+ All Categories
Home > Technology > 2014 Identity, Security and Cloud Predictions

2014 Identity, Security and Cloud Predictions

Date post: 16-May-2015
Category:
Upload: netiq
View: 621 times
Download: 0 times
Share this document with a friend
Description:
With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior years like cloud, mobility, social and big data have been key challenges recently that are reflected in this year’s predictions. The large amount of information compromised last year have destined privacy and IT security to be topics of interest in 2014, including the consumerization of IT and how organizations will respond. Privacy, will become a major concern in the mainstream this year, and consumers will respond proactively. Consumers will increasingly adopt authentication alternatives, acknowledging that standalone passwords are insecure. Data security, resilience, availability and recovery are the next step in the consumerization of IT, as individuals strive to backup their critical data. Another topic of interest in 2014 is how organizations will respond to the heightened security risks. Trust in public cloud providers decreased significantly with the revelation of the NSA spying allegations in 2013. This year, organizations will shift their focus to on-premise cloud solutions that inherently offer more control over critical and sensitive data. It is also predicted that organizations will steadily focus on the role of privileged users and utilize Managed Security Services for increased security management internally. While BYOD was also a big trend in 2013, Bring-Your-Own-Identity (BYOI) will come into play in 2014, but it does not come without risks. CIOs need to be prepared to monitor this trend, deciding if BYOI would reduce or increase their overhead, workload and liability/risk profile. Read the full set of identity, security and cloud predictions from NetIQ's thought leaders in this deck.
Popular Tags:
15
2014 Identity, Security and Cloud Predictions
Transcript
Page 1: 2014 Identity, Security and Cloud Predictions

2014 Identity, Security and Cloud Predictions

Page 2: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.2

Internet of Things (IoT) will be 2014’s big data

There will be an increased number of potential security threat vectors as a result of more things being plugged in…

Continue reading: http://bit.ly/CSOAusPredict

Page 3: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.3

Those with privileged access can potentially do a lot of damage. This is not a new concept nor concern, but the Snowden incident puts privileged users back in the spotlight in 2014.

Continue reading: http://bit.ly/CSOAusPredict

There will be an increased focus on privileged users

Page 4: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.4

We should expect to see an effort to utilize MSS for some aspects of security management, while in-house teams will focus on adding value, providing guidance and ensuring better alignment with the business user, who ultimately foots the bill.

Continue reading: http://bit.ly/InfoSecPredict

Incorporation of Managed Security Services (MSS)

Page 5: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.5

Data monitored by the governments, the number of data breaches in 2013 and factor in the inability to control how information flows after we disclose it to an initial party and we have quite a number of privacy issues to deal with. Plus new or amended privacy legislation comes into effect in some countries in 2014 raising the profile of privacy further.

Continue reading: http://bit.ly/CSOAusPredict

Privacy will become a major concern in the mainstream

Page 6: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.6

Once installed, malware on devices will continue to focus on the things the device has access to, like online accounts and data, rather than anything on the device itself.

Continue reading: http://bit.ly/InfoSecPredicts

Device Malware will focus on what the device accesses

Page 7: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.7

Ultimately, it is pointless identifying a threat when there is no path forward to manage the incident, deploy the appropriate responses and counter the threat through remediation.

Continue reading: http://bit.ly/CSOAusPredict

Security departments will shift focus from incident identification to incident reaction and management

Page 8: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.8

Organizations will re-examine where their critical data resides and encrypt as much of it as they can. They must also use stronger forms of encryption to reduce the chances of their data being decrypted.

Continue reading: http://bit.ly/CSOAusPredict

We are at the dawn of an encryption renaissance

Page 9: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.9

We accept passwords as a necessary evil, but they are insecure. Consumers want to be identified using more secure, usable means.

Continue reading: http://bit.ly/CSOAusPredict

The number of authentication alternatives will increase

Page 10: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.10

As consumers we do not ensure we have multiple backup sources and can recover from failure or loss of data; or that data is secure and cannot be stolen. This will change. We will begin to take more care of personal data.

Continue reading: http://bit.ly/CSOAusPredict

Data security, resilience, availability and recovery; the next step in the consumerization of IT

Page 11: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.11

The volume of data breach in 2013 means criminals know more about us than they ever have. This knowledge will be used in spear phishing.

Continue reading: http://bit.ly/CSOAusPredict

2013’s Data breaches will tip the scales in favor of spear phishing

Page 12: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.12

CIOs need to be prepared for BYOI

The CIO will need to decide if BYOI would reduce or increase their overhead, workload and liability/risk profile

Continue reading: http://bit.ly/BizEdgePredict

Page 13: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.13

Identity became a core part of IT and business in 2013 promoting MSPs to respond to the demand.

Continue reading: http://bit.ly/CSOAusPredict

MSPs will expand into Identity-as-a-Service market

Page 14: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.14

Trust in public cloud providers has decreased. To enjoy the cost and productivity benefits a cloud infrastructure brings while maintaining full control over critical and sensitive data, organizations will deploy a private cloud.

Continue reading: http://bit.ly/CSOAusPredict

Organisations will get serious about their own on-premise private cloud

Page 15: 2014 Identity, Security and Cloud Predictions

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.15

Learn more about NetIQ at:NetIQ.com


Recommended