Top Security Priorities for CIOs in 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Top Security Priorities for CIOs in 2014-7 Next

The Insider Threat

The insider threat has long been a security problem, but Timothy P. Ryan, a managing director with Kroll and the cyber investigations practice leader for North America, says we should expect the insider threat to become more visible, thanks to privacy breach notification laws and enforcement regimes. Information technology simply made the betrayer's job easier; however, that same information technology, as well as stronger rules and regulations, have improved the alert CIO's ability to thwart the threat. The operative word there is "alert." CIOs need to make stopping the insider threat a top security priority in 2014. Said Ryan:

There's a tremendous amount of data compromised today where the act is never discovered or disclosed. People discount the insider threat because it doesn't make the news. Instead, we see headlines about external credit card breaches and theft of personally identifiable information, because regulations mandate accountability and punishment is expensive. The insider threat is insidious and complex. Thwarting it requires collaboration by general counsel, information security, and human resources. SEC breach disclosure of "material losses" may be the model for rules requiring a company to be more transparent and answerable for allowing bad actors to go unpunished.

The security experts have made their predictions for 2014. Now it is time for CIOs to make some tough decisions and establish security priorities for the coming year. Certainly many of those predictions will come into play. The predictions aren’t made in a vacuum; CIOs would be foolish not to consider the situations in which experts expect serious threats and risks.

Bring Your Own Device (BYOD) will continue to be a primary concern for CIOs in 2014. However, CIOs will have to pay attention to a few twists to the BYOD movement, like BYOI, or Bring Your Own Identity. Unfortunately, as Jake O’Donnell pointed out in a SearchConsumerization piece, the budget doesn’t necessarily meet the needs for mobile security, and that’s a problem that CIOs will have to work around.

CIOs will also turn more attention to the cloud, not just to determine how to make data in the cloud more secure but to  see how the cloud plays a role in covering network security, as Philip Lieberman, CEO & Founder, Lieberman Software, stated, adding:

CIOs will have to reevaluate proposed security as a service being delivered via the cloud considering that hardware and software will no longer need to be purchased for deployment.

These issues are just the tip of the security iceberg. Overall, the primary challenge for CIOs will be to make sure everyone within the company is on board when it comes to security policy. It appears that 2014 will see a real shift in security concerns and in the way security will work. Education for everyone from the CEO down to every employee who has access to the corporate network will be a must.

Here are the top priorities that CIOs will be (or should be) focusing on in 2014.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.