The computer security industry is eating humble pie at this weeks RSA Security Conference in San Francisco. Amid continued cybersecurity break-ins and a growing threat landscape, here are five key IT security and data protection trends emerging at the conference.
1. About That Humble Pie: Amit Yoran, president of EMC Corp.s RSA unit, says the IT security industry has failed because organizations that are investing millions and millions of dollars in security are still getting compromised on a consistent basis, according to an interview with The Wall Street Journal. In a separate interview, Yoran told Fortune that its time for No More of the Same. Lets do things differently; lets think differently; lets act differently. Because, what the security industry has been doing has not worked.
2. Protecting Intellectual Property: Richard A. Clarke, the former special advisor on counter-terrorism and cybersecurity to three Presidents, issued a warning ahead of the conference stating that cybersecurity must increasingly protect intellectual property. He alleged that cyberattacks from China continue to steal intellectual property from the U.S., and will ultimately erase the United States innovative edge in business.
3. Cybersecurity Goes Vertical: While all industries are under attack, multiple vertical market organizations are pushing new cybersecurity recommendations. Just ahead of the conference, a list of 12 cybersecurity principles emerged from The Cybersecurity Task Force of the National Association of Insurance Commissioners. The healthcare, financial services and manufacturing industries have also been developing a range of cybersecurity recommendations.
4. Its About the People: Amid all the technical threats, most research still points to peopleyour own employeesas the single biggest IT security threat. Indeed, social engineering phishing email, fraudulent phone calls and morestill trick employees into sharing personal and corporate information. Indeed, the 2013 Target hack likely started the moment a Target employee clicked on a phishing email, experts have stated.
5. Holistic Approaches Needed: Instead of betting on individual software and security companies, experts at the conference are telling attendees to take a more holistic approach to IT security. Figure out your overall threat landscape first, then mix, match and integrate the best third-party offerings into a total solution.
Register or login for access to this item and much more
All Health Data Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access