Instrumented Interconnecteds Intelligent

Posted by
Guest in

Post feed

RSS 2.0

By Jack Danahy, Director for Advanced Security, IBM

There’s an evolution going on in the executive suite–emerging technologies like mobile, cloud and embedded devices are making the world more instrumented, and at the same time, producing huge amounts of data. Senior executives are paying close attention to these emerging technologies, not only because of the opportunity to learn more about behavior, but also because of the potential security risks they pose. With this, security is increasingly moving beyond simply a technology issue to a business issue.

High-profile hacking and data breach incidents can quickly impact shareholder value, tarnish public perception and expose the company to law suits. This is convincing senior executives of the key role security needs to play in the modern enterprise.

IBM recently surveyed global Chief Information Security Officers (CISOs) to get a look at how their role is evolving in an increasingly interconnected world.

The study, conducted by IBM’s Center for Applied Insights reveals how the CISO role follows the historical evolution of the CIO and CFO with more strategic organizational responsibilities. IBM’s new study identifies the distinguishing traits, expectations and challenges these CISOs are facing.

Nearly two-thirds of CISOs surveyed say their senior executives are paying more attention to security today than they were two years ago– but there’s room for advancement for security as a function–only one in four security chiefs surveyed currently are playing this kind of strategic role in their firms. The study also shows that mobile security is the biggest headache facing CISOs in the coming two years.

John Meakin, global head of security solutions and architecture at Deutsche Bank – echoed many of the assessments findings and speaks to the need for security officers to take on a more strategic role via a contributed article in Forbes. John hits the nail on the head when he says “to do a better job of protecting our enterprises, we’ve got to become more open and collaborative.”

The findings of this survey of Chief Information Security Officers–and Mr. Meakin’s article in Forbes–speaks volumes to the need for technology leaders to connect and learn from each other. We’ll continue this conversation and these initiatives on our Institute for Advanced Security blog. Please check that site regularly for updates regarding the CISO initiatives.

David Jarvis, senior consultant with IBM’s Center for Applied Insights, led the CISO survey initiative and provides a succinct recap of the survey results in this short video.

YouTube Preview Image

Bookmark and Share

Previous post

Next post

7 Comments
 
August 29, 2014
1:43 pm

Basically, everything that you do on a computer,
you can do on your tablet. Brand new games like Farmville have already amassed over
70 million players who tend to their farms and spend farmville coins to decorate their farms
and buy crops. Mashable comes to make the list simply because they are Mashable.


Posted by: http://buyfbfriends.com
 
December 20, 2013
3:14 am

The subsequent time I learn a weblog, I hope that it doesnt disappoint me as a lot as this one. I imply, I do know it was my option to learn, however I truly thought youd have one thing fascinating to say. All I hear is a bunch of whining about one thing that you could repair if you werent too busy in search of attention.


Posted by: Bret Drube
 
September 6, 2013
12:11 am

The entire brand has farmed to become a single of the top selling in basketball boot. People related to all social strata and ages wait eagerly in lists whenever new units are being distributed. This success can be credited to the facts that all emits from the Michael jordan III are exclusively named after the athlete.


Posted by: コーチメンズ
 
July 28, 2013
4:41 am

Oh my goodness! an incredible article dude. Thanks Nonetheless I’m experiencing situation with ur rss . Don�t know why Unable to subscribe to it. Is there anybody getting similar rss downside? Anybody who is aware of kindly respond. Thnkx


Posted by: Sherwood Shwab
 
July 24, 2013
10:08 pm

Youre so cool! I dont suppose Ive read anything like this before. So nice to find someone with some original thoughts on this subject. realy thank you for starting this up. this website is something that is needed on the web, someone with slightly originality. useful job for bringing something new to the internet!


Posted by: Gilma Nyhan
 
June 21, 2013
9:08 pm

Migraines and other types of headache — such as tension headache and sinus headache — are painful and can rob you of quality of life. Migraine symptoms include a pounding headache, nausea, vomiting, and light sensitivity. Headache remedies include various types of pain relievers. Migraine treatments may also include antinausea drugs and medications to prevent or stop headaches…*`

Look at the freshest article at our very own webpage
http://www.wellnessdigest.cotb


Posted by: Gilbert Dauberman
 
May 19, 2012
6:21 am

Hi Jack Danahy,

why don’t you try Quantum Cryptography? for enhanced security and better speed…


Posted by: IYER PARTHASARATHY (AFFILIATION - SELF-INVENTIONS-R&D)
 
1 Trackback
 
October 3, 2012
3:17 pm

[...] more pervasive in our daily lives, cyber criminals are (not surprisingly) following suit, causing mobile security to become the next big IT headache. The good news on this front is that IBM X-Force research found that mobile vulnerabilities and [...]


Posted by: IBM Security Report Shows Targeted Attacks Rise « A Smarter Planet Blog
 
Post a Comment