Despite substantial efforts to contain cybersecurity threats, they continue to grow and are expected to get worse before they get better, according to experts. In our annual IT priorities survey of nearly 971 North American IT professionals, security once again was identified as an area in which a considerable percentage of IT professionals -- 23% in this year's survey -- devote most of their time, second only to general IT management, which was cited by 27% of respondents. To make sure that time isn't spent treading water, CIOs and IT executives need to develop an IT security strategy that utilizes the right tools and encompasses the many facets of IT -- from mobile and cloud to IoT and analytics and everything in between.
In this Essential Guide, explore the cybersecurity landscape and absorb the latest information around next-generation security architectures, attack detection and response, governmental intervention in the professional threat economy and how companies are handling data breaches.
1IT security strategy overview-
Drafting your cybersecurity roadmap
Due to the continuous onslaught of cyberthreats and the immeasurable number of approaches IT executives can take in the defense against such threats, choosing the right IT security strategy for your organization isn't easy. This section simplifies things for you by exploring next-gen security architecture and offering tips and strategies for combatting today's cyberthreats.
As cyberattacks on the enterprise continue to grow in number, organizations need a new breed of security professionals that experts call "threat hunters." Read how threat hunters are emerging as a new line of defense against cyberattacks and how they can help you detect security incidents. Continue Reading
During a panel discussion sponsored by Women in Technology International, security experts offered advice about countering data breach threats and how organizations can strengthen their information security strategy. Continue Reading
In this Q&A with Nemertes Research CEO Johna Till Johnson, learn why now is the time to move to a next-generation security architecture and get strategic best practices for getting the job done. Continue Reading
When planning out how to handle a data breach, special consideration should be given to managing public perception. One piece of advice from MIT research: Don't play the victim. Continue Reading
When it comes to IT security, culture is king
Sometimes the biggest security threat can come from within. Without the right environment, mindset and personnel, an organization's IT security is put at risk. In this section, learn how important it is to promote a culture of security at your organization and how to educate your employees on security best practices.
In this Q&A with Bryan Sartin, managing director of the Verizon RISK Team, learn why human error remains among the biggest data security threats that organizations face today and the data security best practices that they should be implementing to offset breach vulnerabilities. Continue Reading
Rohyt Belani, chief executive and co-founder of security firm PhishMe, explains how organizations can condition and train employees to help detect phishing scams, transforming them from being a liability to an asset when it comes to ransomware attacks. Continue Reading
In this video interview, Marci McCarthy, CEO and president of Tech Exec Networks, discusses information security best practices and why end-user security awareness is the front line of corporate data protection efforts. Continue Reading
Many organizations strive to make creating a "culture of security" a priority, but doing so requires business leaders to reexamine the role of data protection in bottom-line success. Continue Reading
This blog post details why relationship building and top-down employee support is necessary in information security. Continue Reading
Mobile security is in your hands
If you're not focusing security efforts on mobile, think again. The number of mobile devices now outnumbers the number of people in the world, making securing those devices -- through next-gen tools and some forward thinking -- a priority for any organization. In this section, we give you an overview of the emerging and prevailing mobile security threats, and provide tips on how to address these concerns.
In this Q&A, Gartner analyst Dionisio Zumerle explains how "promiscuous" users -- employees who use their tablets and mobile devices for both official and personal use -- can be a mobile security threat. Zumerle also details the mobile security best practices modern organizations should be adopting. Continue Reading
Mobile security threats, such as malware and file-sharing data leakage, are escalating across the enterprise. IT needs strong best practices to mitigate these threats. Continue Reading
Crafting a cloud security strategy
As organizations move more and more data to the cloud, cultivating a cloud security strategy is becoming a top CIO imperative. In this section, learn about factors driving cloud threats, and strategies and best practices for improving your organization's cloud security.
