The year was 1791, and the U.S. constitution was being written. While the Bill of Rights and Fourth Amendment were specifically written to protect the privacy of individual citizens, privacy still continues as a major issue over 200 years later. It's safe to say it will continue to be an issue in 15 years.
-Toby Weiss, general manager and senior vice president of security management, Computer Associates
The next big challenge for most information security executives will be how to allocate and spend their budgets on protecting internal networks and endpoints without significantly adding to the cost and complexity of security operations. New philosophies and approaches must be embraced to adequately protect the network from the core to the endpoints. Because prevention ultimately fails, security executives should adopt a risk management approach in order to effectively mitigate and control risks, rather than continue chasing an expensive, threat-free panacea.
-Tim McCormick, vice president of marketing, Lancope, Inc.
In 15 years we'll have realized that the key to computer security is building more secure software. Software security will be the most critical branch of computer security.
-Gary McGraw, Ph.D., CTO, Cigital
Fifteen years from now, the world will be an interconnected global community secure enough for people to work and play across heterogeneous devices, products and organizations. As technology advances, cybercriminals will continue to push the industry with more sophisticated attacks, but the industry's improvements in secure technology development and advancements in security technologies and education will make those attacks less relevant.
-Mike Nash, corporate vice president, Microsoft Security Technology Unit
Fifteen years: 2020, 2021. There will be no security as we know it today. All significant computation will make use of web services. Just as you must now trust Google not to share your queries with your competitors, you will be trusting thousands of specialized computing services to perform calculations you must have and cannot do for yourself. Your protection will depend not on firewalls, cryptography and intrusion detection -- though all will be plentiful -- but on contractual obligations.
--Dr. Whitfield Diffie, CSO, VP, Sun Fellow, Sun Microsystems
Fifteen years out is like dog years compared to the rest of the industry. It's hard to say exactly what the industry will be like in 15 years as threats are increasingly more complex and motives are continuously changing. I will say that users will continue to be gullible, too trusting and ultimately fooled, and technology implementation will continue to be less then stellar, opening the door for repeated hacker attacks. The specifics, though, are anyone's guess.
--Vlad Gorelik, CTO, Sana Security