Enviar búsqueda
Cargar
Gartner presentation risq dec 2016 jie zhang
•
2 recomendaciones
•
452 vistas
C
ColloqueRISQ
Seguir
Gartner Presentation_RISQ_Dec 2016 Jie Zhang
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 31
Descargar ahora
Descargar para leer sin conexión
Recomendados
Google peter logli & jake shea
Google peter logli & jake shea
ColloqueRISQ
Microsoft john weigelt 2016
Microsoft john weigelt 2016
ColloqueRISQ
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
Windstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
Ideba
Windstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
Ideba
Windstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
Ideba
Recomendados
Google peter logli & jake shea
Google peter logli & jake shea
ColloqueRISQ
Microsoft john weigelt 2016
Microsoft john weigelt 2016
ColloqueRISQ
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
Windstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
Ideba
Windstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
Ideba
Windstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
Ideba
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
Matthew Rosenquist
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
jlieberman07
Aujas Cyber Security
Aujas Cyber Security
VivianMarcello3
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
Jisc
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Tripwire
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
Heimdal Security
Windstream Cloud Security Presentation
Windstream Cloud Security Presentation
Ideba
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Cyber Security and Cloud Security
Cyber Security and Cloud Security
IT Governance Ltd
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
ETDAofficialRegist
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
Cyber Infrastructure INC
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
CSI Solutions
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
Omar Khawaja
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
wilsonconsulting1
New technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
Hugo Rodrigues
Más contenido relacionado
La actualidad más candente
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
Matthew Rosenquist
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
jlieberman07
Aujas Cyber Security
Aujas Cyber Security
VivianMarcello3
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
Jisc
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Tripwire
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
Heimdal Security
Windstream Cloud Security Presentation
Windstream Cloud Security Presentation
Ideba
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Cyber Security and Cloud Security
Cyber Security and Cloud Security
IT Governance Ltd
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
ETDAofficialRegist
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
Cyber Infrastructure INC
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
CSI Solutions
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
Omar Khawaja
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
wilsonconsulting1
La actualidad más candente
(20)
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
Aujas Cyber Security
Aujas Cyber Security
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
Windstream Cloud Security Presentation
Windstream Cloud Security Presentation
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
Cyber Security and Cloud Security
Cyber Security and Cloud Security
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
Similar a Gartner presentation risq dec 2016 jie zhang
New technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
Hugo Rodrigues
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
Sirius
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
EMC
Prevention is futile in 2020 - Gartner Report in Retrospect
Prevention is futile in 2020 - Gartner Report in Retrospect
Jermund Ottermo
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
SAP Analytics
Cisco Award Write Up
Cisco Award Write Up
Claudia Toscano
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
Hewlett Packard Enterprise Business Value Exchange
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
kathyzink87
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
Rockwell Automation
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Forgeahead Solutions
Convergence innovative integration of security
Convergence innovative integration of security
ciso_insights
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
SteveAtHPE
report on Mobile security
report on Mobile security
JAYANT RAJURKAR
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
Ulf Mattsson
Similar a Gartner presentation risq dec 2016 jie zhang
(20)
New technologies - Amer Haza'a
New technologies - Amer Haza'a
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
Prevention is futile in 2020 - Gartner Report in Retrospect
Prevention is futile in 2020 - Gartner Report in Retrospect
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
Cisco Award Write Up
Cisco Award Write Up
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Convergence innovative integration of security
Convergence innovative integration of security
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
report on Mobile security
report on Mobile security
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
Más de ColloqueRISQ
Blockchain Technologies : Landscape and Future Directions
Blockchain Technologies : Landscape and Future Directions
ColloqueRISQ
Béluga : un super-ordinateur pour la science de demain
Béluga : un super-ordinateur pour la science de demain
ColloqueRISQ
Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?
ColloqueRISQ
La révolution 5G et le projet ENCQOR
La révolution 5G et le projet ENCQOR
ColloqueRISQ
Travailler TOUS ensemble lors d’une cybercrise!
Travailler TOUS ensemble lors d’une cybercrise!
ColloqueRISQ
Audit 101 - Un guide de survie
Audit 101 - Un guide de survie
ColloqueRISQ
Votre meilleure protection est un internet canadien
Votre meilleure protection est un internet canadien
ColloqueRISQ
Office 365 : Sécuritaire?
Office 365 : Sécuritaire?
ColloqueRISQ
What Nature Can Tell Us About IoT Security at Scale
What Nature Can Tell Us About IoT Security at Scale
ColloqueRISQ
The Power of the NREN
The Power of the NREN
ColloqueRISQ
L’hyperconvergence au cœur du Software-defined data center
L’hyperconvergence au cœur du Software-defined data center
ColloqueRISQ
Plus de darkweb, moins de problèmes pour les pirates informatiques?
Plus de darkweb, moins de problèmes pour les pirates informatiques?