Cultivating a cloud security culture and enlisting a CISO are vital to organizations in the cloud computing era, a new report shows. Continue Reading
In this video, vArmour senior vice president and chief cybersecurity strategist Mark Weatherford discusses the biggest threats to corporate cloud information security and offers pointers on securing information in the cloud. Continue Reading
As organizations increasingly move more applications to the cloud, they see encryption as a foolproof way to secure information in the cloud. But encryption doesn't guarantee protection, says Gartner analyst Ramon Krikken. Continue Reading
Custom applications built outside the purview of IT and deployed in the public cloud are vulnerable to cyberattacks, according to research released by the Cloud Security Alliance. Read how this could impact CIOs. Continue Reading
Now more than ever, university IT departments have the difficult task of maintaining a culture of openness while protecting against growing security threats. Continue Reading
Security in an increasingly connected world
IoT devices are proliferating at a rapid rate, spiking IoT data security concerns in the process. The more connected we get the more important it becomes to protect the massive amount of data involved. That's why IoT security is becoming a vital part of any organization's IT security roadmap. In this section, we explore the biggest security concerns raised by IoT and offer tips about how to address them.
MIT cybersecurity expert Stuart Madnick says we're woefully unprepared to protect the proliferating population of IoT-enabled devices. Continue Reading
According to experts at RSA Conference 2016, it's time for organizations to put IoT security first -- or risk the inevitable downfall of the internet of things. Continue Reading
In this video, vArmour CISO Demetrios Lazarikos discusses how companies' efforts to secure IoT devices are influencing their overall infosec strategy. Continue Reading
As the internet of things grows, so will accompanying enterprise security challenges. In this webinar, learn how a lack of focus on IoT security challenges during the design stage could create numerous data protection vulnerabilities. Continue Reading
Don't spend more; spend right
Investing in security is always a good idea, but throwing money at the problem won't cut it. In this section, find out how to manage your IT security spending efficiently.
Mike O. Villegas, vice president at tech consulting firm K3DES, explains how organizations can identify their top cybersecurity spending priorities in the aftermath of a cybercrime incident and why learning from the experience is important to prevent future threats. Continue Reading
While there has been a rise in security budgets, spending on security is not on par with the growing threat landscape, according to a study by the Institute of Information Security Professionals. Continue Reading
In this video interview, Jeff Reich, chief security officer at Barricade.io, discusses how embedding data protection efforts in corporate strategy can reduce information security costs. Continue Reading
A cybersecurity budget with no restrictions may sound like a dream, but it could actually harm enterprise security, says expert Mike O. Villegas. Continue Reading
7Security and the government-
Cybersecurity legislation and CIOs
Cybersecurity isn't just a business priority anymore. Facing new pressures from today's increasing cyberthreats, the U.S. government is stepping in to assess the IT security landscape and enacting legislation to address some of the top concerns. In this section, find out how the government is responding to increasing IT security concerns, how emerging technologies are influencing the legislative process and how such legislation will impact IT executives.
In this Q&A, Monique Ferraro, cyber counsel for Munich Re's U.S. P&C Cyber and Privacy Risk Practice, discusses how drones and IoT are influencing information security regulations and the challenges that lawmakers face when developing these new cybersecurity rules. Continue Reading
While speaking at a symposium at the University of Texas at Austin, FBI Director James Comey explained why now is the time to engage in conversations about backdoor encryption policies. Continue Reading
The federal government is encouraging cybersecurity info sharing to offset threats to data, but some businesses are worried that the data protection measures might infringe on privacy. Continue Reading
Legislators have begun examining cryptocurrencies and blockchain security amid growing instances of cybercrime, such as the ransomware attacks on NYT and BBC. Continue Reading
8Security and analytics-
The devil's in the data
Don't underestimate the importance of data analytics in your IT security strategy. In this section, learn how to best tap into analytics at your organization and what tools can help identify, monitor and ward off threats to data security.
The rising number of attacks has led to a big increase in cybersecurity intelligence data that can be analyzed to prevent future incidents. But rapidly advancing technology makes it hard to stay ahead of the curve. Continue Reading
As more organizations collect customer data to drive marketing strategies, it creates numerous data security and privacy concerns. Deborah Berebichez, chief data scientist at Metis, explains what steps organizations should take to offset these risks and how data scientists can help. Continue Reading
Next-gen security analytics tools provide proactive and responsive analysis of security events. Nemertes Research CEO Johna Till Johnson explains. Continue Reading
IT security strategy terms
- CISO (chief information security officer)
- information security (infosec)
- endpoint security management
- mobile device management (MDM)
- mobile app security
- OPSEC (operational security)