2013 TMT global security study - Blurring the lines | Whitepaper
In last year’s study, regulatory compliance was cited as the number one driver for improving information security. This year, compliance did not even make the top 10. Instead security strategy and roadmap top the list. This suggests that TMT organisations now recognise that information security is fundamental to their business, and not just a compliance issue anymore.
The big question is what to do next. TMT organisations face an onslaught of new and growing security threats, including advanced persistent threats (APTs) and hacktivism, the latter of which ironically combines destructive hacking with social and political activism.
At the same time, TMT organisations are trying to figure out how to manage new technologies such as mobile and cloud computing — technologies that promise to dramatically improve how businesses operate, but which also present significant new security challenges and risks.
Last but not least, TMT organisations must find ways to maintain and strengthen security in a hyper-connected world where third parties and digital supply chains are an integral part of their business models.
All of these trends are converging to create an environment where traditional security boundaries are blurry or even non-existent. How can a TMT organisation build a strong way of defense against cyberattacks in a world without boundaries?
This report highlights the key information security challenges that TMT organisations face today, and offers a number of fresh and practical insights to help the good guys come out on top.
This whitepaper is available in PDF format only.
Page Last Updated