Top Security Priorities for CIOs in 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Top Security Priorities for CIOs in 2014-9 Next

Third-party everything

Third party may end up being the buzzword of CIO security priorities in 2014. Angelo suggested that CIOs will implement new techniques and tools to track third-party components introduced by a software application. He explained:

Malware has long been introduced into companies via software products. But since Stuxnet, the question of Software Supply Chain or "What’s in Your Product?" has arisen. While most companies still vet software for vulnerabilities prior to introduction in their environment, the practice has become difficult as most products include third-party components (for example, open source libraries or frameworks) and many executives don't have insight into what their applications have been built with. The need to monitor environments to see if components have had new vulnerabilities disclosed will be top of mind.

At the same time, Jason Straight, SVP/chief privacy officer at UnitedLex, said CIOs will focus on auditing the security protocols (people, processes and IT) of third-party service and solution providers. He said that when corporations fail to consider the security risks brought on by third-party partners and vendors, enterprise creates a "soft underbelly" that hackers can easily exploit.

Third-party threats come from multiple sources. The smart CIO will concentrate efforts on all of them.

The security experts have made their predictions for 2014. Now it is time for CIOs to make some tough decisions and establish security priorities for the coming year. Certainly many of those predictions will come into play. The predictions aren’t made in a vacuum; CIOs would be foolish not to consider the situations in which experts expect serious threats and risks.

Bring Your Own Device (BYOD) will continue to be a primary concern for CIOs in 2014. However, CIOs will have to pay attention to a few twists to the BYOD movement, like BYOI, or Bring Your Own Identity. Unfortunately, as Jake O’Donnell pointed out in a SearchConsumerization piece, the budget doesn’t necessarily meet the needs for mobile security, and that’s a problem that CIOs will have to work around.

CIOs will also turn more attention to the cloud, not just to determine how to make data in the cloud more secure but to  see how the cloud plays a role in covering network security, as Philip Lieberman, CEO & Founder, Lieberman Software, stated, adding:

CIOs will have to reevaluate proposed security as a service being delivered via the cloud considering that hardware and software will no longer need to be purchased for deployment.

These issues are just the tip of the security iceberg. Overall, the primary challenge for CIOs will be to make sure everyone within the company is on board when it comes to security policy. It appears that 2014 will see a real shift in security concerns and in the way security will work. Education for everyone from the CEO down to every employee who has access to the corporate network will be a must.

Here are the top priorities that CIOs will be (or should be) focusing on in 2014.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.