New Cyber-Security Model Spurs Innovation

New Cyber-Security Model Spurs Innovation

New Cyber-Security Model Spurs InnovationNew Cyber-Security Model Spurs Innovation

A new model for cyber-security acts on analytic inputs and adapts to evolving threats. It includes analytics, real-time monitoring and advanced authentication.

Ways to Address Threats and Create ValueWays to Address Threats and Create Value

Run the IT function in the cloud: 63% Use managed security services: 62%, Employ biometrics for authentication: 57%, Use open-source software: 53%, Employ big data analytics for cyber-security: 51%, Invest in security for the internet of things: 46%,

Cyber-Security Spending Priorities for the Next 12 MonthsCyber-Security Spending Priorities for the Next 12 Months

Improved collaboration among business, digital and IT: 51%, New security needs related to evolving business models: 46%, Security for the internet of things: 46%, Digital enterprise architecture: 46%, Biometrics and advanced authentication: 43%

Trusting the CloudTrusting the Cloud

63% of the survey respondents run IT operations in the cloud. They view cloud-centric cyber-security as a dynamic approach to both internal and external risk.

Business Functions Run in the CloudBusiness Functions Run in the Cloud

IT: 63%, Operations: 36%, Customer service: 34%, Marketing and sales: 34%, Finance: 32%

Dealing With Security and PrivacyDealing With Security and Privacy

62% of the respondents use managed security services (MSS) for cyber-security and privacy because of a dearth of skilled cyber-security specialists.

Using Managed Security ServicesUsing Managed Security Services

Authentication: 64%, Data loss prevention: 61%, Identity and access management: 61%, Real-time monitoring and analytics: 55%, Threat intelligence: 48%

Modeling Threats, Identifying IncidentsModeling Threats, Identifying Incidents

51% of respondents said they use big data analytics to model cyber-security threats and identify incidents. This helps them deal with the scarcity of cyber-security pros and budget constraints.

From Passwords to AuthenticationFrom Passwords to Authentication

Authentication technologies like biometrics are adding a next layer of security to passwords. 57% of respondents use biometrics, and 46% of them said it’s made online transactions more secure.

Enhancing Cyber-SecurityEnhancing Cyber-Security

53% of the respondents use open-source software, and 49% of them said it has improved their cyber-security program.

Benefits of Open-Source SoftwareBenefits of Open-Source Software

Easier to develop and deploy IT projects: 51%, Improved cyber-security: 49%, Enhanced scalability: 47%, Better interoperability with applications and middleware: 45%, Easier to customize infrastructure: 41%

Karen A. Frenkel
Karen A. Frenkel
Karen A. Frenkel is a contributor to CIO Insight. She covers cybersecurity topics such as digital transformation, vulnerabilities, phishing, malware, and information governance.

Latest Articles