SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other
authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied,
distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.
© 2011 Gartner, Inc. and/or its affiliates. All rights reserved.
Earl Perkins
Research VP
May 8, 2013
Top Security Trends and Take-Aways for
2013
@GARTNER_INC
Gartner at a Glance
902
Analysts
13,000
Client
Organizations
290,000
Client
Interactions
Vertical
Coverage
in Nine
Industries
5,500
Benchmarks
10,200
Media
Inquiries
World's
Largest
Community
of CIOs
64
Conferences
74% of
Global 500
1,700
Consulting
Engagements
Clients in
85 Countries
72% of
Fortune 1000
500
Consultants
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other
authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied,
distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.
© 2013 Gartner, Inc. and/or its affiliates. All rights reserved.
Earl Perkins
Research VP
May 8, 2013
Top Security Trends and Take-
Aways for 2013
3
Security and Risk Management and the
Nexus of Forces
Top Trends and Takeaways
Infrastructure Protection
Requirement:
Increased Depth in Two Technology Dimensions
Transport
Internet
Application
Link
WAF
FW
IPS
Host/OS
VA/M
Data
DLP
DAP
HIPS
FW2 FW3FW1 IPS1
Web Zone App Zone Database Zone
VM: Web
VM: ftp
VM: app1
VM: app2
VM: db1
VM: db2
ADC
WAF
DLP
HIPS
VA/M
DAP
Depthofinspection
Depth of application path
The Four Phases of BYOD
Accommodate
Focus: Data
Protection, Cost
• BYO Policies
• Formal Mobile
Support Roles
• MDM
• NAC
• Limited Support
• Extend Existing
Capabilities
Avoid
Don't Ask, Don't Tell
Corporate-Owned
Devices Only
Adopt
Focus: Productivity
• Desktop Virtualization
• Adoption of New
Enterprise-grade
Services
• Enterprise 'App
Stores'
• Self-Service and P2P
Platforms
Assimilate
Realization of the
Personal Cloud
• Context awareness
• Identity-Aware NAC
• Workspace
Aggregators
• 'Walk Up' Services
Managed Diversity —
A Framework for BYOD
Service Levels
User Categories (defined by attributes below)
Managed
Diversity
Matrix
Key Goals
Cost control
Auditable
security
Defined
Responsibilities
A Complex Mobile Device Landscape
Basic media tablet
Premium media tablet
Ultramobile notebook
Mobile PC
Smartphone
Feature phone
Predicted
global mobile
device
shipments
0.0
500 million
1 billion
1.5 billion
2 billion
2.5 billion
3 billion
3.5 billion
2012 2013 2014 2015 2016
6 billion
4 billion
2 billion
0 billion
Predicted
handset
installed
base
Scoping the Mobility Security Problem
The
User
•No security
standards
•Incomplete
management
•Bring your own
device challenges
•Multiple devices
•Travel
distractions
•Uncontrolled
environments
•Exceptions
and surprises
•Business process
rebellion
•User experience
trumps
accountability
•Personal
productivity focus
•Process, data
fragmentation
•Unmanaged,
nonstandard apps
Security Intelligence: Overview
Advanced Security
High Accuracy
Breadth of Coverage
New Capabilities
Optimal Risk and
Business Decisions
Resource Allocation, Prioritization
Based on Contextual Assessments
High
Accuracy
Input
Post-
factum
Long
Term
Manual
Information
Integration and
Correlation
Repositories, Queries,
Contextual Assessments
IT, CISO, Biz Staff
Automated
Technology
Interaction
Scanners, Monitors
Detection, Protection
Software, Hardware
Real
Time
Top Trends and Takeaways
Application Security
Application Security SWOT
Opportunities
• Security intelligence (SI)
• Cloud and SaaS
Threats
• Dual-purpose technologies for all
• Changing nature of attacks
• New languages,
frameworks, platforms
• Hackers' industry
• Extreme openness, collaboration
Strengths
• Some "good enough"
technologies
• Increasing awareness
• Pressure from government,
regulators
Weaknesses
• Users are less mature than tools
• Developers' reluctance
• Misconceptions about:
- Inward-facing applications
- Role of QA
- Network security
Hype Cycle for Application Security, 2012
Technology
Trigger
Peak of
Inflated
Expectations
Trough of
Disillusionment Slope of Enlightenment
Plateau of
Productivity
time
expectations
Plateau will be reached in:
less than 2 years 2 to 5 years 5 to 10 years more than 10 years
obsolete
before plateau
As of July 2012
Mobile Fraud Detection
Runtime Application Self-Protection
Visual Watermarking
Application Shielding
Dynamic Data Masking
Interactive Application Security Testing
Mobile Application Security Testing
Privacy Management Tools
Model-Driven Security (DevOpsSec)
Security Intelligence
Context-Aware Security
Application Security Professional Services
Tokenization
Application Security as a Service
Identity and Access Intelligence
Fraud Detection
Software Composition Analysis
Mobile Data Protection
Application Control
Application-to-Application Password Management Tools
Application Obfuscation
Database Audit and Protection (DAP)
Static Application Security Testing
Static Data Masking
Web Application Firewalls
SIEM
XML Firewalls
Dynamic Application
Security Testing
ERP SOD Controls
Web Access Management
Application Security Road Map
Technology
Trigger
Peak of
Inflated
Expectations
Trough of
Disillusionment Slope of Enlightenment
Plateau of
Productivity
time
expectations
Plateau will be reached in:
less than 2 years 2 to 5 years 5 to 10 years more than 10 years
obsolete
before plateau
As of July 2012
Runtime Application Self-Protection
Dynamic Data Masking
Interactive Application Security Testing
Mobile Application Security Testing
Mobile Data Protection
Application Obfuscation
Database Audit and Protection (DAP)
Static Application Security Testing
Static Data Masking
Web Application Firewalls
