SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Information security




Revolution or evolution?
Information Security 2020: Executive Summary




                                               Prepared by

                                               pwc
Revolution or evolution?




  About the Technology Strategy Board                                 About PricewaterhouseCoopers LLP
  The Technology Strategy Board is a business-led executive non-      PricewaterhouseCoopers LLP provides industry-focused assurance,
  departmental public body, established by the Government. Its role   tax and advisory services to build public trust and enhance value for
  is to promote and support research into, and development and        our clients and their stakeholders. More than 163,000 people in 151
  exploitation of, technology and innovation for the benefit of UK    countries across our network share their thinking, experience and
  business, in order to increase economic growth and improve          solutions to develop fresh perspectives and practical advice.
  quality of life.
Revolution or evolution?




About this roadmap
This roadmap was commissioned by the Technology Strategy Board and jointly
prepared with PricewaterhouseCoopers LLP (UK).

The purpose of this roadmap is to set         We subsequently held a workshop with      Chatham House, Cisco, Credit Suisse,
out the drivers that will shape the future    over 40 experts to validate the trends    Cyveillance, De Montfort University,
Information Security environment to           and explore them in further detail.       Digital Systems Knowledge Transfer
2020 and beyond. This roadmap is to                                                     Network, European Information Society
                                              The research focuses on the commercial
inform business leaders and security                                                    Group, Garlik, Hewlett Packard, IBM,
                                              aspects of Information Security, but
professionals alike, and sets out potential                                             IdenTrust, Information Commissioner’s
                                              remains cognisant of trends in cyber                                               1
future scenarios and issues around                                                      Office, Information Security Forum,
                                              security and warfare for military and
information security, allowing the reader                                               Kaspersky Lab, Lloyd’s of London,
                                              intelligence applications. Our research
to draw implications and conclusions that                                               McAfee, Methods Consulting, National
                                              primarily illustrates trends in the UK
apply to them.                                                                          Grid, Ministry of Defence, Nokia,
                                              Information Security market, but the
                                                                                        Office of Cyber Security, Oracle,
In preparing this roadmap we interviewed      implications are relevant globally.
                                                                                        PGP Encryption, QinetiQ, Queens
over 35 leading Information Security
                                              We would like to thank the following      University, Royal Holloway University,
experts and business leaders across the
                                              organisations for their participation     RSA, Security Innovation & Technology
private sector, academia and government
                                              in the research: AstraZeneca, BBC,        Consortium, Skype, Symantec,
to determine the key trends that are likely
                                              Birmingham University, British            Technology Strategy Board, Travelex,
to impact Information Security to 2020.
                                              Business Federation Authority, BT,        Trend Micro, as well as several others
                                                                                        who would prefer to remain anonymous.
Revolution or evolution?




Executive summary
  2

Information Security is a much broader concept than technology. It relates to
protecting information and information systems from unauthorised access, use,
disclosure, disruption, modification or destruction. As the volume of information
grows and continues to be increasingly stored and communicated in electronic
form, Information Security is rapidly becoming intertwined with technology, and
more specifically, the internet. This has given rise to the term Cyber Security and
for it to be used interchangeably with Information Security.

This roadmap is for business leaders and security professionals alike, and sets
out potential future scenarios and issues around Information Security, allowing the
reader to draw implications and conclusions that apply to them.
Revolution or evolution?
                           3




