Hosted by Trends in Enterprise IT Security Andrew Briney, CISSP Editorial Director, Information Security October 15, 2003.

Slides:



Advertisements
Similar presentations
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Advertisements

New York, October 4, 2010 Mobility in the next Decade: Ensuring you have the right programs to meet future talent challenges Presenters: Morgan Crosby.
Andrew Dolan Markets and Banking Technology May-07 Enterprise Grid at Citi Grids Mean Business.
ServiceVAR CategoryCore Revenue Source Resell Product Time & Materials Traditional VAR Product Sales Support Product Product To Pull Technical Services.
Applications outsourcing as a means to achieving transformation Aprajita Sharma Research Manager, Outsourcing & BPO IDC Australia.
New Product Innovation National Correctional Industries Association Enterprise 2004 March 23, 2004.
Joey Yep Technical Marketing, Seagate CSS Creating a Competitive Advantage with Cloud.
Elevate Your BC Career Presented by: Cheyene Haase of BC Management, Inc. The Skills, Experience and Credentials in Demand for Business Continuity Professionals.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Business Continuity The Business of Keeping A Business Running John Dooly Senior Analyst CEMA Region Prague, Czech Republic.
Payments – Reloaded! Spending Priorities & Innovation in Payments.
The future for Test Automation Sarah Saltzman EMEA Manager for Quality Test Management Summit January 31 st, 2007.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
Market Mechanisms to Improve Food Security: Zimbabwe November 12, 2012 by Bronwyn Irwin.
Centralized vs. Decentralized: Pros, Cons & Best Practices
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
Managing Your Money What You Need to Know About Budgets, Credit Cards and Paying For College.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Secured Hosting Services Frank Adams / Tom Carter.
1 Rick Tang Rick Tang IP Centrex - Integration Service IP Centrex - Integration Service Convergence Network Practice.
A Balancing Act Between Risk Appetite and Risk Tolerance Federal Information Systems Security Educators’ Association Conference March 2005 Ezra Cornell.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Joseph Ferracin Director IT Security Solutions Managing Security.
JJ Mois Année Competitive Intelligence as a key decision factor in Komercni banka André Léger Executive Director, Marketing.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
The 2009 HIMSS Security Survey: Insights into the Status of Healthcare Security Implementation sponsored by Symantec Meeting of the HIT Standards Committee,
CRM Selection Criteria Developing a Decision Matrix Chris Selland Reservoir Partners, L.P.
Faulkner provides in-depth technology information services to public and private sector organizations worldwide. We report on the events and trends that.
Chapter 2 Business and IS/IT Strategic Planning Concepts.
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
September 22, 2010 Background Checking: Has the Use of Credit Background Checks Increased? A Comparative Look and 2004.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Future-State CIO: The Rise of the Business Strategist Steve Rovniak Director, EMEA.
State of the market Sobha Meera. Analyst Meet 2001, August 6, 2001Infosys Technologies Ltd., © 2001 Corporate IT spending continues to be sluggish in.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Internal apps How enterprises use mobile apps internally.
STORAGE ARCHITECTURE/ MASTER: The Adoption of Intelligence in the Fabric End Users Speak Out Nancy Hurley Senior Analyst Enterprise Strategy Group.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
State of the Market IT Spending Directions Stephen Minton Vice President IDC Worldwide IT Markets.
Feasibility Analysis Outline
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Planning a Communication Strategy Pat Melgares, Marketing Coordinator K-State Research and Extension Kansas State University Department of Communications.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS © 2011 Wolf & Company, P.C. The Future of Technology in Financial Services Matt.
Find the amount after 7 years if $100 is invested at an interest rate of 13% per year if it is a. compounded annually b. compounded quarterly.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
CPA Canada Holiday Spending Survey Background document On behalf of: Chartered Professional Accountants of Canada October 23, 2015.
and Beyond : Vision for the Worldwide IT Market Stephen Minton Director, Worldwide IT Markets International Data Corporation.
IT auditing in practice Marc Verdonk Eindhoven, November 27 th 2008.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
COUNTRY RISK ASSESSMENT China & Japan Eliza Bogucka Magdalena Mirek Dominika Dunin - Szpotańska.
WHO’S WHO IN “CLOUD”? PHIL WORMS DIRECTOR MARKETING IOMART GROUP.
Organizing and leading the IT function Two set of tensions guide policies for developing, deploying and managing IT systems. 1.Innovation and control a.How.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Webinar Behind The Scenes Of The Forrester Wave: GRC Platforms, Q Chris McClean, Principal Analyst and Research Director Renee Murphy, Senior Analyst.
New Product Innovation
WEBINAR Managing The Data Explosion: Forrester’s Business Intelligence And Analytics Software Forecast Boris Evelson, Vice President, Principal Analyst.
Vendor Landscape Plus: IP Telephony Vendors
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Detection and Analysis of Threats to the Energy Sector (DATES)
Selecting a Business Continuity Planning Tool
Presented by Gary Martell, Jr. Mountain West Financial
The case for cloud Bill La Ruffa | Sr. Sales Enablement Specialist.
ITP Maturity Model Survey 2018
In the attack index…what number is your Company?
Presentation transcript:

