This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print page

The Future of Security: Evolve or Die

New organizational realities demand executive attention


DOWNLOAD  

Over the past several years, the pace of IT development has accelerated and cyber threats have multiplied. Unfortunately, many security functions have failed to match that pace and meet those threats. As the evolution of security struggles with the dynamic environments whose risks must be managed, it is time for a new approach to information security.

An effective security program needs to address the most significant risks that the organization faces. Unfortunately, few senior executives understand the real challenges their IT security professionals have to handle. The future of security depends on senior executives and CIOs urging and enabling organizations to evolve as the environment evolves. A new white paper, The Future of Security: Evolve or Die from Deloitte’s Center for Security and Privacy Solutions may help senior executives, CIOs, and CISOs chart the future of security in their organizations.

This paper presents a compelling discussion of key security issues and challenges that organizations face, along with steps to consider in response, during the evolution process:

  • Social media sites and blogs open new avenues of attack. Organizations need to be educated about limitations and risks, and create governing policies, and train and educate their workforce.
  • Mobile devices multiply potential avenues of attack; organizations must monitor usage, confirm secure configurations, and employ dynamic policies.
  • Cloud computing adoption comes with associated risks. Organizations need to understand determine the opportunities and also the potential business and financial risks of public and private cloud environments.
  • Software vulnerabilities are increasing with growing number of application releases. The approach to consider is anticipate and defend, define normal to identify abnormal, and exercise vigilance.
  • Access management is still primitive. The approach can be to master the basics, analyze your needs, and adapt as you go.

To learn more about how to enable your security function to accelerate its own evolution, please download the full report. We’d love to hear your thoughts on this topic. Please e-mail us at centersps@deloitte.com.

Material on this website is © 2014 Deloitte Global Services Limited, or a member firm of Deloitte Touche Tohmatsu Limited, or one of their affiliates. See Legal for copyright and other legal information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see “About Deloitte” for a more detailed description of DTTL and its member firms.

Get connected
Share your comments

 

More on Deloitte
Learn about our site