                               Information Security, whilst being a         globalisation, climate change, regulation   has been a key aspect of Information
                               very current and topical issue, is also      and evolving demographics. These            Security in recent years, but increasingly,
                               an emerging sector that is undergoing        will present opportunities and risks for    organisations are realising that processes
                               significant change. The main suppliers       organisations in dealing with Information   and people are overlooked components
                               shaping the Information Security industry    Security issues, and also companies         when developing holistic approaches
                               are a converging group of technology         providing Information Security products     to Information Security. By 2020, there
                               vendors, system integrators, consultants     and services. There is likely to be a       may be a reversion to technology being
                               and aerospace & defence companies.           greater degree of segmentation within the   the key strand to Information Security,
                               The available market research does not       Information Security market in the future   driven by significant increases in the
                               provide a consensus on the size of the       as suppliers specialise to meet the needs   volume of data, speed of processing
                               IT security market, the best proxy for the   of specific groups. For example, the        and communication technology, and
                               Information Security market. The range       rising importance of Information Security   the emergence of more complex and
                               of market research suggests that the IT      in the healthcare sector as services are    automated threats.
                               security market is worth approximately       increasingly provided electronically is
                               £4-5bn per year in the UK and is             likely to drive specific regulatory and
                               growing strongly.                            technology requirements.

                               Over the next decade, Information            Information Security is often considered
                               Security requirements will be driven by      to have three components; technology,
                               various macro level factors, such as         processes and people. Technology
Revolution or evolution?




                           4


                               The research identified seven interrelated   networks are enabling faster static and     Regulation and standards will be
                               key trends that are likely to drive change   mobile broadband access. By 2020,           important drivers of Information Security
                               in Information Security through to 2020      ubiquitous devices will seamlessly and      over the next decade, but will need to
                               and beyond – see diagram overleaf.           automatically interact with other devices   keep pace and evolve as technology and
                               The first three trends relate to changes     around them, adapting functionality to      its uses develop. There is likely to be
                               in technology, whilst the following three    their local environment and other objects   increasing pressure towards regulation
                               trends reflect changing patterns in how      in their proximity.                         in information security, with privacy and
                               people use technology and the internet.                                                  consent being a key driver.
                                                                            The volume of private information being
                               Finally, trust and identity are universal
                                                                            shared has escalated significantly over     Proving identity and establishing trust are
                               themes which are intertwined with many
                                                                            the last decade, particularly driven by     two of the greatest challenges identified
                               of the prior trends. These trends have
                                                                            social networking, and this is likely to    in the research. In 2020 as people
                               implications for organisations of all
                                                                            continue. Additionally, the volume and      spend an increasing proportion of their
                               sizes, individuals, governments and the
                                                                            value of transactions through electronic    time online, identity becomes a greater
                               Information Security industry.
                                                                            channels is expected to continue to rise.   challenge because fewer interactions
                               The building blocks of modern                These trends suggest that cyber criminals   will be face-to-face, a greater volume
                               communication technology are rapidly         will increasingly be willing to invest      of private information may be available
                               evolving and we see this change all          further resources in developing more        online and new technologies could make
                               around us. Televisions are blurring          sophisticated attacks.                      it easier to impersonate individuals.
                               with computers, feature rich mobile
                               devices are becoming more prevalent
                               and fibre optic cables and wireless
5
    Revolution or evolution?
                                           Key trends impacting Information Security to 2020
                                                                    •	   Increase in penetration of high speed broadband and wireless networks
                                                                    •	   Centralisation of computing resources and widespread adoption of cloud computing


                                           1
                                                                    •	   Proliferation of IP (internet protocol) connected devices and growth in functionality
                                               Infrastructure
                                                                    •	   Improved global ICT (Information and Communications Technology) infrastructure enabling greater outsourcing
                                               revolution           •	   Device convergence and increasing modularisation of software components
                                                                    •	   Blurring work/personal life divide and ‘Bring Your Own’ approach to enterprise IT
                                                                    •	   Evolution in user interfaces and emergence of potentially disruptive technologies

                                                                    •	   Greater sharing of sensitive data between organisations and individuals



                                           2
                                                                    •	   A significant increase in visual data
                                                                    •	   More people connected globally
                                               Data explosion
                                                                    •	   Greater automated traffic from devices
    Key longer term drivers                                         •	   A multiplication of devices and applications generating traffic
                                                                    •	   A greater need for the classification of data

