Welcome to the SC Magazine Awards 2008

Share this article:
Welcome to the SC Magazine Awards 2008
Welcome to the SC Magazine Awards 2008
As the business landscape continues to change, so too does the role of the information security community. Now, more than ever, the role of the information security professional is facing unprecedented challenges.

In the past we relied almost exclusively on technology to mitigate emerging threats. Not so anymore. Today, we need to take a more holistic and proactive approach to identify, manage and mitigate cyber risks. The transformation of our profession comes amid rapidly changing concepts, ideas, technologies, methods and solutions. Baby boomers are giving way to the Gen Xer. Clearly, this new generation – with its use of social networking and other emerging technologies, coupled with trends in the business environment – brings its own set of unique challenges.

Fundamentally, security is not a technology problem – it's a people problem. And while the technology continues to improve, its increasing complexity exacerbates the problem. Fraud, theft, impersonation and counterfeiting are real threats that have been around since the beginning of society. During the last 20 years, these crimes have been integrated with cyber technologies, and over the next 10, they will migrate into new computing, communications and commerce platforms that will be in use at the time. 

Our ability to evolve in this changing environment requires our understanding of risk management principles, quantifying risk in business terms. We must become true risk management professionals, relying on technology and proactive approaches to assess, react and deliver sound defenses to emerging threats.

The SC Magazine Awards honor the emerging leaders and innovators in our field and this year is no exception. I hope you will join me in recognizing the many exceptional contributions and outstanding professionals that we are here to celebrate. These organizations and individuals recognize the rapidly changing information security landscape and are applying the creative solutions required to develop a comprehensive risk management practice.

Share this article:
close

Next Article in RSA Conference 2008

Sign up to our newsletters