Dynamic Application
Security Testing
WAF + IAST  RASP
Top Trends and Takeaways
Risk and Compliance
Program Maturity: ITScore Overview for
Security and Risk Management
Level 1
Initial
Level 2
Developing
Level 3
Defined
Level 4
Managed
Level 5
Optimizing
No visibility
into critical
risks; very
technology -
focused and
reactive
Initiator
such as data
loss or
regulatory
concern
Governance
committees
formed
Control
gaps
closed
(Re-)
Formulate
team to
address
concerns
Policy
development
Formalize
processes and
create process
catalog
Risk
assessments
proactively
executed
Executive-level
reporting
Key risk
indicators
are mapped
into key
performance
indicators
Continuous
assessment
Enterprise-
wide risk-
aware
culture
Assess
current state
Create
charter
No risk and
security policy
Lines of
business
engaged in
addressing
security and
risk issues
Formal
residual
risk sign-
off
Risk fully
integrated with
strategic
business-level
decision making;
governance
driven by
executive
management;
board-level
visibility into and
commitment to
security and risk
management
Operational metrics to benefit
operational efficiency
Executive Decision Makers
IT Operations
• Percentage of YTD spending
of security budget
• Percentage of completion of
annual objectives
• Percentage of confidence of
completing objectives
• Number of new processes
created and implemented
• Project status (major,
per project)
• Percentage completed
• Percentage of confidence
of completion
• Number of compliance
deficiencies, last audit
• Number of remaining open
compliance deficiencies
Effective Communication With Non-IT
Executive Decision Makers
Mapping KRIs and KPIs
Revenue
Loss
Miss
the
Quarter
Leading
Indicator
That…
Leading
Indicator
That…
Leading
Indicator
That…
Critical
Application
Fault
Supply
Chain
Support
Application
Key Risk
Indicator
Open
Incidents
Poor
Patching
Negative
Impact KPI
Supply
Chain
Slows
CRO/CISO CIO The Business
IT GRCM Market Placement In Relation to
the Enterprise GRC Market
19
IT GRCM Dashboards
Executive
Decision
Support
Integrated
IT Risk
Assessment
and
Reporting
IT Policy
Management
and
Reporting
IT Vendor
Risk
Management
IT Internal
Audit
Reporting
EGRC
Finance
GRC
Legal
GRC
Operations
GRC
IT
GRCM
20
From Control-Centric Security
to People-Centric Security
Policy Rules
People
Punishment
Control
Rights Principles
Policy
Responsibilities
People
Monitor
Educate
Top Trends and Takeaways
Identity and Access Management
Requirement:
Access the Enterprise Securely
22
Process Execution
Reliable Infrastructure
Employee
Identity Access
Customer
Citizen
Partner
The Death (and Rebirth) of Identity
Governance
Identity
& Access
Governance
(IAG)
User
Administration
& Provisioning
Identity
Governance &
Administration
(IGA)
Identity
Analytics
& Intelligence
Authorization
Management
(Data & Application)
By the end of 2015, 50% of all new
retail customer identities will be based
on social network identities.
Strategic Planning Assumption
End-2012 End-2015
Cloud Computing Drives IAM Decisions,
Offers New Delivery Options
Workforce
Customers
and
Partners
Administration Intelligence Access
Customer-
Facing
Applications
Enterprise
Applications Outsourced
Enterprise
Applications
SaaS
Partner
Application
Action Plan
Top Security Trends and
Takeaways
Action Plan for Security & Risk Leaders
Monday Morning
- Assess how well the strategic vision of your security & risk
program addresses the Nexus of Forces and specific trends
Next 90 Days
- Educate your IT delivery and executive stakeholders on the
challenges and opportunities of the Nexus of Forces.
- Assess the maturity of the major elements of your risk and security
program and decompose gaps into projects.
- Map key risk indicators into business key performance indicators
and use this to engage the business in risk discussions.
Next 12 Months
- Develop a long-term strategy for continuous improvement.
- Develop and deliver an executive reporting scheme that addresses
the needs of a business audience.
Recommended Gartner Research
 Agenda Overview for Security and Risk Management Leaders, 2013
Carsten Casper | Roberta J. Witty | Paul E. Proctor | Tom Scholtz | John A.
Wheeler (G00238845)
 Agenda Overview for Information Security Technology and Services,
2013
Andrew Walls (G00239321)
 Agenda Overview for Identity and Access Management, 2013
Earl Perkins | Gregg Kreizman (G00245842)
 Define the Structure and Scope for an Effective Information Security
Program
Tom Scholtz (G00238280)
 A Guide to Security and Risk-Related Hype Cycles, 2012
Ray Wagner (G00230394)
For more information, stop by Experience Gartner Research Zone.
29
Events for
Security &
Risk Management
Professionals
Experience live analyst expertise plus much more at a Gartner event
Identity & Access Management Summit
November 18 – 20, Los Angeles, CA
Security & Risk Management Summit
June 10 – 13, National Harbor, MD
July 1 – 2, Tokyo, Japan
August 19 – 20, Sydney, Australia
September 18 – 20, London, U.K.
Catalyst Conference
July 29 – August 1, San Diego, CA
Visit gartner.com/events
• Visit gartner.com/webinars
– Today's presentation is available to download on the Attachment
Tab of our webinar portal or will be available shortly on our
webinar page
– Check out the schedule of upcoming Gartner webinars (plus on-
demand webinars) and don‘t forget to share these resources with
your colleagues
• Contact your Gartner account executive with any additional
questions, comments or for a complimentary copy of today's
presentation
Simple steps for increasing the value
of today's webinar experience
31

