CIA and cyber security guardians are at the core of new age

Cyber security professionals are the new guardians of digital change, says Gartner

GN Bureau | October 14, 2015


#Cyber security   #CIA   #digital  

Increasing changes in computing, devices and services that are at the heart of the digital business continue to shape risk and security landscapes and by 2017, more than 20 percent of enterprises will have digital risk services devoted to protecting business initiatives using devices and services in the Internet of Things (IoT).

"Business imperatives have driven the convergence of the Internet of people, computers and things, transforming most enterprises into digital businesses and reshaping cybersecurity," said Christian Byrnes, managing vice president at Gartner. "An inflection point in business and technological innovation has occurred, which we refer to as the 'digital explosion' and the 'race to the edge.'"

The Gartner analysts presented the findings at the Gartner Symposium/ITxpo.

The traditional model ascribed for decades to IT security has been one of confidentiality, integrity and availability (CIA). Most organizations in 2015 have not shown a consistent ability to substantially mitigate those risks. The CIA model is still relevant and applicable in cyber security, but it isn't enough.

"The race to the edge has pushed the environment for protecting data and infrastructure into the physical world, merging functions focused on data and information with functions that make actual changes to people and their surrounding environments," said Byrnes. "Protecting information alone isn't enough, and ensuring the confidentiality, integrity and availability of that information isn't enough. Leaders in risk and cyber security must now assume the responsibility of providing safety for both people and their environments."

The digital explosion is moving technologies from core architectures to a highly distributed and fit-for-purpose edge. "Core" describes general-purpose technologies and services for computing, such as servers, laptops and mobile platforms, as well as cloud and mobile services. "Edge" is a term used to describe devices that aren't servers or laptops and perform specific functions in the business and are positioned at the boundary between the business and its customers, partners and providers. The core and the edge are mixtures of traditional IT, as well as IT and components of the IoT.

The digital explosion disrupts the foundations of services for technology and information and elevates traditional IT services, such as cloud computing and advanced analytics, to a mandatory status to support the scale and functional needs of the edge. The edge itself is more physical than digital, with devices and physical assets becoming more intelligent to meet the shifting demands of business. This is the core-to-edge continuum.

The other continuum in the cyber security scenario is one of openness. An organization must decide, as part of its evolution in digital business, on the ultimate transparency of its services to its customers. The degree of openness depends on an organization's approach to data accessibility, infrastructure used, culture, process and adaptation to change. Gartner believes that the demands for transparency in the digital business of 2020 will drive more organizations toward openness as a strategy of priorities.

Requirements for large-scale, real-time adaptive protection, safety and privacy at the digital and physical levels will drive new cyber security skills, practices and technologies. The race to the edge requires that organizations consolidate the prioritization of cyber security efforts across broader technology areas that require protection and are interdependent. In addition to a more comprehensive approach to digital risk, organizations must prepare for new cyber security skill sets in areas such as vendor portfolio management, safety engineering, machine-to-machine (M2M) communications, embedded software, and systems security and cyber physical systems.

"Cyber security professionals are the new guardians of big changes in the organization. Such professionals must practice business resiliency and adaptability, because they are now so integrated with digital business decisions that leaders cannot tell where business ends and cyber security begins," said Byrnes. "The digital explosion and the race to the edge have achieved what previous waves of technology evolution have failed to do — to integrate cyber security professionals and business leaders into effective teams for the protection and safety of the organization."

Comments

 

Other News

“Key milestones achieved in Assam”

In an interview with Governance Now, Anil Kumar Jha, special DGP, CID, Assam, who is also nodal officer for the CCTNS project, speaks of what the system in its present form has helped his state achieve. What is the current status of CCTNS in Assam and its outcome?

Crime tracking project: Bugged from the beginning

A stand-off between the ministry of home affairs (MHA) and software development firm Wipro seems to have long held up the Rs 2,000 crore crime and criminal tracking network and systems (CCTNS) project, conceptualised ten years ago. The project aims to digitise and connect all police stations in the country

Activists question displacement and dispossession of marginalised communities

Questioning the development model pushed ahead for profit oriented growth, social and political activists, academicians, financial analysts and civil society organisations are holding a three day confluence of Peoples’ Convention on Infrastructure Financing in Mumbai.     &nb

The enemy within

About one-fourth of India’s elderly face abuse at the hands of those they trust the most – the son (52%)  followed  by the daughter in law (34%),spouse/partner (14%), daughter(6%)  grandchild (6%), son in law(3%), parent(1%) and care giver(1%), reveals a report by the HelpAge Ind

Who has been investing in India through Mauritius?

The official statistics provided by the department of industrial policy and promotion (DIPP) under the ministry of commerce and industry shows that between January 2000 and December 2017, India received $368 billion of foreign direct investment (FDI). It also says that Mauritius was the source of $125 bill

The neighbour and the valley

The declaration communicated through the director general of military operations (DGMO) of Pakistan and India on May 29, 2018, to implement the ceasefire agreement of 2003 between the two countries in “letter and  spirit” has opened up an opportunity to restore peace in the disturbed Kashm

Current Issue

Current Issue

Video

CM Nitish’s convoy attacked in Buxar

Opinion

Facebook    Twitter    Google Plus    Linkedin    Subscribe Newsletter

Twitter