Beyond the hype of industry trends

Share this article:
Beyond the hype of industry trends
Beyond the hype of industry trends

Coming into 2014, cloud computing, BYOx (bring-your-own-device and other personal computing gadgets), and security awareness are predicted to be hot trends for IT security. To understand which trends are being validated versus those that might be a lot of hot air, we asked some of our most senior members for their perspectives.

To start, there was consensus that cloud computing is becoming a reality that will need to be addressed by every security department. Executives are the driving force behind cloud adoption – most likely due to proclaimed economic benefits. However, CISOs caution that the security implications of cloud computing are serious and will remain.

Surprisingly, with all the industry hype surrounding BYOx, Wisegate members agreed it's not developed as expected. Realities of full adoption, such as support costs, compliance risks and usage reimbursement, can actually raise the total cost of ownership at a time when the TCO for company-owned PCs is dropping.

Another hyped trend is security awareness, which many IT leaders believe may be unwarranted. Most agree that getting employees to pay attention to what they are doing and how it affects the security of their organization is still a challenge. Yet some believe the challenge is a worthy one.  

Other Wisegate members agreed that often the best solutions to problems – hyped or not – come from conferring with other expert CISOs. “Often senior technology leaders struggle to get straight answers about IT,” said David Sherry, CISO at Brown University. “We need to connect to peers, who are the best source of pragmatic information on what works, what doesn't, and key lessons learned.”  

No matter what the viewpoints are on the hype versus reality, all security practitioners agree we will face significant challenges managing the growing complexity of IT security in the days ahead.

Share this article:

Sign up to our newsletters

More in Opinions

Unfair competition: Proactive preemption can save you from litigation

Unfair competition: Proactive preemption can save you ...

With each job change, the risk that the new hire will bring confidential information or trade secrets with him or her to the new company grows.

Hackers only need to get it right once, we need to get it right every time

Hackers only need to get it right once, ...

Hackers only need to find one weak point to steal valuable information. On the flip side, security pros need to account for every possible scenario.

Successful strategies for continuous response

Successful strategies for continuous response

While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.