      Globalisation


                                           3
                                               An always-on,        •	   Greater connectivity between people driven by social networking and other platforms
                                                                    •	   Increasingly seamless connectivity between devices
                                               always-connected
      Increased focus on climate change                             •	   Increasing information connectivity and data mining
                                               world                •	   Increased Critical National Infrastructure and public services connectivity

      Shifting global economic centres



                                           4
                                                                    •	   Rising levels of electronic and mobile commerce and banking
      Changing demographics                    Future               •	   Development of new banking models
                                               finance              •	   Growth in new payment models
                                                                    •	   Emergence of digital cash
      Increasing regulation / governance

      Increasing reliance on technology

                                           5
                                               Tougher              •	 Increasing regulation relating to privacy
      and information                          regulation
                                                                    •	 Increasing standards on Information Security
                                                                    •	 Globalisation and net neutrality as opposing forces to regulation and standardisation
                                               and standards
      Changing attitudes towards privacy


      Evolving work / home balance                                  •	   Greater censorship



                                           6
                                                                    •	   Political motivations driving new state/regional internets
                                               Multiple internets   •	   New and more secure internets
                                                                    •	   Closed social networks
                                                                    •	   Growth in paid content




                                           7
                                               New identity         •	 The effectiveness of current identity concepts continues to decline
                                               and trust            •	 Identity becomes increasingly important in the move from perimeter to information based security
                                               models               •	 New models of trust develop for people, infrastructure, including devices, and data
Revolution or evolution?
6




                               The research indicated that there is         effective Information Security in place     the organisation in the form of increased
                               a need for a proactive approach to           could increasingly attract consumers to     spending on Information Security
                               Information Security from all stakeholders   use their products/services. Information    solutions, loss of intellectual property,
                               given the rising complexity and volume       Security could also provide opportunities   loss of market share and hence income,
                               of threats.                                  to sell products/services through new       and damage to its brand.
                                                                            channels or interact with customers in
                               Organisations should ensure that                                                         In the second scenario, the organisation
                                                                            new ways that are not possible today due
                               approaches to Information Security                                                       takes a more proactive approach
                                                                            to concerns about privacy and consent.
                               are holistic and consider technology,                                                    to Information Security. It invests in
                               processes and people. Approaches need        Organisations need to consider both         Information Security solutions and
                               to adapt to rapidly changing threats         the potential benefits and costs of         benefits from greater trust from its
                               and technology, and also to changes in       their approach to Information Security      customers and gains in market share,
                               regulations and standards. However, it is    with a holistic approach like the ‘Total    higher price points relative to its peers
                               important that organisations also focus      Lifecycle Cost of Information Security’     and agility in adapting its Information
                               on aspects of Information Security that      model shown overleaf. This illustration     Security approach to market changes.
                               are not necessarily driven by regulation     demonstrates the potential long term
                                                                                                                        In this example, the organisation could
                               and standards, for example, protecting       impact of two different approaches to
                                                                                                                        be replaced with an industry, country or
                               commercially sensitive information or        Information Security.
                                                                                                                        even a region.
                               intellectual property.
                                                                            In the first scenario, the organisation
                               Increasing focus on Information              does not have an appropriate approach
                               Security could also provide competitive      to Information Security. It then suffers
                               advantage. Organisations that have           from an ‘event’ which causes cost to
Revolution or evolution?




                                                                                             7


                                                                                                                                                                                                                           There are many uncertainties with respect
  Figure 1: The cost of inaction – two illustrative scenarios for an organisation’s approach to Information Security
                                                                                                                                                                                                                           to how Information Security will evolve
                                                                                                                                                                                                                           over the next decade. However, it is
              Total Lifecycle Cost of Information Security




                                                                                                                                                                                                                           certain that new Information Security
                                                                                                                                                                                                                           requirements will require businesses to
                                                                                                                                                                                     ‘Reactive’ approach
                                                                                                                                                                                                                           innovate to develop new products and
                                                                                                                                                                                                                           services. This will provide opportunities
                                                                                                                                                Cost of inaction                                                           both for businesses, to develop new
                                                                                                                                                                                    ‘Proactive’ approach                   business models and generate competitive
                                                                                                                                                                                                                           advantage and for financial investors alike.
                                                                                                                                                                                                                           It will also stimulate economic growth
                                                                                                                                                                                                                           through consumption and exports, and
                                                                                                                                                                                                                           make the UK a safer place to do business.
                                                                                Key event
                                                                                                                                                                                                                           Are you up to the challenge?

