SlideShare une entreprise Scribd logo
1  sur  21
Securing Generation “Y” ..and the businesses they
are now being hired by…
Andrew Moloney
Marketing Director, EMEA
November 23rd
2010
Introducing Generation Y
Key Findings in our Research
Impact of Consumer Driven IT
How Security Must Change
*…also known as
the Millennial Generation, Generation Next
or Net Generation
Generation “Y”* are now joining the workforce
Introducing Generation Y
Key Findings in our Research
Impact of Consumer Driven IT
How Security Must Change
Our Generation Y Research
n=1,000, ages 18-24
• employed full-time 25%
• employed part-time 37%
• unemployed 37%
Currently looking for a job 38%
Not currently looking for a job, 39%
but I expect to begin looking
within the next year
Not currently looking for a job, 24%
nor do I plan to look for a job
within the next year
Security aware, but easily lead and Socially
“Promiscuous”
76% say most of their contemporaries willingly take
chances with security in return for lower prices.
91% of young adults who use social networks list friends
they don't know well.
• 88% are “friends” with an acquaintance
• 44% with someone they’ve met online but not in person
• 33% with someone they’ve never met online or in person
37% of social networkers admit that their profile info on
their social network profile is viewable by people outside
their friends’ list
34% of social networkers admit that their photos, videos,
and blogs are viewable by people outside their friends’ list
Source: Generation Y Online Security Survey: TRU Research; sponsored by RSA
Insecure online banking practices..
81% say they bank online
66% feel very safe sharing financial information online
However….
• 42% conduct online banking transactions from a public computer
• 53% use public Wi-Fi spots
• 55% Never check their credit reports
• 76% select PIN numbers that will be easy to remember
• 32% never change their passwords
Source: Generation Y Online Security Survey: TRU Research; sponsored by RSA
Convenience trumps Safety..
76% agree it’s very important to change your online
passwords/PIN numbers regularly.
55% are concerned that someone will figure out their
passwords on password protected sites.‐
• Yet, 32% never change their passwords on email, social network
sites, or banking sites.
87% say it’s very important to use different or complex
passwords for online accounts.
• Yet, 52% usually use the same password for all accounts, and
44% usually use the same PIN.
26% store their passwords on their computer/PDA so they
won’t forget them.
Source: Generation Y Online Security Survey: TRU Research; sponsored by RSA
Reputational Risk for Employers?
77% are currently searching for a job or are about to begin
job hunting
However…of the 96% that visit social networking sites:
• 56% Used curse words in online posts
• 37% Posted photos, videos, or comments online that include
cigarettes, alcohol, or drugs
• 26% Posted online comments that are sexual in nature
• 25% Posted embarrassing or compromising photos, videos, or
comments online that they would not want viewed by a parent or
employer
• 20% Found photos online that were posted without their
knowledge
• 18% Were a victim of someone hacking into their email or social
networking account
Introducing Generation Y
Key Findings in our Research
Impact of Consumer Driven IT
How Security Must Change
With devices affordable and pervasive, “digital natives” are
creating personal infrastructures that extend into the
workplace
10
20
30
Personal
Computer
7.0
7.8
8.5
PDA, BlackBerry
or smart phone
1.1
1.7
4.0
Mobile phone
1.6
2.5
4.9
All devices
in survey
10.5
14.0
23.2
Baby boomer
Gen X
Gen Y
Base = 700 white
collar professionals
During an average workday, how many hours would you
estimate that you spend using …?
Gen Y spends
significantly more time
using mobile devices at
work
That the sum of
hours spent using
devices at work
totals almost a full
calendar day
implies significant
multi-tasking and
the
interchangeability
of the devices
