Security Slideshow: Risky Business: Social Networks, Mobility, Cloud Computing

By Dennis McCafferty  |  Posted 11-01-2010

Risky Business: Social Networks, Mobility, Cloud Computing

Slide 1Social networking64 percent of respondents agree that social networking tools are extremely risky when it comes to security.

Risky Business: Social Networks, Mobility, Cloud Computing

Risky Business: Social Networks, Mobility, Cloud Computing - Page 2

Mobile Platforms54 percent of respondents agree that mobile platforms are extremely risky.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 2

Risky Business: Social Networks, Mobility, Cloud Computing - Page 3

Cloud Computing42 percent of respondents agree that cloud computing is extremely risky.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 3

Risky Business: Social Networks, Mobility, Cloud Computing - Page 4

Virtualization/SOASome 25% of respondents agree that virtualization and service-oriented architecture are extremely risky.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 4

Risky Business: Social Networks, Mobility, Cloud Computing - Page 5

Cloud fears61 percent of respondents are concerned about handing over sensitive data to a third party when it comes to cloud computing.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 5

Risky Business: Social Networks, Mobility, Cloud Computing - Page 6

Cloud fears50 percent of respondents are concerned about a data breach or loss with respect to cloud computing.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 6

Risky Business: Social Networks, Mobility, Cloud Computing - Page 7

Cloud Fears23 percent of respondents indicate that a weakening of corporate network security is a concern with cloud computing.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 7

Risky Business: Social Networks, Mobility, Cloud Computing - Page 8

Communication issues30 percent of respondents say that communicating risk policies and procedures to employees is problematic.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 8

Risky Business: Social Networks, Mobility, Cloud Computing - Page 9

Where is the training?Less than one quarter of respondents say risk-management policies are part of every employee's formal training.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 9

Risky Business: Social Networks, Mobility, Cloud Computing - Page 10

Where are the policies?Less than 15 percent of respondents have incorporated an integrated risk-management plan into the physical/technical infrastructure of their enterprise.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 10

Risky Business: Social Networks, Mobility, Cloud Computing - Page 11

Top 3 benefits of improving IT risk management (percent respondents)1. Assures business continuity (74 percent)2. Improves brand reputation (32 percent)3. Increases agility (19 percent)

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 11

Risky Business: Social Networks, Mobility, Cloud Computing - Page 12

Three ways to effectively manage IT risk:1. Examine/assess your organization's risk capability with cross-enterprise planning for all risk categories such as data, disaster recovery, etc.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 12

Risky Business: Social Networks, Mobility, Cloud Computing - Page 13

Three ways to effectively manage IT risk:2. Look for "champions" among senior leadership to help you "sell" the benefits of risk mitigation.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 13

Risky Business: Social Networks, Mobility, Cloud Computing - Page 14

Three ways to effectively manage IT risk:3. Determine how to heighten risk awareness at all levels of organization, into everyday business and IT processes. Establish this as more than a "one-time" activity.

Risky Business: Social Networks, Mobility, Cloud Computing  - Page 14