Hosted by Trends in Enterprise IT Security Andrew Briney, CISSP Editorial Director, Information Security October 15, 2003

Hosted by Agenda Security Budgets and Spending Technologies and Services: Hot & Not What Do You Value Most? The “Maturing” Profession

Hosted by Information Security Polling 2003 ISM Annual Survey 3,500 IT security professionals 2003 ISM Product Survey 1,100 IT security professionals 2003 SearchSecurity Users’ Survey 372 IT security professionals TheInfoPro (TIP), Q Survey Interviews with 160 senior IT security pros

Hosted by Global IT Security Market $17B $45B 25% CAGR Source: IDC Corp.

Hosted by Budget Changes: Since 9/11 Source: SearchSecurity 51% of organizations have increased spending

Hosted by Will your IT security budget increase in the next 12 months? 1.Yes 2.No 3.Don’t know

Hosted by Budget Changes: Source: TheInfoPro 54% of organizations will increase spending

Hosted by By how much will your IT security budget increase in the next 12 months? 1. More than 50% 2. 25% -50% 3. 10% - 24% 4. 1% - 9% 5. No change 6. Budget will decrease 7. Don’t know

Hosted by IT vs. Security Budgets % of IT Budgets Devoted to Security Source: Information Security Magazine

Hosted by 2005: 60% will have both. 2001: 7% of organizations had BOTH IDS and VA. Hot and Not (1) Source: Information Security Magazine By 2005, AV, FWs and VPNs will be deployed in 95% of organizations.

Hosted by Do you plan to invest in managed security monitoring services in 2004? 1. Yes 2. No 3. Don’t Know/NA

Hosted by Do you plan to invest in special- purpose security appliances in 2004? 1.Yes 2.No 3.Don’t Know/NA

Hosted by Hot and Not (2) In 2003, will you spend more, less or the same amount on these technology areas? Source: TheInfoPro

Hosted by What do you value most when selecting a security product? 1. Features/functionality 2. Fit with current network/data infrastructure 3. It’s own built-in security 4. Price 5. Other

Hosted by Feature Creep Source: Information Security Magazine

Hosted by What do you value most when selecting a security vendor? 1.Technical Support 2.Produce leading product 3.Financial stability 4.Strength of R&D 5.Breadth of product line 6.Other

Hosted by Vendor Value Source: Information Security Magazine

Hosted by To what extent do regulatory and legal requirements drive your security actions? 1. Never 2. Rarely 3. Sometimes 4. Mostly 5. Always 6. Don’t Know/NA

Hosted by Regulatory Impact To what extent do regulatory and legal requirements drive your security actions? Source: Information Security Magazine

Hosted by Proactive Defense At what point do you act on an emerging security threat? Source: Information Security Magazine

Hosted by Risk Analysis What type of risk methodology(ies) do you use? Source: Information Security Magazine

Hosted by Andy’s Crystal Ball 2004 Security Spending: “Y2K Effect” Functionality Converges at Perimeter “Intrusion Defense” Gets Smarter Profession Continues to Mature

Hosted by Trends in Enterprise IT Security Andrew Briney, CISSP Editorial Director, Information Security October 15, 2003