- The CloudIt isn’t “The Cloud” that scares CISOs but it’s the notion that people and company assets are moving to the cloud without them even knowing it. As people, machines, and assets become more geographically dispersed in the enterprise, how do you keep track of company assets on the network and in the cloud? As a CISO you need to stay on top of where your company assets are living (on and off the network) and making sure you’re 100% secure in the cloud.
- Moving Data + Regulatory ComplianceSafeguarding the security and integrity of data is extremely important to any CISO. As technology evolves regulatory compliance standards, users and threats are becoming even more sophisticated. It is a huge responsibility for any person in IT to make sure that regulatory compliance is in line and all data remains secure. Interesting factoid: This particular entertainment company must also comply with HIPAA regulations, as some of their facilities have medical stations onsite.
- HacktivismWith all of the recent media attention from ‘hacktivist’ groups, this isn’t a big surprise as being something that would keep a CISO up at night.
- Mobility and the Consumerization of ITThe proliferation of smartphones and mobile devices in the enterprise could easily overwhelm any CISO and his/her team. Mobile devices have helped to broaden our system access, increase productivity and quicken our jobs, but you have to also consider that these same devices are fertile ground for account information, passwords and other sensitive data. As more and more employees bring in their own smartphones, laptops and tablets (each installed with even more apps, social tools, data, etc.) onto the enterprise network you have to be prepared with a mobile security strategy. The consumerization of IT is not going to go away. And you will need to learn to embrace it. What’s your mobile security strategy in 2012?
- Social MediaEven the savviest of social media gurus can fall victim and allow unauthorized access to corporate social media accounts. If your profile is big enough, these accounts can be a big megaphone to create panic, move markets or even ruin your own brand. In addition, web applications are increasing end-user exposure to everything on the web – from viruses, malware and other vulnerabilities – and with a single click a user can expose themselves to some pretty big risks.
Sarah Lieber, Marketing Manager, Demand Generation & Strategy at BeyondTrust
Sarah is a highly dedicated and creative marketing professional with over a decade of experience in proven B2B demand-gen and campaign success in the cybersecurity space. Sarah strategically built and grew from the ground-up BeyondTrust's highly effective and successful world-wide webinar program. Yearly, the BeyondTrust webinar program involves over 100 cybersecurity experts and generates tens of thousands of attendees across the globe. See what's new with BeyondTrust webinars here: https://www.beyondtrust.com/resources/webcasts