ColloqueRISQ
L'humain dans la cybersécurité - Problèmes et réflexions
L'humain dans la cybersécurité - Problèmes et réflexions
ColloqueRISQ
L'internet des objets et la cybersécurité
L'internet des objets et la cybersécurité
ColloqueRISQ
Au-delà du réseau - une défense simple en profondeur
Au-delà du réseau - une défense simple en profondeur
ColloqueRISQ
Threat Landscape for Education
Threat Landscape for Education
ColloqueRISQ
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
ColloqueRISQ
Sécuriser votre environnement de l'Internet des objets (IoT)
Sécuriser votre environnement de l'Internet des objets (IoT)
ColloqueRISQ
The 2018 Threat Landscape
The 2018 Threat Landscape
ColloqueRISQ
Cybersecurity Through Collaboration
Cybersecurity Through Collaboration
ColloqueRISQ
Más de ColloqueRISQ
(20)
Blockchain Technologies : Landscape and Future Directions
Blockchain Technologies : Landscape and Future Directions
Béluga : un super-ordinateur pour la science de demain
Béluga : un super-ordinateur pour la science de demain
Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?
La révolution 5G et le projet ENCQOR
La révolution 5G et le projet ENCQOR
Travailler TOUS ensemble lors d’une cybercrise!
Travailler TOUS ensemble lors d’une cybercrise!
Audit 101 - Un guide de survie
Audit 101 - Un guide de survie
Votre meilleure protection est un internet canadien
Votre meilleure protection est un internet canadien
Office 365 : Sécuritaire?
Office 365 : Sécuritaire?
What Nature Can Tell Us About IoT Security at Scale
What Nature Can Tell Us About IoT Security at Scale
The Power of the NREN
The Power of the NREN
L’hyperconvergence au cœur du Software-defined data center
L’hyperconvergence au cœur du Software-defined data center
Plus de darkweb, moins de problèmes pour les pirates informatiques?
Plus de darkweb, moins de problèmes pour les pirates informatiques?
L'humain dans la cybersécurité - Problèmes et réflexions
L'humain dans la cybersécurité - Problèmes et réflexions
L'internet des objets et la cybersécurité
L'internet des objets et la cybersécurité
Au-delà du réseau - une défense simple en profondeur
Au-delà du réseau - une défense simple en profondeur
Threat Landscape for Education
Threat Landscape for Education
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Sécuriser votre environnement de l'Internet des objets (IoT)
Sécuriser votre environnement de l'Internet des objets (IoT)
The 2018 Threat Landscape
The 2018 Threat Landscape
Cybersecurity Through Collaboration
Cybersecurity Through Collaboration
Último
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
Sri Ambati
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Último
(20)
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Gartner presentation risq dec 2016 jie zhang
1.
CONFIDENTIAL AND PROPRIETARY This
presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Top Security Trends and Take-Aways Jie Zhang
2.
1 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Security for the Next Generation of Threat A pervasive digital presence is expanding into business, industry and society Once networked, this digital presence substantively alters risk for digital businesses Digital security is the next evolution in cybersecurity to protect this pervasive digital presence
3.
2 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Security Macro Trends You Face in the Age of the Pervasive Digital Presence Risk and Resilience Seek Balance Security Disciplines Converge Secure Digital Supply Chain Needs Grow Security Skills Options Expand Adaptive Security Architecture Embraced Data Security Governance Arrives Digital Business Drives Digital Security
4.
3 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Risk and Resilience Seek Balance
5.
4 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Security Moves to an Embedded State in the Organization Governance Compliance Control Protection Reliability Speed Assurance Transparency RISK RESILIENCE Privacy Safety Value Cost
6.
5 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Security Principles for Trust and Resilience Business Outcomes Risk-Based Data Flow Facilitator Detect and Respond Principle of Trust and Resilience People-Centric
7.
6 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Risk and Resilience Balance Revisit the security organizational structure to ensure it reflects current mission Revise the methods used to calculate IT risk to incorporate new variables and factors Refine the security communication and education process to emphasize agility
8.
7 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Security Disciplines Converge
9.
8 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Digital Security for the Pervasive Digital Presence Defense Offense Reactive Proactive IoT Security Information Security IT Security OT Security Physical Security You Are Here Digital Security
10.
9 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. "Digital Safety" Becomes a New Force and Responsibility The CIAS Model of Digital Security Integrity Data People Environments Confidentiality Availability Safety Graphics: Can Stock Photo
11.
10 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Security Convergence Establish security governance and planning relationships with physical and industrial counterparts Improve cross-discipline procurement methods for security requirements Modify security architecture to include additional layers where required Investigate changes in security management and operations that may be required to accommodate convergence
12.
11 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Secure Digital Supply Chain
13.
12 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Integrated Digital Security for the Supply Chain(s) SUPPLY CHAIN DIGITAL SUPPLY CHAIN DIGITAL SECURITY FOR THE SUPPLY CHAIN(S) IoT Security Information Security IT Security OT Security Physical Security Digital Security
14.
13 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. SIEM Software Asset Management Expanding (and Confusing) SaaS Control Add-On Markets Today's enterprise suffers from coordination frustration. Encouraging evolution of multicloud, multifunction management consoles. Activity Threat Control Archive and Recovery Cloud Access Security Broker EMM Confidentiality IDaaS SaaS Aggregation Tool Mobile Device Management Before and During Login After Login Service Monitoring Malware Control
15.
