The document discusses top IT security trends from 2011-2012, including the Flame and Gauss malware attacks, issues with the Conficker worm, and hacks on US water systems and Google's Android market. It covers how bring your own device (BYOD) policies will impact security and the growing challenges around identity, privacy and hyper-connectivity. The document also discusses how security risks will need to be properly assessed and managed for public and private clouds, and the role of IPv6 and next generation border gateway protocol and DNS. It emphasizes that security budgets need to be spent wisely and the importance of security partners going forward.