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Anton Chuvakin
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del cisoCSA Argentina
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecuritySounil Yu
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionalsCSA Argentina
 

Was ist angesagt? (20)

Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
 

Andere mochten auch

HP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM SolutionHP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM Solutionrickkaun
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)Olesya Shelestova
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security ArchitecturePriyanka Aash
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.Priyanka Aash
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 

Andere mochten auch (6)

HP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM SolutionHP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM Solution
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security Architecture
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 

Ähnlich wie G05.2013 gartner top security trends

Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mrISSA LA
 
Evolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital AgendaEvolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital AgendaSSFIndia1
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...
ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...
ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...DATAVERSITY
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogRaviNeppalli
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps.com
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceIBM Security
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...AgileNetwork
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM
 

Ähnlich wie G05.2013 gartner top security trends (20)

Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
Evolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital AgendaEvolving from Process Excellence to Innovation: Supporting Digital Agenda
Evolving from Process Excellence to Innovation: Supporting Digital Agenda
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...
ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...
ADV Slides: Increasing Artificial Intelligence Success with Master Data Manag...
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Greenplum User Case
Greenplum User Case Greenplum User Case
Greenplum User Case
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 DatadogDDOG 2024 Investor Day.pdf - Q4 2024 Datadog
DDOG 2024 Investor Day.pdf - Q4 2024 Datadog
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
Agile Mumbai 2022 - Balvinder Kaur & Sushant Joshi | Real-Time Insights and A...
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 

