Enlightenment at Gartner Security & Risk Management Summit

At the end of June, WinMagic had the opportunity to attend Gartner’s 2014 Security & Risk Management Summit. After many sessions, meetings and cocktail receptions, we walked away a little wiser and informed. Over the next few weeks I’ll delve into some of the sessions we attended, and share some stuff we learned from them. But for this blog post, I thought it would be good to share some key highlights/data that we took in from the event.

Here are some interesting stats we took note of:

  • By 2020 60% of digital businesses will suffer service failures due to inability of IT security teams to manage digital risk
  • Almost 25% of computers lack virus or malware protection
  • 90% of vulnerabilities can be mitigated if admin rights aren’t granted to users
  • Security is a lower priority for CIOs – ranks 8th
  • 70% of organizations take a traditional focus on technology and reactive focus on security
  • By 2017 1/3 of enterprises will have a Digital Risk Officer

In looking at some of these numbers above, one of the stats that surprise me is that despite everything that has been happening with security breaches in the news, security doesn’t rank high on the CIO’s priority list. Granted, CISO’s are typically dealing with this today, but ultimately, that rolls up to the CIO. If organizations are more proactive vs. reactive with their security policies, there’s a lot of pain and aggravation that could be avoided if a breach ever occurs.

We’ll cull from our notes over the next few weeks and share more of what we learned from the conference and offer some of our own insight to some of the things we heard.

Previous Post
Computer Forensics and Self-Encrypting Drives
Next Post
Florida Gets Serious With Data Privacy

Related Posts

BitLocker Management

The never-ending torrent of high-profile data breaches encourages companies to evaluate security fundamentals. Among them is full-disk encryption (FDE), a security best practice that protects information on servers, laptops and other devices while they are at rest. (more…)
Read more

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by…

The Dark Side of Encryption

I know it’s very tedious these days to use a Star Wars metaphor, but as everyone’s doing it so will I. Encryption techniques have been used for some time to secure communications and protect personal or intellectual property. (more…)

The Need for Speed

Is software encryption on a notebook with a Solid State Drive (SSD) a non-starter due to performance concerns? This is a good question and I have heard it asked by some pretty smart people recently. (more…)

1 Comment. Leave new

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu