alphaspirit - Fotolia

News Stay informed about the latest enterprise technology news and product updates.

Desperately seeking security

Your enterprise is probably no further than six degrees of separation from a damaging data breach. In CIO Decisions ezine, find out how those seeking security can turn hindsight into actionable intelligence.

This article can also be found in the Premium Editorial Download: CIO Decisions: The new security paradigm:

It's a well-established fact (all right, urban legend) that nobody in Hollywood is more than six degrees of separation from Kevin Bacon -- and, on a similar note, I bet you'd be hard pressed to find an enterprise in 2014 that was more than six degrees of separation from a data breach big or small.

That Hollywood reference isn't a gratuitous excuse to reference a famous name in this column -- it's a lead-in to the most recent high-profile hack (at least as of this writing). If the Sony Pictures breach showed us anything, it's that even the tomfoolery of Seth Rogan and James Franco can be an enterprise vulnerability in today's cybersecurity landscape (and I say that as a fan of the oeuvre). Hindsight is 20/20 when it comes to these attacks, but the lessons CIOs seeking security can derive and implement from them are invaluable.

In the cover story of this issue of CIO Decisions ezine, writer Dina Gerdeman interviews CIOs and industry analysts who are determined to stay out of the security breach line of fire. They're lining up new tools, better monitoring user behavior and revamping their approach to training employees about their security responsibilities.

"When it comes to security and data integrity, there's a much more heightened sense of concern today, not just because of the number of breaches, but because of the sophistication we're seeing with some of these attacks lately," said Don Baker, CIO at Mediaocean, a New York-based advertising services company. Find out how Baker, and others, are turning security hindsight into foresight.

Also this issue, we also roll out nine recommendations for CIOs looking to thrive in 2015; provide financial leaders' takes on the key performance indicators that matter; and discuss why some enterprises are turning to systems diagramming.

CIOs seeking security are in a position to look forward, creating the strategies and lining up the tools that will prevent their organization from being the next hack victim. I hope you'll take heed of the recommendations in this e-zine -- after all, who wants to play the victim in a horror movie when you could play a hero instead?

Please write to me at rlebeaux@techtarget.com.

This was last published in February 2015

Dig Deeper on Enterprise information security management

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

As out tools for protections grow, so do the tools to hack. I also comes down to the profitability of these breaches. It's no longer a mischievous kid trying to break into a computer to play a game. IT is about someone looking to clean out bank accounts or sell info to the highest bidder. The economy is tough and a people see this as a way to survive.
Cancel

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close