Mehr von Satya Harish

Workday-hrtechnologyconferencedebihirshlagflextronics
Workday-hrtechnologyconferencedebihirshlagflextronicsWorkday-hrtechnologyconferencedebihirshlagflextronics
Workday-hrtechnologyconferencedebihirshlagflextronicsSatya Harish
 
WorkDay-surviving and thriving in a world of change
WorkDay-surviving and thriving in a world of changeWorkDay-surviving and thriving in a world of change
WorkDay-surviving and thriving in a world of changeSatya Harish
 
Book scrum tutorial
Book   scrum tutorialBook   scrum tutorial
Book scrum tutorialSatya Harish
 
O - Oracle application testing suite test starter kits for oracle e business ...
O - Oracle application testing suite test starter kits for oracle e business ...O - Oracle application testing suite test starter kits for oracle e business ...
O - Oracle application testing suite test starter kits for oracle e business ...Satya Harish
 
Book HH - SQL MATERIAL
Book   HH - SQL MATERIALBook   HH - SQL MATERIAL
Book HH - SQL MATERIALSatya Harish
 
Book HH- vb2008me preview
Book   HH- vb2008me previewBook   HH- vb2008me preview
Book HH- vb2008me previewSatya Harish
 
Book HH- vb6 preview
Book   HH- vb6 previewBook   HH- vb6 preview
Book HH- vb6 previewSatya Harish
 
G03.2014 Intelligent Business Process Management Suites
G03.2014   Intelligent Business Process Management SuitesG03.2014   Intelligent Business Process Management Suites
G03.2014 Intelligent Business Process Management SuitesSatya Harish
 
G05.2013 Critical Capabilities for SIEM
G05.2013   Critical Capabilities for SIEMG05.2013   Critical Capabilities for SIEM
G05.2013 Critical Capabilities for SIEMSatya Harish
 
G07.2013 Application Security Testing
G07.2013   Application Security TestingG07.2013   Application Security Testing
G07.2013 Application Security TestingSatya Harish
 
G05.2015 Secure Web Gateways
G05.2015   Secure Web GatewaysG05.2015   Secure Web Gateways
G05.2015 Secure Web GatewaysSatya Harish
 
G11.2013 Application Development Life Cycle Management
G11.2013   Application Development Life Cycle ManagementG11.2013   Application Development Life Cycle Management
G11.2013 Application Development Life Cycle ManagementSatya Harish
 
G10.2013 Application Delivery Controllers
G10.2013   Application Delivery ControllersG10.2013   Application Delivery Controllers
G10.2013 Application Delivery ControllersSatya Harish
 
G06.2014 Security Information and Event Management
G06.2014   Security Information and Event ManagementG06.2014   Security Information and Event Management
G06.2014 Security Information and Event ManagementSatya Harish
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event ManagementSatya Harish
 
Gartner HH 2015 - 2005 Hype Cycle
Gartner HH   2015 - 2005 Hype CycleGartner HH   2015 - 2005 Hype Cycle
Gartner HH 2015 - 2005 Hype CycleSatya Harish
 
G05.2015 - Magic quadrant for cloud infrastructure as a service
G05.2015 - Magic quadrant for cloud infrastructure as a serviceG05.2015 - Magic quadrant for cloud infrastructure as a service
G05.2015 - Magic quadrant for cloud infrastructure as a serviceSatya Harish
 
G05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a serviceG05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a serviceSatya Harish
 
PERIODIC TABLE OF SEO SUCCESS FACTOR
PERIODIC TABLE OF SEO SUCCESS FACTORPERIODIC TABLE OF SEO SUCCESS FACTOR
PERIODIC TABLE OF SEO SUCCESS FACTORSatya Harish
 

Mehr von Satya Harish (20)

Workday-hrtechnologyconferencedebihirshlagflextronics
Workday-hrtechnologyconferencedebihirshlagflextronicsWorkday-hrtechnologyconferencedebihirshlagflextronics
Workday-hrtechnologyconferencedebihirshlagflextronics
 
WorkDay-surviving and thriving in a world of change
WorkDay-surviving and thriving in a world of changeWorkDay-surviving and thriving in a world of change
WorkDay-surviving and thriving in a world of change
 
Book scrum tutorial
Book   scrum tutorialBook   scrum tutorial
Book scrum tutorial
 
O - Oracle application testing suite test starter kits for oracle e business ...
O - Oracle application testing suite test starter kits for oracle e business ...O - Oracle application testing suite test starter kits for oracle e business ...
O - Oracle application testing suite test starter kits for oracle e business ...
 