                                                             2010         2011          2012           2013             2014           2015     2016             2017       2018            2019         2020



 Definition                                                                                 Lifecycle costs
                                                              Total Lifecycle Cost of       of deploying and            Reputational            Intellectual             Operational                 Financial impact
                                                              Information Security      =   operating security      +   value               +   Property value       +   effectiveness           +   of incidents
                                                                                            solutions

                                                                                            •	 Hardware /                •	 Brand volume        •	 R&D information       •	 Productivity             •	 Direct financial
                                                                                               software solutions        •	 Customer            •	 Customer              •	 Ability to service          loss from attack
                                                                                            •	 Training                     satisfaction/          databases                customers
                                                                                            •	 Consultancy costs            confidence          •	 Competitive           •	 Cost to serve
                                                                                            •	 People costs                                        information              customers
For further information about this roadmap contact:


Andrew Tyrer                                                                                                                                            Neil Hampson
Leader, Network Security Innovation Platform                                                                                                            Partner, Strategy
Technology Strategy Board                                                                                                                               PricewaterhouseCoopers LLP (UK)

andrew.tyrer@tsb.gov.uk                                                                                                                                 neil.r.hampson@uk.pwc.com




Paul Lewis                                                                                                                                              Barry Jaber
Lead Technologist, Network Security Innovation Platform                                                                                                 Assistant Director, Strategy
Technology Strategy Board                                                                                                                               PricewaterhouseCoopers LLP (UK)

paul.lewis@tsb.gov.uk                                                                                                                                   barry.n.jaber@uk.pwc.com




                                                                                                                                                        William Beer
                                                                                                                                                        Director, OneSecurity
                                                                                                                                                        PricewaterhouseCoopers LLP (UK)

                                                                                                                                                        william.m.beer@uk.pwc.com




We would also like to acknowledge the contribution of Greg Bacon (PwC), Jason Creasey (ISF) and Andrew Wilson (PwC).




For information on the Technology Strategy Board: www.innovateuk.org

For information on PricewaterhouseCoopers LLP: www.pwc.co.uk
This report has been prepared by the Technology Strategy Board together with PricewaterhouseCoopers LLP, UK (“PwC”) for Technology Strategy Board under the terms of the engagement contract with PwC dated 31st March 2010 (the “Engagement”). This report is for general guidance on
matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this report without obtaining specific professional advice.
This report contains information obtained or derived from a variety of sources (as indicated within the report). PwC has not sought to establish the reliability of those sources or verified the information so provided. Accordingly no representation or warranty of any kind (whether express or
implied) is given by PwC to any person (except to the Technology Strategy Board under the relevant terms of the Engagement) as to the accuracy or completeness of the information in this report.
PwC accepts no duty of care to any person (except to the Technology Strategy Board under the relevant terms of the Engagement) for the preparation of the report. Accordingly, regardless of the form of action, whether in contract, tort or otherwise, and to the extent permitted by applicable
law, PwC accepts no liability of any kind and disclaims all responsibility for the consequences of any person (other than the Technology Strategy Board on the above basis) acting or refraining to act in reliance on the report or any information contained in the report or for any decisions made or
not made which are based upon this report or information therein.
The quotes in this report reflect the views of the individuals and are not necessarily the views of their organisations.
© Technology Strategy Board, 2010. Publication: T10/037

Weitere ähnliche Inhalte

Was ist angesagt?

