Empowering Cyber Security Leaders and Info Security Essay

The study has always helped to size the industry and understand the gaps between the current workforce and what’s needed, Peeler explains. However, the 2013 survey is the first time (SIS)2 NAS been able to apply the segments identified as part of the National Initiative for Subjectivity Education (NICE) to learn about shortages by Job title. The position most in demand? The security analyst, according to more than 50% of respondents. In addition, roughly 30% of survey respondents note that their organizations are looking for security engineers, auditors, application engineers, and security testers.

The results of this study reinforce the incredible need for a strong cyber workforce,” says Bill Stewart, senior vice president, Bozo Allen Hamilton. “Security professionals increasingly have a seat at the board table because C-suite executives realize that the influence of these professionals can impact business operations. ” enterprises are employing a broader range of technologies to manage the risk. While at the same time, the technologies used in the past have become more prevalent as well. ” Specifically, mobile device management was most prominent two years ago at 44%, and it increased to 50% this year.

A newer technology like secure centralization or sandbagging is being used by 20% of respondent organizations, whereas it did not appear in the previous study. Beyond the growing BOYD trend, the desire to improve the end-user experience as well as the business requirement of supporting a mobile workforce are the key business drivers. A significant number of respondents (44%) also note the goal of reducing operating and end-user support costs, while the desire to lower IT inventory costs is noted by Just 21%. “While we have learned a fair amount about technology, it all comes back to BOYD,” says Peeler.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

People are using their personal devices as an avenue to enter the cloud and develop software. It’s all interweaves. ” Cloud computing. Although less of a concern than BOYD, cloud computing continues to rate high, with top concerns centering on data protection and potential exposure of confidential information. “When compared to 2011, the level of concern did not change. One could read into this that despite cloud being around for two years longer, security concerns still linger,” Subs says. “At this point, we do not have a good handle on whether the risk is perceived or real.

If it is real, we do not seem to be handling it any better than we were two years ago. ” One key difference when analyzing security concerns around the cloud versus BOYD is that most companies are choosing to move into the cloud?meaning they are making sure the risk level is suitable and manageable before taking any steps, explains Subs. “Across the board, it’s the C-level respondents who are especially concerned about cloud computing. And when looking at verticals, banking, finance, and insurance are higher than others in terms of concern,” he says.

This is also the vertical that uses the technology the least, More Technology, More Risk To gauge the importance and impact of a few key trends, the survey asked respondents to provide insight into how their organizations are dealing with Bring Your Own Device (BOYD), cloud computing, secure software development, and social media. BOYD. The obvious concern around security risk is considerably higher than it was Just two years ago, explains Subs. “With an increasing number of mobile devices, it meaner that businesses will have to deal with more personal devices connecting to


I'm Tamara!

Would you like to get a custom essay? How about receiving a customized one?

Check it out