Qualcomm
QualcommQualcomm
Qualcomm
 
Book HH - SQL MATERIAL
Book   HH - SQL MATERIALBook   HH - SQL MATERIAL
Book HH - SQL MATERIAL
 
Book HH- vb2008me preview
Book   HH- vb2008me previewBook   HH- vb2008me preview
Book HH- vb2008me preview
 
Book HH- vb6 preview
Book   HH- vb6 previewBook   HH- vb6 preview
Book HH- vb6 preview
 
G03.2014 Intelligent Business Process Management Suites
G03.2014   Intelligent Business Process Management SuitesG03.2014   Intelligent Business Process Management Suites
G03.2014 Intelligent Business Process Management Suites
 
G05.2013 Critical Capabilities for SIEM
G05.2013   Critical Capabilities for SIEMG05.2013   Critical Capabilities for SIEM
G05.2013 Critical Capabilities for SIEM
 
G07.2013 Application Security Testing
G07.2013   Application Security TestingG07.2013   Application Security Testing
G07.2013 Application Security Testing
 
G05.2015 Secure Web Gateways
G05.2015   Secure Web GatewaysG05.2015   Secure Web Gateways
G05.2015 Secure Web Gateways
 
G11.2013 Application Development Life Cycle Management
G11.2013   Application Development Life Cycle ManagementG11.2013   Application Development Life Cycle Management
G11.2013 Application Development Life Cycle Management
 
G10.2013 Application Delivery Controllers
G10.2013   Application Delivery ControllersG10.2013   Application Delivery Controllers
G10.2013 Application Delivery Controllers
 
G06.2014 Security Information and Event Management
G06.2014   Security Information and Event ManagementG06.2014   Security Information and Event Management
G06.2014 Security Information and Event Management
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
 
Gartner HH 2015 - 2005 Hype Cycle
Gartner HH   2015 - 2005 Hype CycleGartner HH   2015 - 2005 Hype Cycle
Gartner HH 2015 - 2005 Hype Cycle
 
G05.2015 - Magic quadrant for cloud infrastructure as a service
G05.2015 - Magic quadrant for cloud infrastructure as a serviceG05.2015 - Magic quadrant for cloud infrastructure as a service
G05.2015 - Magic quadrant for cloud infrastructure as a service
 
G05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a serviceG05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a service
 
PERIODIC TABLE OF SEO SUCCESS FACTOR
PERIODIC TABLE OF SEO SUCCESS FACTORPERIODIC TABLE OF SEO SUCCESS FACTOR
PERIODIC TABLE OF SEO SUCCESS FACTOR
 

