SlideShare ist ein Scribd-Unternehmen logo
1 von 15
2014 Identity, Security and Cloud
Predictions
Internet of Things (IoT) will be
2014’s big data
There will be an increased number of potential security
threat vectors as a result of more things being plugged
in…
Continue reading: http://bit.ly/CSOAusPredict

2

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
There will be an increased focus
on privileged users

Those with privileged access can potentially do a lot of
damage. This is not a new concept nor concern, but
the Snowden incident puts privileged users back in the
spotlight in 2014.
Continue reading: http://bit.ly/CSOAusPredict

3

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
Incorporation of Managed
Security Services (MSS)

We should expect to see an effort to utilize MSS for
some aspects of security management, while in-house
teams will focus on adding value, providing guidance
and ensuring better alignment with the business user,
who ultimately foots the bill.
Continue reading: http://bit.ly/InfoSecPredict

4

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
Privacy will become a major
concern in the mainstream

Data monitored by the governments, the number of
data breaches in 2013 and factor in the inability to
control how information flows after we disclose it to an
initial party and we have quite a number of privacy
issues to deal with. Plus new or amended privacy
legislation comes into effect in some countries in 2014
raising the profile of privacy further.
Continue reading: http://bit.ly/CSOAusPredict

5

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
Device Malware will focus on what
the device accesses

Once installed, malware on devices will continue to
focus on the things the device has access to, like
online accounts and data, rather than anything on the
device itself.
Continue reading: http://bit.ly/InfoSecPredicts

6

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
Security departments will shift
focus from incident identification
to incident reaction and
management
Ultimately, it is pointless identifying a threat when there
is no path forward to manage the incident, deploy the
appropriate responses and counter the threat through
remediation.
Continue reading: http://bit.ly/CSOAusPredict

7

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
We are at the dawn of an
encryption renaissance

Organizations will re-examine where their critical data
resides and encrypt as much of it as they can. They
must also use stronger forms of encryption to reduce
the chances of their data being decrypted.
Continue reading: http://bit.ly/CSOAusPredict

8

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
The number of authentication
alternatives will increase

We accept passwords as a necessary evil, but they
are insecure. Consumers want to be identified using
more secure, usable means.
Continue reading: http://bit.ly/CSOAusPredict

9

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
Data security, resilience,
availability and recovery; the next
step in the consumerization of IT

As consumers we do not ensure we have multiple
backup sources and can recover from failure or loss of
data; or that data is secure and cannot be stolen. This
will change. We will begin to take more care of
personal data.
Continue reading: http://bit.ly/CSOAusPredict

10

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
2013’s Data breaches will tip the
scales in favor of spear phishing

The volume of data breach in 2013 means criminals
know more about us than they ever have. This
knowledge will be used in spear phishing.
Continue reading: http://bit.ly/CSOAusPredict

11

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
CIOs need to be prepared for BYOI
The CIO will need to decide if BYOI would reduce or
increase their overhead, workload and liability/risk profile
Continue reading: http://bit.ly/BizEdgePredict

12

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
MSPs will expand into Identity-asa-Service market

Identity became a core part of IT and business in 2013
promoting MSPs to respond to the demand.
Continue reading: http://bit.ly/CSOAusPredict

13

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
Organisations will get serious
about their own on-premise
private cloud
Trust in public cloud providers has decreased. To
enjoy the cost and productivity benefits a cloud
infrastructure brings while maintaining full control over
critical and sensitive data, organizations will deploy a
private cloud.
Continue reading: http://bit.ly/CSOAusPredict

14

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
Learn more about NetIQ at:
NetIQ.com

15

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

Weitere ähnliche Inhalte

Mehr von NetIQ

Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed ServiceNetIQ
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...NetIQ
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense ReportNetIQ
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered SecurityNetIQ
 

Mehr von NetIQ (20)

Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered Security
 

Kürzlich hochgeladen

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

2014 Identity, Security and Cloud Predictions

  • 1. 2014 Identity, Security and Cloud Predictions
  • 2. Internet of Things (IoT) will be 2014’s big data There will be an increased number of potential security threat vectors as a result of more things being plugged in… Continue reading: http://bit.ly/CSOAusPredict 2 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 3. There will be an increased focus on privileged users Those with privileged access can potentially do a lot of damage. This is not a new concept nor concern, but the Snowden incident puts privileged users back in the spotlight in 2014. Continue reading: http://bit.ly/CSOAusPredict 3 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 4. Incorporation of Managed Security Services (MSS) We should expect to see an effort to utilize MSS for some aspects of security management, while in-house teams will focus on adding value, providing guidance and ensuring better alignment with the business user, who ultimately foots the bill. Continue reading: http://bit.ly/InfoSecPredict 4 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 5. Privacy will become a major concern in the mainstream Data monitored by the governments, the number of data breaches in 2013 and factor in the inability to control how information flows after we disclose it to an initial party and we have quite a number of privacy issues to deal with. Plus new or amended privacy legislation comes into effect in some countries in 2014 raising the profile of privacy further. Continue reading: http://bit.ly/CSOAusPredict 5 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 6. Device Malware will focus on what the device accesses Once installed, malware on devices will continue to focus on the things the device has access to, like online accounts and data, rather than anything on the device itself. Continue reading: http://bit.ly/InfoSecPredicts 6 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 7. Security departments will shift focus from incident identification to incident reaction and management Ultimately, it is pointless identifying a threat when there is no path forward to manage the incident, deploy the appropriate responses and counter the threat through remediation. Continue reading: http://bit.ly/CSOAusPredict 7 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 8. We are at the dawn of an encryption renaissance Organizations will re-examine where their critical data resides and encrypt as much of it as they can. They must also use stronger forms of encryption to reduce the chances of their data being decrypted. Continue reading: http://bit.ly/CSOAusPredict 8 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 9. The number of authentication alternatives will increase We accept passwords as a necessary evil, but they are insecure. Consumers want to be identified using more secure, usable means. Continue reading: http://bit.ly/CSOAusPredict 9 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 10. Data security, resilience, availability and recovery; the next step in the consumerization of IT As consumers we do not ensure we have multiple backup sources and can recover from failure or loss of data; or that data is secure and cannot be stolen. This will change. We will begin to take more care of personal data. Continue reading: http://bit.ly/CSOAusPredict 10 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 11. 2013’s Data breaches will tip the scales in favor of spear phishing The volume of data breach in 2013 means criminals know more about us than they ever have. This knowledge will be used in spear phishing. Continue reading: http://bit.ly/CSOAusPredict 11 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 12. CIOs need to be prepared for BYOI The CIO will need to decide if BYOI would reduce or increase their overhead, workload and liability/risk profile Continue reading: http://bit.ly/BizEdgePredict 12 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 13. MSPs will expand into Identity-asa-Service market Identity became a core part of IT and business in 2013 promoting MSPs to respond to the demand. Continue reading: http://bit.ly/CSOAusPredict 13 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 14. Organisations will get serious about their own on-premise private cloud Trust in public cloud providers has decreased. To enjoy the cost and productivity benefits a cloud infrastructure brings while maintaining full control over critical and sensitive data, organizations will deploy a private cloud. Continue reading: http://bit.ly/CSOAusPredict 14 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 15. Learn more about NetIQ at: NetIQ.com 15 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.