Source: LexisNexis / WorldOne Research
Media accessed via these devices are nearly at full
penetration among Gen-Y-ers, and enterprises are
adopting them too
20
40
60
80
100%
H
ong
Kong
97%
N
etherlands
95%
France
93%
U
SA
92%
Turkey90%
C
hile
88%
Brazil
75%
R
ussia
73%
South
Africa
61%
Argentina
58%
Gen-Y: Are you a member of an online social network?
(Facebook, Bebo, MySpace, etc.)
Selected Countries
Sourc: PricewaterhouseCoopers, Deloitte
Penetration of Corporate Social
Networking
We post corporate videos
on YouTube
13%
Our CEO has a Twitter
profile
14%
We use social networking
for recruiting purposes
23%
We utilize social networking
as a tool to manage and
build our brand
29%
Social networking is part of
our business and operations
strategy
30%
Our CEO is on Facebook 31%
Consumerisation of IT, will shift power from the company to
the individual – security strategy must evolve accordingly
Employees bring personal
technology to the workplace
– Companies are forced to embrace consumer
technology, and find scalable ways to manage the
multiplicity of devices (BYOC, desktop
virtualization, etc.)
– Companies are forced to develop policies and
approaches for managing online risk pertaining to
confidential information, brand, etc.
– Business takes ownership of online processes,
end user devices and associated risk, with IT
providing guidance and tools
Employees manage
reputation, personal brand,
job searches etc. online –
often via virtual identities
Businesses increasingly
leverage consumer
technologies for corporate
purposes
• IT / CISO are no longer all-knowing authoritiesIT / CISO are no longer all-knowing authorities
• Some security vulnerabilities move from “forbidden” to “manageable”Some security vulnerabilities move from “forbidden” to “manageable”
• Business takes responsibility for actions of employeesBusiness takes responsibility for actions of employees
Introducing Generation Y
Key Findings in our Research
Impact of Consumer Driven IT
How Security Must Change
Managing Risk and Threats
15
No clear visibility to
threats and exposures
Inability to adequately
address exposures
Slow to respond
The CSO’s Challenge: Can they answer?
Am I secure?Am I secure?
Am I compliant?Am I compliant?
Where do I have gaps?Where do I have gaps?
How do I prioritize?How do I prioritize?
Managing Security with Accelerating Threats, Evolving
Technologies, New Business Models …
… is not easy
• Information growth
• Mobility, virtualization & cloud
• Evolving threat landscape
• Collaboration / Exchange
Agency Staff Privileged Users
-Business
Analytics
-Electronic
Health Records
-Replica
-Backup
Disk
-Backup Tape
-SharePoint
Room, etc.
-File Server
-Disk
Arrays
-Production
Database
-Physicians
-Clinical
Users
Apps/DB StorageFS/CMSNetworkEndpoint
Endpoint
theft/loss
Network Leak
Email-IM-HTTP-
FTP-etc.
Privileged
User Breach
Inappropriate
Access
Tapes lost or
stolen
Data Leak
Public
Infrastructure
Access Hack
Unintentional
Distribution
(Semi)
Trusted User
Misuse
Discarded
disk exploited
-Patients
Remote Employees
Channels
VPN
Partner Entry Points
Partners
Channels
Customers
Channels
Partner Entry Points
Privileged Users Privileged Users Privileged Users
Point ToolPolicy
Team
Traditional Approach
Point ToolPolicy
Team
Point ToolPolicy
Team
Network Endpoint Applications
Fragmented Inflexible Inconsistent Costly
Security Trends -The World Has Changed
Perimeter
Static
Point Products
Bolt On
Intrusion Detection
Visible
Transactional
Dynamic
Ecosystem Solutions
Embedded
Content Oriented
Seamless / Transparent
History
(Outside–In)
Today / Future
(Outside–In + Inside-Out)
Summary
As Generation Y join the workforce, the means by which
we secure, not only them, but our enterprises must adapt
accordingly
Static, perimeter centric controls will be insufficient in a
socially connected, consumer driven, virtualised, cloud
based environment
Security must evolve to be;
• Risk based
• Information Centric
• Adaptive
• Intelligent
amoloney@rsa.com
Twitter: @AJMoloney
Thank you!