Kürzlich hochgeladen

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 

Kürzlich hochgeladen (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 

G05.2013 gartner top security trends

  • 1. This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Earl Perkins Research VP May 8, 2013 Top Security Trends and Take-Aways for 2013 @GARTNER_INC
  • 2. Gartner at a Glance 902 Analysts 13,000 Client Organizations 290,000 Client Interactions Vertical Coverage in Nine Industries 5,500 Benchmarks 10,200 Media Inquiries World's Largest Community of CIOs 64 Conferences 74% of Global 500 1,700 Consulting Engagements Clients in 85 Countries 72% of Fortune 1000 500 Consultants
  • 3. This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Earl Perkins Research VP May 8, 2013 Top Security Trends and Take- Aways for 2013
  • 4. 3 Security and Risk Management and the Nexus of Forces
  • 5. Top Trends and Takeaways Infrastructure Protection
  • 6. Requirement: Increased Depth in Two Technology Dimensions Transport Internet Application Link WAF FW IPS Host/OS VA/M Data DLP DAP HIPS FW2 FW3FW1 IPS1 Web Zone App Zone Database Zone VM: Web VM: ftp VM: app1 VM: app2 VM: db1 VM: db2 ADC WAF DLP HIPS VA/M DAP Depthofinspection Depth of application path
  • 7. The Four Phases of BYOD Accommodate Focus: Data Protection, Cost • BYO Policies • Formal Mobile Support Roles • MDM • NAC • Limited Support • Extend Existing Capabilities Avoid Don't Ask, Don't Tell Corporate-Owned Devices Only Adopt Focus: Productivity • Desktop Virtualization • Adoption of New Enterprise-grade Services • Enterprise 'App Stores' • Self-Service and P2P Platforms Assimilate Realization of the Personal Cloud • Context awareness • Identity-Aware NAC • Workspace Aggregators • 'Walk Up' Services
  • 8. Managed Diversity — A Framework for BYOD Service Levels User Categories (defined by attributes below) Managed Diversity Matrix Key Goals Cost control Auditable security Defined Responsibilities
  • 9. A Complex Mobile Device Landscape Basic media tablet Premium media tablet Ultramobile notebook Mobile PC Smartphone Feature phone Predicted global mobile device shipments 0.0 500 million 1 billion 1.5 billion 2 billion 2.5 billion 3 billion 3.5 billion 2012 2013 2014 2015 2016 6 billion 4 billion 2 billion 0 billion Predicted handset installed base
  • 10. Scoping the Mobility Security Problem The User •No security standards •Incomplete management •Bring your own device challenges •Multiple devices •Travel distractions •Uncontrolled environments •Exceptions and surprises •Business process rebellion •User experience trumps accountability •Personal productivity focus •Process, data fragmentation •Unmanaged, nonstandard apps
  • 11. Security Intelligence: Overview Advanced Security High Accuracy Breadth of Coverage New Capabilities Optimal Risk and Business Decisions Resource Allocation, Prioritization Based on Contextual Assessments High Accuracy Input Post- factum Long Term Manual Information Integration and Correlation Repositories, Queries, Contextual Assessments IT, CISO, Biz Staff Automated Technology Interaction Scanners, Monitors Detection, Protection Software, Hardware Real Time
  • 12. Top Trends and Takeaways Application Security
  • 13. Application Security SWOT Opportunities • Security intelligence (SI) • Cloud and SaaS Threats • Dual-purpose technologies for all • Changing nature of attacks • New languages, frameworks, platforms • Hackers' industry • Extreme openness, collaboration Strengths • Some "good enough" technologies • Increasing awareness • Pressure from government, regulators Weaknesses • Users are less mature than tools • Developers' reluctance • Misconceptions about: - Inward-facing applications - Role of QA - Network security
  • 14. Hype Cycle for Application Security, 2012 Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity time expectations Plateau will be reached in: less than 2 years 2 to 5 years 5 to 10 years more than 10 years obsolete before plateau As of July 2012 Mobile Fraud Detection Runtime Application Self-Protection Visual Watermarking Application Shielding Dynamic Data Masking Interactive Application Security Testing Mobile Application Security Testing Privacy Management Tools Model-Driven Security (DevOpsSec) Security Intelligence Context-Aware Security Application Security Professional Services Tokenization Application Security as a Service Identity and Access Intelligence Fraud Detection Software Composition Analysis Mobile Data Protection Application Control Application-to-Application Password Management Tools Application Obfuscation Database Audit and Protection (DAP) Static Application Security Testing Static Data Masking Web Application Firewalls SIEM XML Firewalls Dynamic Application Security Testing ERP SOD Controls Web Access Management
  • 15. Application Security Road Map Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity time expectations Plateau will be reached in: less than 2 years 2 to 5 years 5 to 10 years more than 10 years obsolete before plateau As of July 2012 Runtime Application Self-Protection Dynamic Data Masking Interactive Application Security Testing Mobile Application Security Testing Mobile Data Protection Application Obfuscation Database Audit and Protection (DAP) Static Application Security Testing Static Data Masking Web Application Firewalls Dynamic Application Security Testing WAF + IAST  RASP
  • 16. Top Trends and Takeaways Risk and Compliance