The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalEdi Suryadi
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3NTT Innovation Institute Inc.
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Booz Allen Hamilton
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 

Was ist angesagt? (15)

The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 

Andere mochten auch

The Evolution of Information Architecture
The Evolution of Information ArchitectureThe Evolution of Information Architecture
The Evolution of Information ArchitectureOASIS DITA Adoption TC
 
Circumventricular Organs - Succinct Presentation - Sanjoy Sanyal
Circumventricular Organs - Succinct Presentation - Sanjoy SanyalCircumventricular Organs - Succinct Presentation - Sanjoy Sanyal
Circumventricular Organs - Succinct Presentation - Sanjoy SanyalSanjoy Sanyal
 
Evolution, Information at the speed of thought
Evolution, Information at the speed of thoughtEvolution, Information at the speed of thought
Evolution, Information at the speed of thoughtVivek Mehra
 
Brain Evolution Information Explosion - Sanjoy Sanyal
Brain Evolution Information Explosion - Sanjoy SanyalBrain Evolution Information Explosion - Sanjoy Sanyal
Brain Evolution Information Explosion - Sanjoy SanyalSanjoy Sanyal
 
Information, Evolution, and Utility (Samuelson & Swinkels, 2006)
Information, Evolution, and Utility (Samuelson & Swinkels, 2006) Information, Evolution, and Utility (Samuelson & Swinkels, 2006)
Information, Evolution, and Utility (Samuelson & Swinkels, 2006) Paul Cohen
 
Origins - Evolution and information
Origins - Evolution and informationOrigins - Evolution and information
Origins - Evolution and informationRobin Schumacher
 

Andere mochten auch (7)

The Evolution of Information Architecture
The Evolution of Information ArchitectureThe Evolution of Information Architecture
The Evolution of Information Architecture
 
Circumventricular Organs - Succinct Presentation - Sanjoy Sanyal
Circumventricular Organs - Succinct Presentation - Sanjoy SanyalCircumventricular Organs - Succinct Presentation - Sanjoy Sanyal
Circumventricular Organs - Succinct Presentation - Sanjoy Sanyal
 
Evolution, Information at the speed of thought
Evolution, Information at the speed of thoughtEvolution, Information at the speed of thought
Evolution, Information at the speed of thought
 
Brain Evolution Information Explosion - Sanjoy Sanyal
Brain Evolution Information Explosion - Sanjoy SanyalBrain Evolution Information Explosion - Sanjoy Sanyal
Brain Evolution Information Explosion - Sanjoy Sanyal
 
Information, Evolution, and Utility (Samuelson & Swinkels, 2006)
Information, Evolution, and Utility (Samuelson & Swinkels, 2006) Information, Evolution, and Utility (Samuelson & Swinkels, 2006)
Information, Evolution, and Utility (Samuelson & Swinkels, 2006)
 
Origins - Evolution and information
Origins - Evolution and informationOrigins - Evolution and information
Origins - Evolution and information
 
Evolution of information in academic libraries (VIANA, 2015)
Evolution of information in academic libraries (VIANA, 2015)Evolution of information in academic libraries (VIANA, 2015)
Evolution of information in academic libraries (VIANA, 2015)
 

Ähnlich wie Information Security 2020: Revolution or Evolution in 40 Characters

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldforumdavignon
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportRamona Kohrs
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfCIO Look Magazine
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...greendigital
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 

Ähnlich wie Information Security 2020: Revolution or Evolution in 40 Characters (20)

