View
212
Download
0
Category
Tags:
Preview:
Citation preview
TOP 10 TECHNOLOGY INITIATIVES
© 2013 - Robert G. ParkerS-1
Issues
Loss or theft of mobile devices
Lack of MDM (mobile device management) software
Cloud computing.
Cyber attacks
Various uses of social media
Risks - IssuesLoss of sensitive confidential information
Inability to operate (DOS)
Customer hostility, law suits over data compromises
Customer expectations may be unmet or compromised
Security Issues Have Been Top Contenders in Past Technology Surveys
2. Securing the IT Environment
The fact that over 50% of respondents lack confidence in their or their client’s ability to manage IT security is seen as a wake-up call to
management, their auditors and advisors.
TOP 10 TECHNOLOGY INITIATIVES
© 2013 - Robert G. ParkerS-2
2. Securing the IT Environment
Deloitte TMT Survey
Source: Deloitte 2013 TMT Security Survey – P8
TOP 10 TECHNOLOGY INITIATIVES
© 2013 - Robert G. ParkerS-3
2. Securing the IT Environment
Deloitte TMT Survey
Source: Deloitte 2013 TMT Security Survey – P10 & P13
Third Party Security Concerns
TOP 10 TECHNOLOGY INITIATIVES
© 2013 - Robert G. ParkerS-4
2. Securing the IT Environment
Deloitte Global Financial Security Survey
Source: Deloitte 2013 Financial Services Security Survey – P24
TOP 10 TECHNOLOGY INITIATIVES
© 2013 - Robert G. ParkerS-5
What is it Important?
Economic constraints of security
The economic volatility of the past four years has resulted in budgetary restraint as organizations cut back expenditures and capital investment in almost all areas.
Conversely, cybercriminals are becoming increasingly sophisticated and better funded by organized crime elements or, as recently reported in the media, state funded.
2. Securing the IT Environment
TOP 10 TECHNOLOGY INITIATIVES
© 2013 - Robert G. ParkerS-6
2. Securing the IT Environment
56% indicated “Confident or Highly Confident” in Their Ability to Effectively Assess IT Security. Placing it 3rd on the Confidence Scale
Quickly Detect & Respond to Cyber Attacks
Properly Protected all Mobile Devices to Prevent Data Breaches
Considered All Relevant Vulnerabilities & Threats- Including Emerging Technologies
26%
32%
40%
2nd Highest Initiative
Recommended