John Furrier21
Q: What trends from this list are most important? Internet of Things, Supply Chain risk, Threat Intelligence Sharing, Identity Management, Cyber Crime, Mobile Law, Government Policy, Analytics and Forensics, BYOS, Security Operations Center
Douglas Gourlay
Identity management system compromise was the root cause of most major expansion and data theft we read about last year...
Michael Osterman
IoT for the future, but supply chain risk at present. The Target breach is a good example of the latter given the lack of control that exists in the supply chain.
Leon Brown
I agree with @dgourlay - Identity Management is huge right now; it impacts all other items
John Furrier
@dgourlay It's interesting to lay out the topic and figure out dependencies - Identity seems to be a big one around the trust equation
Michael Osterman
To what extent will big data analytics to provide situational awareness be key in improving security? We can do that very well right now, but most don't.
Marina Donovan
@dgourlay - Lost or stolen devices (USB and laptops) were the number one source of data breaches in healthcare last year.
Paul Gillin
IBM just released a 700TB database of information on threats, malware, known security breaches for researchers to use for free.. I wonder if people think that will be useful? http://ow.ly/LHyb3
Douglas Gourlay
@Marina__Donovan That doesn't surprise me one bit...
Marina Donovan
@dgourlay - The lost or stolen device breach is one that can be easily managed.
Douglas Gourlay
back to your list John - I think secured logging as part of your SOC is critical. Bad actors shouldn't be able to erase footprints...
Leon Brown
@mosterman Trend analysis against network traffic is big, as is analysis app behavior to identify potential malware. Going forward? GPS derived LBS coupled with access/transactional data might prove informative
Marina Donovan
@dgourlay We also provide USB workspaces with #WindowsToGo that can be managed. This is a laptop replacement and great for contractors and #BYOD.
John Furrier
the billion dollar question: In this list above what are the disruptive enables for companies and what outcomes do customers get???
Michael Osterman
@Marina__Donovan It's the most secure solution because it solves the dual issues of keeping IT in control and negating the potential for user errors.