Contenu connexe

En vedette

Arvot pelissä
Arvot pelissäArvot pelissä
Arvot pelissäLehikoinen
 
IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016
IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016
IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016Pekka Hartikainen
 
Marketing of Sleep Clinic in India
Marketing of Sleep Clinic in IndiaMarketing of Sleep Clinic in India
Marketing of Sleep Clinic in IndiaChirag Hathi
 

En vedette (6)

Final file copy
Final file   copyFinal file   copy
Final file copy
 
I padagogy
I padagogyI padagogy
I padagogy
 
The secret garden
The secret gardenThe secret garden
The secret garden
 
Arvot pelissä
Arvot pelissäArvot pelissä
Arvot pelissä
 
IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016
IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016
IxDA Helsinki meet-up at Smartly.io, Thu, 25th August 2016
 
Marketing of Sleep Clinic in India
Marketing of Sleep Clinic in IndiaMarketing of Sleep Clinic in India
Marketing of Sleep Clinic in India
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Securing Generation Y, and the Businesses they are being hired into..

  • 1. Securing Generation “Y” ..and the businesses they are now being hired by… Andrew Moloney Marketing Director, EMEA November 23rd 2010
  • 2. Introducing Generation Y Key Findings in our Research Impact of Consumer Driven IT How Security Must Change
  • 3. *…also known as the Millennial Generation, Generation Next or Net Generation Generation “Y”* are now joining the workforce
  • 4. Introducing Generation Y Key Findings in our Research Impact of Consumer Driven IT How Security Must Change
  • 5. Our Generation Y Research n=1,000, ages 18-24 • employed full-time 25% • employed part-time 37% • unemployed 37% Currently looking for a job 38% Not currently looking for a job, 39% but I expect to begin looking within the next year Not currently looking for a job, 24% nor do I plan to look for a job within the next year
  • 6. Security aware, but easily lead and Socially “Promiscuous” 76% say most of their contemporaries willingly take chances with security in return for lower prices. 91% of young adults who use social networks list friends they don't know well. • 88% are “friends” with an acquaintance • 44% with someone they’ve met online but not in person • 33% with someone they’ve never met online or in person 37% of social networkers admit that their profile info on their social network profile is viewable by people outside their friends’ list 34% of social networkers admit that their photos, videos, and blogs are viewable by people outside their friends’ list Source: Generation Y Online Security Survey: TRU Research; sponsored by RSA
  • 7. Insecure online banking practices.. 81% say they bank online 66% feel very safe sharing financial information online However…. • 42% conduct online banking transactions from a public computer • 53% use public Wi-Fi spots • 55% Never check their credit reports • 76% select PIN numbers that will be easy to remember • 32% never change their passwords Source: Generation Y Online Security Survey: TRU Research; sponsored by RSA
  • 8. Convenience trumps Safety.. 76% agree it’s very important to change your online passwords/PIN numbers regularly. 55% are concerned that someone will figure out their passwords on password protected sites.‐ • Yet, 32% never change their passwords on email, social network sites, or banking sites. 87% say it’s very important to use different or complex passwords for online accounts. • Yet, 52% usually use the same password for all accounts, and 44% usually use the same PIN. 26% store their passwords on their computer/PDA so they won’t forget them. Source: Generation Y Online Security Survey: TRU Research; sponsored by RSA
  • 9. Reputational Risk for Employers? 77% are currently searching for a job or are about to begin job hunting However…of the 96% that visit social networking sites: • 56% Used curse words in online posts • 37% Posted photos, videos, or comments online that include cigarettes, alcohol, or drugs • 26% Posted online comments that are sexual in nature • 25% Posted embarrassing or compromising photos, videos, or comments online that they would not want viewed by a parent or employer • 20% Found photos online that were posted without their knowledge • 18% Were a victim of someone hacking into their email or social networking account
  • 10. Introducing Generation Y Key Findings in our Research Impact of Consumer Driven IT How Security Must Change
  • 11. With devices affordable and pervasive, “digital natives” are creating personal infrastructures that extend into the workplace 10 20 30 Personal Computer 7.0 7.8 8.5 PDA, BlackBerry or smart phone 1.1 1.7 4.0 Mobile phone 1.6 2.5 4.9 All devices in survey 10.5 14.0 23.2 Baby boomer Gen X Gen Y Base = 700 white collar professionals During an average workday, how many hours would you estimate that you spend using …? Gen Y spends significantly more time using mobile devices at work That the sum of hours spent using devices at work totals almost a full calendar day implies significant multi-tasking and the interchangeability of the devices Source: LexisNexis / WorldOne Research