14 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Securing the Cloud (Supply Chain) Develop an enterprise public cloud strategy. Implement and enforce policies on usage responsibility and cloud risk acceptance. Follow a cloud life cycle governance approach. Develop expertise in the security and control each cloud model used. Implement technologies to fight cloud diffusion complexity. Conduct Risk Assessment (decision establishes requirements for technical and process controls) Medium Exposure Potential Impact of Security Failure BusinessContribution (ValueofService) Low High Always Allowed Low High DoNotAllowDoNotAllow
16.
15 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Security Skills Options Expand
17.
16 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Assess the Most Critical Skills Impacts of Digital Security Already, Traditional Security Strategies Are Shifting To: Contextual Security Monitoring and Response Ubiquitous Identity Management Data Classes, Data Governance Security Awareness, Privacy & Behavior 01011 Embedded Security Network Segmentation, Engineering Physical Security Automation
18.
17 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Key Take-Aways to Accelerate Skills Generation and Convergence Build a long-term security workforce plan. Make coaching and skills development first task. Embed security skills within the lines-of-business. Change security specialists to "versatilists." Mix traditional and agile recruitment techniques. Evaluate current skills gaps.
19.
18 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Adaptive Security Architecture Is Embraced
20.
19 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Software-Defined Everything, Including Security "Data Plane" "Control Plane" APIAPI API API APIAPI API Southboun d APIs Northboun d APIs Layers of Abstraction API Platform APIs Applications
21.
20 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Respond Detect Detect incidents Prevent attacks Confirm and prioritize risk Contain incidents Isolate systems Predict Prevent Harden systems Compliance Policy Monitor posture Adjust posture Implement posture Adjust posture Continuous Visibility and Verification Users Systems System activity Payload Network Investigate incidents/ retrospective analysis Remediate Anticipate threats/ attacks Risk-prioritized exposure assessment Design/Model policy change Baseline systems and security posture Develop an Adaptive Security Architecture
22.
21 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Threat Intelligence Platforms Allow You to Visualize, Correlate and Gain Context Emerging Threats Shadowserver ZeuS Tracker Abuse.ch Open-Source MRTI Feeds Norse IID Cyveillance Malcovery Commercial Feeds GeoIP Malware Lookup Domain Tools Enrichment Services News RSS Feeds Websites OSINT Sources Threat Intelligence Platform Analytics Threat Intelligence Processing Visualization Reporting Forensics Threat Intelligence Sharing Incident Response SOC Analyst Fraud Threat Analyst Management Malware Analyst Help Desk People Process Circle of Trust Sharing Workflow/ Escalation Communication Fraud Technology Secure Web Gateway NGFW IPS/IDS Logs
23.
22 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Adaptive Security Architecture Shift security mindset from "incident response" to "continuous response" Spend less on prevention; invest in detection, response and predictive capabilities Favor context-aware network, endpoint and application security protection platforms Develop a security operations center Architect for comprehensive, continuous monitoring at all layers of the IT stack.
24.
23 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Data Security Governance Arrives
25.
24 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Develop a Data-Centric Audit and Protection Approach Activity Monitoring Assessment of Users and Permissions User Monitoring and Auditing Data Security Policy Data Classification and Discovery Policy Data Security Controls Protection Analysis and Reporting Blocking, Encryption, Tokenization and Data Masking
26.
25 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Data Security Governance Prioritize organization-wide data security governance and policy. Identify and implement risk-appropriate data security controls by data type where possible. Implement a DCAP strategy that includes disciplined and formal product selection. Incorporate big data plans and unique requirements into security strategy.
27.
26 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Digital Business Drives Digital Security
28.
27 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Securing a Pervasive Digital Presence (the Internet of Things) Gateways Things Agents Analytics Applications Data Cloud Mobile MES, ERP Partners IoT Platform Middleware Core Business Processes IoT Edge Processing CommunicationsIntegration Integration Communications Security requirements: – Policy creation and management – Monitoring, detection and response – Access control and management – Data protection – Network segmentation Key challenges: – Scale – Diversity (age and type) – Function – Regulation – Privacy – Standardization Recommendations: Focus on small scenarios. Use risk-based prioritization. Emphasize segmentation and access initially.
29.
28 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Enterprise Consumer Business Disruption Espionage and Fraud Financial Waste Cyber Risks and Consequences in an IoT Solution IoT Platform Platform Hacking Data Snooping and Tampering Sabotaging Automation and Devices Edge Device Impersonation Device Hacking Device Counterfeiting Snooping, Tampering, Disruption, Damage Dev. Prod.
30.
29 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. IAM Trends of 2015-2016 That Include an Identity of Things IAM Program Management and Governance (Digital) Business and Operational Needs (Digital) Risk Management and Compliance Things People Apps and Data Relationships Interactions
31.
30 © 2016
Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Digital Security Balance Risk and Resilience Make the Security Discipline Decision Enhance Digital Security Supply Chains Retool Security Skills Embrace Adaptive Security Architecture Selective Improve Security Infrastructure Embrace Data Security Governance
Descargar ahora