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
 
188
188188
188
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 

Information Security 2020: Revolution or Evolution in 40 Characters

  • 1. Information security Revolution or evolution? Information Security 2020: Executive Summary Prepared by pwc
  • 2. Revolution or evolution? About the Technology Strategy Board About PricewaterhouseCoopers LLP The Technology Strategy Board is a business-led executive non- PricewaterhouseCoopers LLP provides industry-focused assurance, departmental public body, established by the Government. Its role tax and advisory services to build public trust and enhance value for is to promote and support research into, and development and our clients and their stakeholders. More than 163,000 people in 151 exploitation of, technology and innovation for the benefit of UK countries across our network share their thinking, experience and business, in order to increase economic growth and improve solutions to develop fresh perspectives and practical advice. quality of life.
  • 3. Revolution or evolution? About this roadmap This roadmap was commissioned by the Technology Strategy Board and jointly prepared with PricewaterhouseCoopers LLP (UK). The purpose of this roadmap is to set We subsequently held a workshop with Chatham House, Cisco, Credit Suisse, out the drivers that will shape the future over 40 experts to validate the trends Cyveillance, De Montfort University, Information Security environment to and explore them in further detail. Digital Systems Knowledge Transfer 2020 and beyond. This roadmap is to Network, European Information Society The research focuses on the commercial inform business leaders and security Group, Garlik, Hewlett Packard, IBM, aspects of Information Security, but professionals alike, and sets out potential IdenTrust, Information Commissioner’s remains cognisant of trends in cyber 1 future scenarios and issues around Office, Information Security Forum, security and warfare for military and information security, allowing the reader Kaspersky Lab, Lloyd’s of London, intelligence applications. Our research to draw implications and conclusions that McAfee, Methods Consulting, National primarily illustrates trends in the UK apply to them. Grid, Ministry of Defence, Nokia, Information Security market, but the Office of Cyber Security, Oracle, In preparing this roadmap we interviewed implications are relevant globally. PGP Encryption, QinetiQ, Queens over 35 leading Information Security We would like to thank the following University, Royal Holloway University, experts and business leaders across the organisations for their participation RSA, Security Innovation & Technology private sector, academia and government in the research: AstraZeneca, BBC, Consortium, Skype, Symantec, to determine the key trends that are likely Birmingham University, British Technology Strategy Board, Travelex, to impact Information Security to 2020. Business Federation Authority, BT, Trend Micro, as well as several others who would prefer to remain anonymous.
  • 4. Revolution or evolution? Executive summary 2 Information Security is a much broader concept than technology. It relates to protecting information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction. As the volume of information grows and continues to be increasingly stored and communicated in electronic form, Information Security is rapidly becoming intertwined with technology, and more specifically, the internet. This has given rise to the term Cyber Security and for it to be used interchangeably with Information Security. This roadmap is for business leaders and security professionals alike, and sets out potential future scenarios and issues around Information Security, allowing the reader to draw implications and conclusions that apply to them.
  • 5. Revolution or evolution? 3 Information Security, whilst being a globalisation, climate change, regulation has been a key aspect of Information very current and topical issue, is also and evolving demographics. These Security in recent years, but increasingly, an emerging sector that is undergoing will present opportunities and risks for organisations are realising that processes significant change. The main suppliers organisations in dealing with Information and people are overlooked components shaping the Information Security industry Security issues, and also companies when developing holistic approaches are a converging group of technology providing Information Security products to Information Security. By 2020, there vendors, system integrators, consultants and services. There is likely to be a may be a reversion to technology being and aerospace & defence companies. greater degree of segmentation within the the key strand to Information Security, The available market research does not Information Security market in the future driven by significant increases in the provide a consensus on the size of the as suppliers specialise to meet the needs volume of data, speed of processing IT security market, the best proxy for the of specific groups. For example, the and communication technology, and Information Security market. The range rising importance of Information Security the emergence of more complex and of market research suggests that the IT in the healthcare sector as services are automated threats. security market is worth approximately increasingly provided electronically is £4-5bn per year in the UK and is likely to drive specific regulatory and growing strongly. technology requirements. Over the next decade, Information Information Security is often considered Security requirements will be driven by to have three components; technology, various macro level factors, such as processes and people. Technology
