IT Security Trends and Opportunities

by

it security

FountainBlue’s November 2 VIP roundtable, on the topic of ‘IT Security Trends and Opportunities’. Please join me in thanking our gracious hosts at Lam Research and our executives in attendance. Below are notes from the conversation.

Our conversation around IT security trends ran the gamut across technologies, industries, and companies. Our executives in attendance had broad and deep experience across IT security, and agreed that: 

  • It’s amazing how increasingly important IT security is for a company, with serious repercussions on brand and finances when there are breaches, and also for consumers and individuals as well. 
  • Development and engineering is growing at an astronomical pace, which means that there are more devices, more software, more hardware, more data to manage and handle, and more opportunities for compromised security.
  • It’s hard to predict security trends because privacy is a ‘whisper industry’, and leaders aren’t necessarily openly sharing breaches or incidents…
  • There’s a war between the good guys who are in charge of keeping everything compliant, secure, and running, and the ‘bad guys’ who are trying to get access to the network for financial gain, for brand sabotage, and for political and other reasons. 
  • It’s important to create a culture that respects the need for security, while also making sure that everyone can be productive.
  • There’s a push-pull between regulators and innovators in this space, which adds complexity and challenges. But there’s a huge opportunity for companies and leaders willing to navigate the additional hurdles.  
  • Security is not the responsibility of the IT professional. It is everyone’s responsibility – at work and at home.
  • Security issues will impact our day-to-day lives, not just our work life. Our cars and roads, our healthcare organizations, our leisure activities, our shopping experiences may be the target of cyber attack. Be vigilant and informed, and make proactive decisions to protect your identity and your data.

Below is a list of some upcoming opportunities for IT security innovation:

  • Solve the paradox between encryption and searchability.
  • Create a solution which allows analytics and also respects privacy.
  • Automate multi-step validations of addresses and domain names.
  • Identify, monitor, and send alert on anomalies which occur within the network.
  • Design software so devices can send alerts when compromising scenarios occur, or even quarantine itself. 
  • Manage security at the hardware level.
  • Design a solution which would weave together IP, hardware, software, operations security functionality.

Below are some thoughts on how best to stay on top of IT security trends:

  • Accept that people will have multiple devices and want autonomy on when and how to use them. But provide reasonable restrictions and policies to ensure that the network and the data are also safe.
  • Collaborate across leaders, organizations and industries to share best practices.
  • Train and educate the workforce about the choices they are making which could unwittingly compromise people, infrastructure, operations, finances, brand, etc., Phishing attacks on your own staff may help you identify people who need more training around security, while keeping them and the network safe.
  • There’s so much information out there around security, and so many ideas on technology solutions in this space. Make sure that there’s a business case for the security solution – a technology which someone would pay for and use, not just a cool technology which sits on a shelf.
  • Adopt and consistently use a two-step authentication solution across the company.
  • Don’t just have a backup, make sure that you can restore from a backup if a worse case scenario should occur.
  • Try implementing ‘bug bounty’ programs, which challenge people to hack into networks. This will help your IT and security team keep on top of weak points across the network, and may even help with the cyber-security recruitment efforts! 

The bottom line is that no matter what technologies or processes you use to manage security for the company or for the home, it’s the people who will make the choices and decisions which could keep you safe and secure, OR compromised and vulnerable. So keep the people informed and educated, and help them make choices that will keep people, data, and infrastructure safe.

Advertisements

%d bloggers like this: