical and sensitive data.

It is also predicted that organizations will steadily focus on the role of privileged users and utilize Managed Security Services for increased security management internally.

While BYOD was also a big trend in 2013, Bring-Your-Own-Identity (BYOI) will come into play in 2014, but it does not come without risks. CIOs need to be prepared to monitor this trend, deciding if BYOI would reduce or increase their overhead, workload and liability/risk profile.

Read the full set of identity, security and cloud predictions from NetIQ's thought leaders in this deck.

Statistics

Views

Total Views
679
Views on SlideShare
669
Embed Views
10

Actions

Likes
0
Downloads
14
Comments
0

2 Embeds 10

http://www.linkedin.com 9
https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

2014 Identity, Security and Cloud Predictions 2014 Identity, Security and Cloud Predictions Presentation Transcript

  • 2014 Identity, Security and Cloud Predictions
  • Internet of Things (IoT) will be 2014’s big data There will be an increased number of potential security threat vectors as a result of more things being plugged in… Continue reading: http://bit.ly/CSOAusPredict 2 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • There will be an increased focus on privileged users Those with privileged access can potentially do a lot of damage. This is not a new concept nor concern, but the Snowden incident puts privileged users back in the spotlight in 2014. Continue reading: http://bit.ly/CSOAusPredict 3 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. View slide
  • Incorporation of Managed Security Services (MSS) We should expect to see an effort to utilize MSS for some aspects of security management, while in-house teams will focus on adding value, providing guidance and ensuring better alignment with the business user, who ultimately foots the bill. Continue reading: http://bit.ly/InfoSecPredict 4 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. View slide
  • Privacy will become a major concern in the mainstream Data monitored by the governments, the number of data breaches in 2013 and factor in the inability to control how information flows after we disclose it to an initial party and we have quite a number of privacy issues to deal with. Plus new or amended privacy legislation comes into effect in some countries in 2014 raising the profile of privacy further. Continue reading: http://bit.ly/CSOAusPredict 5 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • Device Malware will focus on what the device accesses Once installed, malware on devices will continue to focus on the things the device has access to, like online accounts and data, rather than anything on the device itself. Continue reading: http://bit.ly/InfoSecPredicts 6 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • Security departments will shift focus from incident identification to incident reaction and management Ultimately, it is pointless identifying a threat when there is no path forward to manage the incident, deploy the appropriate responses and counter the threat through remediation. Continue reading: http://bit.ly/CSOAusPredict 7 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • We are at the dawn of an encryption renaissance Organizations will re-examine where their critical data resides and encrypt as much of it as they can. They must also use stronger forms of encryption to reduce the chances of their data being decrypted. Continue reading: http://bit.ly/CSOAusPredict 8 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • The number of authentication alternatives will increase We accept passwords as a necessary evil, but they are insecure. Consumers want to be identified using more secure, usable means. Continue reading: http://bit.ly/CSOAusPredict 9 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • Data security, resilience, availability and recovery; the next step in the consumerization of IT As consumers we do not ensure we have multiple backup sources and can recover from failure or loss of data; or that data is secure and cannot be stolen. This will change. We will begin to take more care of personal data. Continue reading: http://bit.ly/CSOAusPredict 10 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 2013’s Data breaches will tip the scales in favor of spear phishing The volume of data breach in 2013 means criminals know more about us than they ever have. This knowledge will be used in spear phishing. Continue reading: http://bit.ly/CSOAusPredict 11 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • CIOs need to be prepared for BYOI The CIO will need to decide if BYOI would reduce or increase their overhead, workload and liability/risk profile Continue reading: http://bit.ly/BizEdgePredict 12 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • MSPs will expand into Identity-asa-Service market Identity became a core part of IT and business in 2013 promoting MSPs to respond to the demand. Continue reading: http://bit.ly/CSOAusPredict 13 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • Organisations will get serious about their own on-premise private cloud Trust in public cloud providers has decreased. To enjoy the cost and productivity benefits a cloud infrastructure brings while maintaining full control over critical and sensitive data, organizations will deploy a private cloud. Continue reading: http://bit.ly/CSOAusPredict 14 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • Learn more about NetIQ at: NetIQ.com 15 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.