As CISOs and security leaders gear up for next-generation security trends in 2014 and beyond, they've got a few...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
key threats on their minds. During SearchCIO's October tweet jam, participants discussed how they plan to deal with imminent security threats while in the throes of a mobile takeover, increasingly social tendencies among staff and the love of all things cloud.
This month's tweet jam expert, Elliot Franklin, information security manager at San Antonio, Texas-based Whataburger Restaurants LLC, lent us a hand in answering a number of top-of-mind cybersecurity questions. To kick things off, we asked:
— SearchCIO.com (@searchCIO) October 30, 2013
Most responses took a jab at the cybersecurity ignorance of both internal and end users. But before diving into specifics, here are some general threat concerns that reflect the larger security puzzle:
A1 EVERYONE in organization needs to be involved in cybersecurity- CIOs, CISOs, and every employee that handles data #CIOchat— SearchCompliance.com (@ITCompliance) October 30, 2013
A1: The Internet of Things, connected-ness of EVERYTHING, will be opening a whole new world of threats. Eek #CIOchat— Karen Goulart (@KarenGoulart) October 30, 2013
Mobile applications were the first of several potential stress points to pop up in the #CIOChat feed. Tweet jammers expressed concerns about both malicious and unsecured mobile apps:
@searchCIO malicious mobile apps. ....as well as poor physical security— Gloria Ikekpeazu (@gloriauche) October 30, 2013
A trend CIOs and security professionals constantly revisit is data loss -- and 2014 is no exception. Organizations storing massive amounts of data to mine and use for business growth struggle to retain and protect that data, especially when that data becomes mobile:
Apps and data retention aside, our tweet jam participants highlighted users' desire to stay connected as a major red flag. As employees become more social, security eyes must turn towards social engineering and social collaboration technologies:
A1 threats include next generation of users always connected & expecting social collaboration #ciochat— LabNuke (@Labnuke) October 30, 2013
The most eyebrow-raising next-generation security threat for 2014 and beyond, according to our tweet jammers? Cloud usage. Several conversations spun from off cloud-related tweets -- take a gander:
When IT doesn't meet the demands of the business, the business looks to the cloud which makes data protection difficult. #CIOChat— Elliott Franklin (@elliottfranklin) October 30, 2013
According to #CIOChat participants, cloud opens up new vectors that are both high impact and high risk. But not all agreed that these threats are novel. In fact, some tweet jammers argue that the cloud isn't necessarily bringing new threats to the forefront, but is simply stirring up threats that previously existed:
What do you think? Where should cybersecurity professionals focus their efforts in 2014 and beyond? Sound off in the comment section below and stay tuned for more October #CIOChat recaps featuring guest expert Elliott Franklin.