Cloud security to be most disruptive technology of 2012
- 03 January, 2013 12:09
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called cloud computing the main disruptive force for 2013. In its report, "Information Security Shake-Up," the group said it was evident many organizations are preparing to move more business processes to the cloud. This year, it will even be "mission-critical apps and regulated data" consigned to the cloud.
The Council, established several years ago to advise RSA, includes security professionals from Coca-Cola, eBay, FedEx, EMC, Fidelity Investments, Intel, Johnson & Johnson, and Walmart, among several others.
RELATED: Growing confidence in cloud security
"Although supplier lock-in and system availability are some of the big concerns with the cloud, security remains the number one obstacle to adoption," the Council's report says. "But trust in the cloud is growing."
Even regulators are starting to warm up to it, they noted, pointing out that the Dutch banking authority gave Dutch banks the green light to use cloud services late last year. But there are "gaps" in how well companies are planning for any transition to the cloud, the report notes. Though middle managers in companies may favor cloud computing for business reasons, there's a gap in coordination and trust with the IT security managers responsible for regulatory and security controls.
"Middle managers don't want to use their resources on security," the report bluntly says. "They are incentivized by timeline and budget; adding security doesn't fit into their objectives."
Security teams should be striving this year to build relationships with these middle managers, the report emphasizes. The practice of regular meetings and information exchange is an approach that has worked well over the past few years with the top corporate executives to bring their attention to the nature of cyber-threats. These top execs now largely understand and prioritize information security. But getting the same rapport going with middle managers is likely to be an even bigger challenge, the report says.
In addition, cloud computing is forcing internal security teams to look beyond internal controls they manage to find ways to assure controls they need from cloud vendors are in place, and more of the IT budget is going to go that direction as well.
Other predictions about disruptive factors into 2013 center on risks associated with social media. The report suggests the risk is not simply about what corporate employees do at work in terms of social media but "also on their personal time." It's suggested training would help employees grasp any obligations they accept regarding postings related to sensitive company information. Employees also need to be made aware of how social media is exploited by criminals for purposes of spear-phishing aimed at compromising the entire organization.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: firstname.lastname@example.org.
Read more about wide area network in Network World's Wide Area Network section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Updated: Bill Morrow new head of NBN Co
Cloud debate now about speed and sophistication
Cloud debate now about speed and sophistication
Yahoo Mail still down for some users, after an attempted fix
Queensland government to provide 200 services online by 2015
Mobile Application Containers for Enterprise Data Management
As mobile device and network technologies advance, users need to access more complex data on devices that are not owned by the enterprise. In this whitepaper, we look at how IT and network leaders understand how containerisation supports advanced security and management solutions and its effect on third-party applications. Click to download!
At one point, it seemed that phishing was receding to the status of a minor issue threatening only naïve consumers. However new cybercriminals and phishing techniques have lead this to become a greater concern. Download how to find out how phishing became the No. 1 web threat, and which web security solution can best protect your company.
Embracing Behaviour-Based Pricing Models
The telecommunications industry is one of the most challenged, fast-moving and evolving industries thanks to the worldwide embrace of mobile lifestyles that demand new services, solutions and experiences. In this survey, we investigate where and how new thinking around data, analytics and the actionable customer intelligence can further monetise mobile subscribers. Click to download!