|
Computing Security Awards 2018 - meet the winners!
|
A gala night in London saw this year's Computing Security Awards winners duly honoured for their outstanding performances across the past 12 months. To see who won what, go to: http://computingsecurityawards.co.uk/ | |
|
Editor's Focus
|
Good news, bad news
Identity fraud has fallen for the first time in four years - which is a real positive. At the same time, there is an acute shortage of cyber security skills in-house to deal with threats against the business | |
|
Masterclass
|
You can’t prevent what you can’t see
Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Marvin Josif, from CIX Software, look at the criticality of full visibility when facing advanced persistent threats | |
|
Features
|
Education - and phishing
A cyber-attack is calculated to cost an organisation around $395 per employee, per attack, according to new research. And yet, while the primary defence is technology, 95% of all such attacks are the result of human error |
|
United and threatened
The Internet of Things (IoT) turns information into actions that create new capabilities, richer experiences and real economic opportunity. But you also need to be beware of the ‘dark side’. The risk of a potential breach is never that far away
|
|
Fine-tuning the cloud
Will Secure Access Orchestration solutions that holistically manage the overall multi-cloud environment overcome fears around security issues? |
|
What is the (end)point?
Many organisations can’t even agree on what an endpoint is, suggesting there is a serious disconnect in what has now become the age of the Industrial Internet of Things (IIoT) |
|
When hype and hope collide
Many organisations can’t even agree on what an endpoint is, suggesting there is a serious disconnect in what has now become the age of the Industrial Internet of Things (IIoT) |
|
|
Product Review
|
AlienVault USM Anywhere
Organisations that want their threat detection, incident response, and compliance management centralised in one place need look no further than AlienVault
|
|
Vectra Cognito
Traditional intrusion detection and prevention systems (IDPS) are struggling to cope, as cyber-criminals become ever more imaginative |
|
|
Case Study
|
|
|
Welcome to the November 2018 issue of the Computing Security Newsletter.
Responsibility for information security is not falling to any one senior executive function, according to the 2018Risk:Value report from NTT Security, which surveyed 1,800 senior decision makers from non-IT functions in global organisations.
At a global level, 22% of respondents believe the CIO is ‘ultimately responsible’ for managing security, compared to one in five (20%) for the CEO and 19% for the CISO. In the UK, fewer respondents point to the CIO (19 %) and CISO (18%) while the CEO gets the biggest vote at 21%. The US (27%) and Norway (26%) buck the trend, with more than a quarter of respondents suggesting the CEO is responsible, while in Singapore one third say it is the role of the CISO – the highest figure across all 12 countries. Interestingly, around one in 10 people in Switzerland believe the CFO is responsible for security.
“Responsibility for day-to-day security doesn’t seem to fall on any one particular person’s shoulders among our response base,” says Azeem Aleem, VP Consulting & UK&I Lead, NTT Security. “This narrow gap between the roles of CIO, CEO and CISO shows that no one executive function is stepping up to the plate. It could be a sign of unclear separation between the CIO and CISO though, as often they are the same or collaborate closely.
"On the other hand, should we be concerned that the CEO is not more involved in security matters, given the potentially damaging affects to the business,” he adds, “or should we be relieved that they are not managing a specialist task like this, over and above other critical corporate responsibilities.”
As Aleem quite rightly wonders, however, the burning question is: Where do you draw the line?
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|