  • 6. Revolution or evolution? 4 The research identified seven interrelated networks are enabling faster static and Regulation and standards will be key trends that are likely to drive change mobile broadband access. By 2020, important drivers of Information Security in Information Security through to 2020 ubiquitous devices will seamlessly and over the next decade, but will need to and beyond – see diagram overleaf. automatically interact with other devices keep pace and evolve as technology and The first three trends relate to changes around them, adapting functionality to its uses develop. There is likely to be in technology, whilst the following three their local environment and other objects increasing pressure towards regulation trends reflect changing patterns in how in their proximity. in information security, with privacy and people use technology and the internet. consent being a key driver. The volume of private information being Finally, trust and identity are universal shared has escalated significantly over Proving identity and establishing trust are themes which are intertwined with many the last decade, particularly driven by two of the greatest challenges identified of the prior trends. These trends have social networking, and this is likely to in the research. In 2020 as people implications for organisations of all continue. Additionally, the volume and spend an increasing proportion of their sizes, individuals, governments and the value of transactions through electronic time online, identity becomes a greater Information Security industry. channels is expected to continue to rise. challenge because fewer interactions The building blocks of modern These trends suggest that cyber criminals will be face-to-face, a greater volume communication technology are rapidly will increasingly be willing to invest of private information may be available evolving and we see this change all further resources in developing more online and new technologies could make around us. Televisions are blurring sophisticated attacks. it easier to impersonate individuals. with computers, feature rich mobile devices are becoming more prevalent and fibre optic cables and wireless
  • 7. 5 Revolution or evolution? Key trends impacting Information Security to 2020 • Increase in penetration of high speed broadband and wireless networks • Centralisation of computing resources and widespread adoption of cloud computing 1 • Proliferation of IP (internet protocol) connected devices and growth in functionality Infrastructure • Improved global ICT (Information and Communications Technology) infrastructure enabling greater outsourcing revolution • Device convergence and increasing modularisation of software components • Blurring work/personal life divide and ‘Bring Your Own’ approach to enterprise IT • Evolution in user interfaces and emergence of potentially disruptive technologies • Greater sharing of sensitive data between organisations and individuals 2 • A significant increase in visual data • More people connected globally Data explosion • Greater automated traffic from devices Key longer term drivers • A multiplication of devices and applications generating traffic • A greater need for the classification of data Globalisation 3 An always-on, • Greater connectivity between people driven by social networking and other platforms • Increasingly seamless connectivity between devices always-connected Increased focus on climate change • Increasing information connectivity and data mining world • Increased Critical National Infrastructure and public services connectivity Shifting global economic centres 4 • Rising levels of electronic and mobile commerce and banking Changing demographics Future • Development of new banking models finance • Growth in new payment models • Emergence of digital cash Increasing regulation / governance Increasing reliance on technology 5 Tougher • Increasing regulation relating to privacy and information regulation • Increasing standards on Information Security • Globalisation and net neutrality as opposing forces to regulation and standardisation and standards Changing attitudes towards privacy Evolving work / home balance • Greater censorship 6 • Political motivations driving new state/regional internets Multiple internets • New and more secure internets • Closed social networks • Growth in paid content 7 New identity • The effectiveness of current identity concepts continues to decline and trust • Identity becomes increasingly important in the move from perimeter to information based security models • New models of trust develop for people, infrastructure, including devices, and data
