Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
    data analytics for trademark registration
    Optimizing Trademark Registration with Data Analytics
    6 Min Read
    data analytics for finding zip codes
    Unlocking Zip Code Insights with Data Analytics
    6 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Evolving Approaches to Cyber Threats
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Evolving Approaches to Cyber Threats
AnalyticsSecurity

Evolving Approaches to Cyber Threats

BobGourley
BobGourley
4 Min Read
SHARE

Bob Gourley and HP’s Andrzej Kawalec, CTO of Enterprise Security continued to discuss emerging security issues at the HP Protect 2011 conference on Monday, September 12, 2011, exploring problems with traditional approaches to enterprise security.

More Read

We The People of FaceBook
Fortifying Enterprise Digital Security Against Hackers Weaponizing AI
A powerful computing tool that allows scientists to extract…
How Big Data Analytics Can Create a Billion-Dollar Mobile App UX
Value of Decommissioning Legacy Systems

Bob Gourley and HP’s Andrzej Kawalec, CTO of Enterprise Security continued to discuss emerging security issues at the HP Protect 2011 conference on Monday, September 12, 2011, exploring problems with traditional approaches to enterprise security.

Andrzej began by defining the customary enterprise security approach. We’ve been taking a very reactive stance to cybersecurity, focusing on responding to incidents, and cybersecurity has been more of an art than a science. Our understanding of how different systems, defenses, and attack vectors interact is far less developed than our knowledge of networks or data centers. He also noted that traditionally, security was below the level of the board and even the CIO, posing a significant challenge to CISOs and CIOs today.

I elaborated on where those traditional approaches and attitudes fail. fundamentally, these approaches do not deliver defense in depth, which has become the goal of modern cybersecurity. When defense is reactive, it focuses on the last battle rather than the future threats and, as a result, misses the major transformations currently underway in the enterprise, such as cloud computing and users shifting from PCs to mobile devices for work or as the endpoints for software-as-a-service. With current approaches, enterprises are not prepared for a “post-PC era.”

Noting all of those problems, Andrzej and I both laid out lists of priorities for CIOs. They must take a transformational posture, focusing on moving from a reactive security policy to more effective and forward-looking defense in depth. To do so, they need a more analytical,  broad, Big Data approach to their information, for example correlating various security events to find trends and performing forensics after a breach. Another element of this is getting all of the security professionals in the enterprise together to form a team with a deeper grasp of threats. To do so, enterprises must also begin to view security  its own distinct discipline.

Ultimately, an analytics approach of providing a fast, accurate, and aggregated view of data within the enterprise is crucial for current CIOs. It allows them to coordinate their operational staff and to better communicate with their board so that they can transform the enterprise and shed dated, reactive responses to threats for active and deep defense.

Many enterprises are finding that the best way to transition from reactive to proactive postures is by measuring what exists, monitoring ongoing activity, and planning for continuing enhancement using those insights.  This type of continuous improvement is aided by integrated technology, including IT testing, security testing, SIEM and forensics capabilities.  For more on enterprise capabilities like these and HP Enterprise Security we recommend diving into the great context at: http://www.arcsight.com/protect2011/

TAGGED:cio
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

crypto marketing
How a Crypto Marketing Agency Can Use AI to Create Powerful Native Advertising Strategies
Blockchain Exclusive Marketing
data driven insights
How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
Analytics Big Data Exclusive
image fx (37)
Boosting SMS Marketing Efficiency with AI Automation
Exclusive
pexels pavel danilyuk 8112119
Data Analytics Is Revolutionizing Medical Credentialing
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

CIO and IT development
AnalyticsBig DataBusiness IntelligenceIT

CIOs Predict IT Development

4 Min Read

CIO Becomes the New CMO!

2 Min Read

The CIO of 2020

6 Min Read

Yesterday’s Security vs Today’s Threats

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?