how will your cloud strategy impact your cyber strategy?
TRANSCRIPT
How Will Your Cloud Strategy Impact Your Cyber Strategy?
Build a new security model to close today’s security gaps and effectively wage cyber warfare
Interviewed • Cameron Brown, Former
Forensic Specialist, United Nations
• Scott Crowder, CIO, BMC• Paul Lewis, CTO, Hitachi Data
Systems• Betty Elliott, Head of InfoSec &
CISO, Moneygram International• Michael Matthews, CIO,
Deluxe Corp.• Sean Pike, Program Vice
President, Security, IDC
• Surveyed over 300 executives across North America and Europe
• 66% CIO/CTO/CISO/CSO• 34% VP/SVP of Tech of InfoSec
• All companies had at least $100M in revenue, and 50% had revenue >= $1B
• Interviewed industry experts, analysts, and customers
BMC partners with Forbes Insights 2nd Annual Security Operations
69% Say Digital Transformation is Forcing Changes to Cybersecurity Strategies
Responds to new digital
competitors
Solidifies and grow market
share
Serves shifting customer demands
3 New Technologies Are Creating the Biggest Security Challenges
Why? Clouds and mobile apps send data outside secure firewalls
Big data apps centralize data, for easy access by thieves if they breach defenses
Public clouds (65%)
Big data (63%)
Mobile apps (61%)
Exposure of intellectual property
Damage to corporate reputation
The Risks to Enterprises Without a Strong Cybersecurity Strategy are Indisputable
Theft of corporate financial
information
Release of sensitive customer
information
The Challenge: Act Now or Leave Corporate Assets Vulnerable to Hackers
CIOs and CISOs must expand efforts to:
Address sophisticated armies of global cyber-thieves, many of whom are backed by national governments
Close the new security gaps that arise as their organizations embrace digital transformation
The Trade-Off: Boards Must Balance Investments for Security and Next-Gen Business Technology
say security was a higher priority in 2016
82% say security investments will rise again
in 2017
76% AND
of CIOs75%
of CISOs
But these executives also acknowledge that when lobbying for additional security funding, technology execs are competing with business peers, all of whom are trying to convince the board where it should allocate money.
The Answer: Follow 3 Steps to Create a Secure Enterprise Operations Strategy Backed by a Solid Execution Model
Target security spending for the biggest impact
Redouble efforts to secure
mission-critical assets
Address organizational and cultural
issues
Step 1 for Waging Modern Cyber Warfare: Target Security Spending for the Biggest Impact
64% will increase
investments in 2017 for protecting against
known security threats
plan to enhance incident response capabilities in the
next year
68% Organizations mitigate damages from today’s biggest risks
• 43% say investments in IT patch and automation had best ROI
The Result:
Step 2 for Waging Modern Cyber Warfare: Redouble Efforts to Secure Mission-Critical Assets
will devote more personnel and
technology to ensure the enterprise is never breached
will combine security and operations personnel into
teams dedicated to specific mission-critical
applications
47% 45% Organizations optimize security activities for their most valuable resources
The Result:
Step 3 for Waging Modern Cyber Warfare: Address Organizational and Cultural Issues
agree that line-of-business managers must take a greater role in developing security strategies
say operations accountability for
breaches will increase
72% 52% A culture of security permeates the organization to more effectively fight cybercrime
The Result:
The Benefits of a Modern Cybersecurity Strategy Are Undeniable
Safeguards enterprises at a time of change
Targets investments for biggest benefits
Stays current with latest exploits and
cyber-thieves
Increased market share, sales, and customer
satisfaction
expanded vulnerability discovery and remediation
to fend off hackers
say security investments will rise in 2017
60%
82%say digital transformation is
forcing changes to cybersecurity strategies
will boost spending to protect against known
threatsplan to enhance incident
response capabilities
69%
64% 68%
Re-engineering Security Playbooks in the Age of Digital TransformationKey Takeaways
Additional Resources
Learn more about today’s biggest cybersecurity threats and the new security model that can fill the gaps
Read the full report, “Enterprises Re-engineer Security in the Age of Digital Transformation”