Page 11 - Cyber Warnings
P. 11







a large portion of their budget on traditional perimeter ‘blocking’ security technologies such as
firewalls and malware protection, mobile platforms have transformed the network so that the new
perimeter is essentially in your pocket. To keep pace with the changing network, I predict that we
will see a shift in how organizations protect their digital enterprise, focusing on the data attackers
are after, rather than the network. As the network perimeter is no longer easily defined, new
cybersecurity tools and techniques will focus on applying big data analytics and automation to the
threat landscape, as well as internal users and operations to detect malicious insiders. Additionally,
new methods for managing user identity will cross into biometrics and across cloud platforms, and
we will see the increasing adoption of advanced consumer security and identity products and
services.

4. CEOs will take the hot seat when it comes to security

In light of the frequent and destructive data breaches we’ve seen over the last two years, in 2016
CEOs will be at the forefront in leading the response to a cyber breach. Enterprises will increasingly
be held responsible for the information security of consumer data, as they risk significant financial
and reputational damage should a breach occur. As such, cyber risk will be top-of-mind for boards,
elevating the CISO beyond traditional IT with the realization that it is no longer if they will be
breached, but when. Instead of focusing on a perfect strategy to block every attack, there will be a
shift in focus to adding and fixing resources to improve detection times and rapid response led by
the C-suite. Technological advances in connected devices, mobile and the cloud have many
benefits including greater efficiency, productivity and overall convenience in both our personal and
professional lives. However, they also present new security challenges for large organizations
looking to empower an innovative workforce that’s equipped with the latest applications and
devices. As the attack landscape shifts, organizations must implement new tools and increase
collaboration to combat the growing sophistication of data breaches. With the estimated global
spend on cyber security in 2015 at $75 billion, security will remain a priority for organizations this
year and beyond.

About The Author

Andrzej Kawalec is the Chief Technology Officer for HPE Security Services,
Hewlett Packard Enterprise. In this role, he is responsible for HPE's Information
Assurance strategy, propositions and market-facing activity. He leads research
and innovation for the group, with a particular focus upon cloud,
consumerization, cybersecurity and the business risks surrounding information
security systems, policies, users and processes.


Prior to this, Kawalec spent 15 years at some of the world's largest IT
companies, including Compaq, Digital and Siemens, and has worked in board-
level positions across the public and private sectors to help define and promote information
strategies.

Kawalec has degrees in international business and German from Ottawa and Bradford Universities.
The company website is: http://hpe.com.


11 Cyber Warnings E-Magazine – January 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   6   7   8   9   10   11   12   13   14   15   16