  • 17. Program Maturity: ITScore Overview for Security and Risk Management Level 1 Initial Level 2 Developing Level 3 Defined Level 4 Managed Level 5 Optimizing No visibility into critical risks; very technology - focused and reactive Initiator such as data loss or regulatory concern Governance committees formed Control gaps closed (Re-) Formulate team to address concerns Policy development Formalize processes and create process catalog Risk assessments proactively executed Executive-level reporting Key risk indicators are mapped into key performance indicators Continuous assessment Enterprise- wide risk- aware culture Assess current state Create charter No risk and security policy Lines of business engaged in addressing security and risk issues Formal residual risk sign- off Risk fully integrated with strategic business-level decision making; governance driven by executive management; board-level visibility into and commitment to security and risk management
  • 18. Operational metrics to benefit operational efficiency Executive Decision Makers IT Operations • Percentage of YTD spending of security budget • Percentage of completion of annual objectives • Percentage of confidence of completing objectives • Number of new processes created and implemented • Project status (major, per project) • Percentage completed • Percentage of confidence of completion • Number of compliance deficiencies, last audit • Number of remaining open compliance deficiencies Effective Communication With Non-IT Executive Decision Makers
  • 19. Mapping KRIs and KPIs Revenue Loss Miss the Quarter Leading Indicator That… Leading Indicator That… Leading Indicator That… Critical Application Fault Supply Chain Support Application Key Risk Indicator Open Incidents Poor Patching Negative Impact KPI Supply Chain Slows CRO/CISO CIO The Business
  • 20. IT GRCM Market Placement In Relation to the Enterprise GRC Market 19 IT GRCM Dashboards Executive Decision Support Integrated IT Risk Assessment and Reporting IT Policy Management and Reporting IT Vendor Risk Management IT Internal Audit Reporting EGRC Finance GRC Legal GRC Operations GRC IT GRCM
  • 21. 20 From Control-Centric Security to People-Centric Security Policy Rules People Punishment Control Rights Principles Policy Responsibilities People Monitor Educate
  • 22. Top Trends and Takeaways Identity and Access Management
  • 23. Requirement: Access the Enterprise Securely 22 Process Execution Reliable Infrastructure Employee Identity Access Customer Citizen Partner
  • 24. The Death (and Rebirth) of Identity Governance Identity & Access Governance (IAG) User Administration & Provisioning Identity Governance & Administration (IGA) Identity Analytics & Intelligence Authorization Management (Data & Application)
  • 25. By the end of 2015, 50% of all new retail customer identities will be based on social network identities. Strategic Planning Assumption End-2012 End-2015
  • 26. Cloud Computing Drives IAM Decisions, Offers New Delivery Options Workforce Customers and Partners Administration Intelligence Access Customer- Facing Applications Enterprise Applications Outsourced Enterprise Applications SaaS Partner Application
  • 27. Action Plan Top Security Trends and Takeaways
  • 28. Action Plan for Security & Risk Leaders Monday Morning - Assess how well the strategic vision of your security & risk program addresses the Nexus of Forces and specific trends Next 90 Days - Educate your IT delivery and executive stakeholders on the challenges and opportunities of the Nexus of Forces. - Assess the maturity of the major elements of your risk and security program and decompose gaps into projects. - Map key risk indicators into business key performance indicators and use this to engage the business in risk discussions. Next 12 Months - Develop a long-term strategy for continuous improvement. - Develop and deliver an executive reporting scheme that addresses the needs of a business audience.
  • 29. Recommended Gartner Research  Agenda Overview for Security and Risk Management Leaders, 2013 Carsten Casper | Roberta J. Witty | Paul E. Proctor | Tom Scholtz | John A. Wheeler (G00238845)  Agenda Overview for Information Security Technology and Services, 2013 Andrew Walls (G00239321)  Agenda Overview for Identity and Access Management, 2013 Earl Perkins | Gregg Kreizman (G00245842)  Define the Structure and Scope for an Effective Information Security Program Tom Scholtz (G00238280)  A Guide to Security and Risk-Related Hype Cycles, 2012 Ray Wagner (G00230394) For more information, stop by Experience Gartner Research Zone.
  • 30. 29 Events for Security & Risk Management Professionals Experience live analyst expertise plus much more at a Gartner event Identity & Access Management Summit November 18 – 20, Los Angeles, CA Security & Risk Management Summit June 10 – 13, National Harbor, MD July 1 – 2, Tokyo, Japan August 19 – 20, Sydney, Australia September 18 – 20, London, U.K. Catalyst Conference July 29 – August 1, San Diego, CA Visit gartner.com/events
  • 31.
  • 32. • Visit gartner.com/webinars – Today's presentation is available to download on the Attachment Tab of our webinar portal or will be available shortly on our webinar page – Check out the schedule of upcoming Gartner webinars (plus on- demand webinars) and don‘t forget to share these resources with your colleagues • Contact your Gartner account executive with any additional questions, comments or for a complimentary copy of today's presentation Simple steps for increasing the value of today's webinar experience 31