Skip Links

Gartner: 7 major trends forcing IT security pros to change

Mobile and cloud computing among "nexus of forces" putting pressure on CISOs

By , Network World
June 10, 2013 05:08 PM ET

Network World - National Harbor, Md. --  Enterprises are under heavy pressure to change their approach to IT security because of a "nexus of forces" that include big data, social networking, mobile and cloud computing, according to Gartner.

[IN THE NEWS: Debate rages over revelation of NSA spying secrets]

Ray Wagner, managing vice president of Gartner’s secure business enablement group, summed up these forces at the Gartner Security & Risk Management Summit in National Harbor, Md., Monday, which has attracted 2,200 or so chief information security officers (CISO) and chief security officers (CSO).

Significant change is required by you.

Wagner’s top trends:

* The adoption of cloud services, especially when end users access them without IT department approval, means traditional security controls such as anti-virus and perimeter firewalls are increasingly ineffective. There’s a need to “shift up the stack” in security, “beyond networks and devices,” Wagner said.

*All packets across the network are suspect. It’s extremely hard to detect compromises and infections in corporate resources, so monitoring should be considered a basic means to detect attacks. Gartner estimates by 2020, 75% of IT budgets will be set aside for rapid detection and response approaches, up from less than 10% in 2012.

* IT security jobs generally fall into security operations (with a technical focus) or security management (with an active involvement in the business side of things). Wagner said the better course to take is to be the business-savvy CISO with creative approaches to security issues. The use of cloud resources are, to some extent, diminishing the enterprise need for technology expertise in terms of programmers, security testers, and database administrators, Wagner said.

* “Bring Your Own Device” and mobile technologies are here to stay, and are driving new technology segments such as mobile-device management, containerization tools and mobile data protection. “People tried to say ‘no,’ and it didn’t work,” Wagner said. Security managers will likely find themselves moving from an “avoid” stance to phases such as accommodating, adopting and eventually, assimilating. Identity management and context-aware security will be key to supporting this.

* Operational technology and management in business are under increasing security threat, and “it’s not just the power utilities or national infrastructure,” said Wagner. It’s all companies with important data-processing.

*Identity and access management may need to be looked at from a new perspective. That’s because the power of social networking has businesses considering strategies that involve customer identity based on social-network identities rather than managing an account for them. The problem with this, of course, is that social networks generally don’t ask for proof of real-world identity, Wagner pointed out. On the other hand, he added, new accounts traditionally only relied on self-assertion. CISOs will need to ask security questions related to use of social networking as a basis for a customer account. “Is it a little creepy that Facebook knows what your customer is doing?” Wagner wondered aloud.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News