  • 12. Media accessed via these devices are nearly at full penetration among Gen-Y-ers, and enterprises are adopting them too 20 40 60 80 100% H ong Kong 97% N etherlands 95% France 93% U SA 92% Turkey90% C hile 88% Brazil 75% R ussia 73% South Africa 61% Argentina 58% Gen-Y: Are you a member of an online social network? (Facebook, Bebo, MySpace, etc.) Selected Countries Sourc: PricewaterhouseCoopers, Deloitte Penetration of Corporate Social Networking We post corporate videos on YouTube 13% Our CEO has a Twitter profile 14% We use social networking for recruiting purposes 23% We utilize social networking as a tool to manage and build our brand 29% Social networking is part of our business and operations strategy 30% Our CEO is on Facebook 31%
  • 13. Consumerisation of IT, will shift power from the company to the individual – security strategy must evolve accordingly Employees bring personal technology to the workplace – Companies are forced to embrace consumer technology, and find scalable ways to manage the multiplicity of devices (BYOC, desktop virtualization, etc.) – Companies are forced to develop policies and approaches for managing online risk pertaining to confidential information, brand, etc. – Business takes ownership of online processes, end user devices and associated risk, with IT providing guidance and tools Employees manage reputation, personal brand, job searches etc. online – often via virtual identities Businesses increasingly leverage consumer technologies for corporate purposes • IT / CISO are no longer all-knowing authoritiesIT / CISO are no longer all-knowing authorities • Some security vulnerabilities move from “forbidden” to “manageable”Some security vulnerabilities move from “forbidden” to “manageable” • Business takes responsibility for actions of employeesBusiness takes responsibility for actions of employees
  • 14. Introducing Generation Y Key Findings in our Research Impact of Consumer Driven IT How Security Must Change
  • 15. Managing Risk and Threats 15 No clear visibility to threats and exposures Inability to adequately address exposures Slow to respond
  • 16. The CSO’s Challenge: Can they answer? Am I secure?Am I secure? Am I compliant?Am I compliant? Where do I have gaps?Where do I have gaps? How do I prioritize?How do I prioritize?
  • 17. Managing Security with Accelerating Threats, Evolving Technologies, New Business Models … … is not easy • Information growth • Mobility, virtualization & cloud • Evolving threat landscape • Collaboration / Exchange Agency Staff Privileged Users -Business Analytics -Electronic Health Records -Replica -Backup Disk -Backup Tape -SharePoint Room, etc. -File Server -Disk Arrays -Production Database -Physicians -Clinical Users Apps/DB StorageFS/CMSNetworkEndpoint Endpoint theft/loss Network Leak Email-IM-HTTP- FTP-etc. Privileged User Breach Inappropriate Access Tapes lost or stolen Data Leak Public Infrastructure Access Hack Unintentional Distribution (Semi) Trusted User Misuse Discarded disk exploited -Patients Remote Employees Channels VPN Partner Entry Points Partners Channels Customers Channels Partner Entry Points Privileged Users Privileged Users Privileged Users
  • 18. Point ToolPolicy Team Traditional Approach Point ToolPolicy Team Point ToolPolicy Team Network Endpoint Applications Fragmented Inflexible Inconsistent Costly
  • 19. Security Trends -The World Has Changed Perimeter Static Point Products Bolt On Intrusion Detection Visible Transactional Dynamic Ecosystem Solutions Embedded Content Oriented Seamless / Transparent History (Outside–In) Today / Future (Outside–In + Inside-Out)
  • 20. Summary As Generation Y join the workforce, the means by which we secure, not only them, but our enterprises must adapt accordingly Static, perimeter centric controls will be insufficient in a socially connected, consumer driven, virtualised, cloud based environment Security must evolve to be; • Risk based • Information Centric • Adaptive • Intelligent

Notes de l'éditeur

  1. In this siloed environment, can you answer these four questions. Am I secure? Am I compliant? Where do I have gaps? How do I prioritize
  2. … [from III slides] Risks that are changing, growing and getting exploited with increasing efficiency by threats originating both inside and outside the organization.   From lost or stolen laptops To fraud and customer entry points To privileged user breaches To lost or stolen backup tapes Believe it Or Not · Hackers are increasingly targeting healthcare and medical facilities. According to the San Diego-based nonproft organization Identity Tef Resource Center (ITRC), healthcare was responsible for 20.5% of exposed records in 2008. This totals more than 7 million records — and is the second highest percentage, behind only the government/military sector. It is partly because this sector is an easy target with lax security controls and partly because the rewards of breaking into healthcare systems are increasing as healthcare providers keep a number of records in electronic form. July 24, 2009, Forrester, Healthcare Security: Ready Or Not, Here It Comes by Khalid Kark