Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

How Will Your Cloud Strategy Impact Your Cyber Strategy?


Published on

Digital transformation initiatives are forcing organizations to rethink their cybersecurity strategies. BMC and Forbes Insights conducted a security survey among more than 300 C-level executives around the globe to examine today’s biggest cybersecurity threats and new security models being pursued to fill the gaps.

Published in: Technology
  • Be the first to comment

How Will Your Cloud Strategy Impact Your Cyber Strategy?

  1. 1. How Will Your Cloud Strategy Impact Your Cyber Strategy? Build a new security model to close today’s security gaps and effectively wage cyber warfare
  2. 2. Interviewed • Cameron Brown, Former Forensic Specialist, United Nations • Scott Crowder, CIO, BMC • Paul Lewis, CTO, Hitachi Data Systems • Betty Elliott, Head of InfoSec & CISO, Moneygram International • Michael Matthews, CIO, Deluxe Corp. • Sean Pike, Program Vice President, Security, IDC • Surveyed over 300 executives across North America and Europe • 66% CIO/CTO/CISO/CSO • 34% VP/SVP of Tech of InfoSec • All companies had at least $100M in revenue, and 50% had revenue >= $1B • Interviewed industry experts, analysts, and customers BMC partners with Forbes Insights 2nd Annual Security Operations
  3. 3. 69% Say Digital Transformation is Forcing Changes to Cybersecurity Strategies Responds to new digital competitors Solidifies and grow market share Serves shifting customer demands
  4. 4. 3 New Technologies Are Creating the Biggest Security Challenges Why? Clouds and mobile apps send data outside secure firewalls Big data apps centralize data, for easy access by thieves if they breach defenses Public clouds (65%) Big data (63%) Mobile apps (61%)
  5. 5. Exposure of intellectual property Damage to corporate reputation The Risks to Enterprises Without a Strong Cybersecurity Strategy are Indisputable Theft of corporate financial information Release of sensitive customer information
  6. 6. The Challenge: Act Now or Leave Corporate Assets Vulnerable to Hackers CIOs and CISOs must expand efforts to: Address sophisticated armies of global cyber-thieves, many of whom are backed by national governments Close the new security gaps that arise as their organizations embrace digital transformation
  7. 7. The Trade-Off: Boards Must Balance Investments for Security and Next-Gen Business Technology say security was a higher priority in 2016 82% say security investments will rise again in 2017 76% AND of CIOs 75% of CISOs But these executives also acknowledge that when lobbying for additional security funding, technology execs are competing with business peers, all of whom are trying to convince the board where it should allocate money.
  8. 8. The Answer: Follow 3 Steps to Create a Secure Enterprise Operations Strategy Backed by a Solid Execution Model Target security spending for the biggest impact Redouble efforts to secure mission-critical assets Address organizational and cultural issues
  9. 9. Step 1 for Waging Modern Cyber Warfare: Target Security Spending for the Biggest Impact 64% will increase investments in 2017 for protecting against known security threats plan to enhance incident response capabilities in the next year 68% Organizations mitigate damages from today’s biggest risks • 43% say investments in IT patch and automation had best ROI The Result:
  10. 10. Step 2 for Waging Modern Cyber Warfare: Redouble Efforts to Secure Mission-Critical Assets will devote more personnel and technology to ensure the enterprise is never breached will combine security and operations personnel into teams dedicated to specific mission-critical applications 47% 45% Organizations optimize security activities for their most valuable resources The Result:
  11. 11. Step 3 for Waging Modern Cyber Warfare: Address Organizational and Cultural Issues agree that line-of- business managers must take a greater role in developing security strategies say operations accountability for breaches will increase 72% 52% A culture of security permeates the organization to more effectively fight cybercrime The Result:
  12. 12. The Benefits of a Modern Cybersecurity Strategy Are Undeniable Safeguards enterprises at a time of change Targets investments for biggest benefits Stays current with latest exploits and cyber-thieves Increased market share, sales, and customer satisfaction
  13. 13. expanded vulnerability discovery and remediation to fend off hackers say security investments will rise in 2017 60% 82% say digital transformation is forcing changes to cybersecurity strategies will boost spending to protect against known threats plan to enhance incident response capabilities 69% 64% 68% Re-engineering Security Playbooks in the Age of Digital Transformation Key Takeaways
  14. 14. Additional Resources Learn more about today’s biggest cybersecurity threats and the new security model that can fill the gaps Read the full report, “Enterprises Re-engineer Security in the Age of Digital Transformation”