  • 8. Revolution or evolution? 6 The research indicated that there is effective Information Security in place the organisation in the form of increased a need for a proactive approach to could increasingly attract consumers to spending on Information Security Information Security from all stakeholders use their products/services. Information solutions, loss of intellectual property, given the rising complexity and volume Security could also provide opportunities loss of market share and hence income, of threats. to sell products/services through new and damage to its brand. channels or interact with customers in Organisations should ensure that In the second scenario, the organisation new ways that are not possible today due approaches to Information Security takes a more proactive approach to concerns about privacy and consent. are holistic and consider technology, to Information Security. It invests in processes and people. Approaches need Organisations need to consider both Information Security solutions and to adapt to rapidly changing threats the potential benefits and costs of benefits from greater trust from its and technology, and also to changes in their approach to Information Security customers and gains in market share, regulations and standards. However, it is with a holistic approach like the ‘Total higher price points relative to its peers important that organisations also focus Lifecycle Cost of Information Security’ and agility in adapting its Information on aspects of Information Security that model shown overleaf. This illustration Security approach to market changes. are not necessarily driven by regulation demonstrates the potential long term In this example, the organisation could and standards, for example, protecting impact of two different approaches to be replaced with an industry, country or commercially sensitive information or Information Security. even a region. intellectual property. In the first scenario, the organisation Increasing focus on Information does not have an appropriate approach Security could also provide competitive to Information Security. It then suffers advantage. Organisations that have from an ‘event’ which causes cost to
  • 9. Revolution or evolution? 7 There are many uncertainties with respect Figure 1: The cost of inaction – two illustrative scenarios for an organisation’s approach to Information Security to how Information Security will evolve over the next decade. However, it is Total Lifecycle Cost of Information Security certain that new Information Security requirements will require businesses to ‘Reactive’ approach innovate to develop new products and services. This will provide opportunities Cost of inaction both for businesses, to develop new ‘Proactive’ approach business models and generate competitive advantage and for financial investors alike. It will also stimulate economic growth through consumption and exports, and make the UK a safer place to do business. Key event Are you up to the challenge? 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 Definition Lifecycle costs Total Lifecycle Cost of of deploying and Reputational Intellectual Operational Financial impact Information Security = operating security + value + Property value + effectiveness + of incidents solutions • Hardware / • Brand volume • R&D information • Productivity • Direct financial software solutions • Customer • Customer • Ability to service loss from attack • Training satisfaction/ databases customers • Consultancy costs confidence • Competitive • Cost to serve • People costs information customers
  • 10. For further information about this roadmap contact: Andrew Tyrer Neil Hampson Leader, Network Security Innovation Platform Partner, Strategy Technology Strategy Board PricewaterhouseCoopers LLP (UK) andrew.tyrer@tsb.gov.uk neil.r.hampson@uk.pwc.com Paul Lewis Barry Jaber Lead Technologist, Network Security Innovation Platform Assistant Director, Strategy Technology Strategy Board PricewaterhouseCoopers LLP (UK) paul.lewis@tsb.gov.uk barry.n.jaber@uk.pwc.com William Beer Director, OneSecurity PricewaterhouseCoopers LLP (UK) william.m.beer@uk.pwc.com We would also like to acknowledge the contribution of Greg Bacon (PwC), Jason Creasey (ISF) and Andrew Wilson (PwC). For information on the Technology Strategy Board: www.innovateuk.org For information on PricewaterhouseCoopers LLP: www.pwc.co.uk This report has been prepared by the Technology Strategy Board together with PricewaterhouseCoopers LLP, UK (“PwC”) for Technology Strategy Board under the terms of the engagement contract with PwC dated 31st March 2010 (the “Engagement”). This report is for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this report without obtaining specific professional advice. This report contains information obtained or derived from a variety of sources (as indicated within the report). PwC has not sought to establish the reliability of those sources or verified the information so provided. Accordingly no representation or warranty of any kind (whether express or implied) is given by PwC to any person (except to the Technology Strategy Board under the relevant terms of the Engagement) as to the accuracy or completeness of the information in this report. PwC accepts no duty of care to any person (except to the Technology Strategy Board under the relevant terms of the Engagement) for the preparation of the report. Accordingly, regardless of the form of action, whether in contract, tort or otherwise, and to the extent permitted by applicable law, PwC accepts no liability of any kind and disclaims all responsibility for the consequences of any person (other than the Technology Strategy Board on the above basis) acting or refraining to act in reliance on the report or any information contained in the report or for any decisions made or not made which are based upon this report or information therein. The quotes in this report reflect the views of the individuals and are not necessarily the views of their organisations. © Technology Strategy Board, 2010. Publication: T10/037