KEMP Technologies positioned as the Sole visiona... » KEMP Technologies today announced that it has been included in the Gartner 2015 Magic Quadrant for A... Cyber security leader invests in PassiveTotal Co... » SAN FRANCISCO, US / LONDON, UK: RiskIQ has announced that it has acquired PassiveTotal to expand its... Research pole created » Lyon: Seven industrial groups and two research laboratories have come together to create a research ... Summoning Mr President, VP and SGF to the People's... » Series: Buharism and the Fierce Urgency of Now ...Let's have it put in the public domain the break... Digital Guardian now delivers next generation da... » London, United Kingdom: Digital Guardian, the only endpoint security platform purpose-built to stop ... £78,000 GUN FINDS IN SCOTLAND – INCLUDING SAS ST... » Patrick Hawes, Director of Bonhams Sporting Guns Department in London will be on hand next week at t... POLICE ABUSE » Series: Buharism and the Fierce Urgency of Now So you wanna hire police for your next party? Go ... The Co-operative Group selects Eckoh to strengthen... » Eckoh has announced it has been selected by The Co-operative Group to provide its secure payment sol... Indyme gets ready for its first UK award » Customer engagement and loss prevention specialist nominated for two Retail Fraud awards Indyme, a ... ESET joins European Cyber Security Month to rais... » London, UK: ESET is once again helping to raise awareness about cyber threats during the annual Euro...


Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.


Subscribe to Vigilance Weekly

Information Security Header

Berlin, Germany: Globalization and mobility are fuelling opportunities for enterprises today, but they have a nemesis: amplification. As physical perimeters become flexible and the tools and devices organisations utilise become mobile, the downside is that the risks introduced become amplified. Ramsés Gallego, CISM, CGEIT, CCSK, CISSP, SCPM, Six Sigma Black Belt, international vice president of ISACA and security strategist and evangelist at Dell, today outlined what he sees as the top three threats facing enterprises. Gallego will discuss these threats and how they can be turned into opportunities at ISACA’s INSIGHTS 2013 event for business and IT leaders, taking place 10-12 June 2013 in Berlin, Germany.



BYOD (bring your own device) refers to the trend for employees using their own devices for their professional lives, but Gallego warns that this has progressed to encompass so much more. He notes it has become BYOx—with the “x” being a variable for everything an employee brings to the enterprise (apps, talents, ethics, information, skills, etc.). The danger lies in, for example, the apps stored and utilised on devices that could harbour worms, viruses and other threats waiting to infiltrate and steal corporate data. Further, there is the human element of actually using the device—there is little protection against human error and carelessness. In ISACA’s 2012 IT Risk/Reward Barometer survey, more than 40 per cent of respondents in Europe said BYOD poses a high risk to the enterprise.

The Third Platform

The three pillars of cloud, mobility and social media make up The Third Platform of an enterprise. He says this nexus of forces is here to stay and creates difficulties because each poses massive challenges and opportunities on its own. The combination makes it difficult for enterprises to protect themselves. Further, there are two elements to this threat—first is the transgression from historical mainframe platforms to a geographically disbursed infrastructure and eventually full migration to cloud computing. While some may claim the cloud will disperse, Gallego does not agree. He says, “While in the future it may change its name to some other moniker, I don’t believe the cloud will evaporate. Let’s face it—too much has been invested in the pillars that support the cloud.” The other element to this threat is the social enterprise. Gallego envisions more organisations creating, engaging with and nurturing their own communities akin to Facebook and LinkedIn—a great opportunity, but one that must be carefully managed.

Skills Shortages

Perhaps the ultimate threat facing organizations is the lack of the right people with the right skills for this new arena. Technology is moving at warp speed, with organisations adopting and updating their systems just as quickly, yet enterprises are not keeping pace with training and education.

INSIGHTS sessions will examine another key threat—cybersecurity—as well as Emerging Privacy and Data Protection, Big Data (Big Pain or Big Opportunity?), Information Security—Keeping up with the Business, Future of Cloud Computing, Forensic Fraud Detection, eRetail and eHealthcare. Discussions will be led by top experts from global enterprises including CA, Cloud Security Alliance, Deutsche Post/DHL, EDPS, Elsevier, ENISA, IBM, INTUG, KPMG, Microsoft, News International Corp., Pfizer, SWIFT, TurkCell, Visa, and WalMart, among many others.

The opening keynote presenter will be Dr. Herman Konings, futurist and founder of nXt and Opus X, think tanks for trends and forecasting. Konings will discuss the century of the entangled consumer and global trends influencing different generations, business-to-business marketing and other areas of the enterprise. The closing keynote presenter will be Egidio (Edge) Zarrella, senior advisory partner with KPMG China. With specializations in business and IT strategy transformation, outsourcing and offshoring, Zarella will help participants navigate through future complexity and change.