Page 21 - index
P. 21







such as protecting data on edge devices; implementing assurance that scales; and tying
IoT protocols to business models.

3. Securing the “Three Vs.” Data is everywhere. Businesses are experiencing
exponential growth in data as more devices get deployed at the edge and business
processes become increasingly digital— causing their data repositories to reach
capacity. For companies to fully reap the benefits of software intelligence and embrace a
collaborative workforce model of humans and machines, it will be critical to securely
process and protect big data. Traditional database management systems cannot scale
enough to handle the three Vs of data - volume, velocity and variety. To accomplish this,
enterprises should focus on two key areas: First, securing big data processing platforms,
and, second, embedding security into the data.

4. Building Security Platforms. With the evolution of the IoT and digital industry
ecosystems, platform-based businesses will offer new opportunities for growth and
profitability. Platform security is a vital capability to operating in the digital ecosystem.
Businesses must understand the potential cyber-physical risks of delivering platform-
based services and augment existing security efforts with digital platform intelligence.
Approaches to maximizing security platforms come in stages: 1) understanding cyber-
physical security risks; 2) evolving data security intelligently; 3) planning security into the
platform; 4) utilizing existing platforms to augment security intelligence; and 5)
integrating security into DevOps processes.

5. Gaining Customer Trust. One of the key determinants of success for digital businesses
will be their ability to deliver personalized products and services to specific customer
habits and preferences. Accenture calls this trend the “Internet of Me.” To maximize
customer data and deliver personalization, businesses must apply more stringent
security measures to protect privacy—and ultimately build and maintain trust with
customers. We have developed five strategies to build customer trust: 1) Build trust by
taking transparency seriously; 2) Follow basic data protection guidelines; 3) Take
advantage of privacy-preserving analytics; 4) Innovate to appeal to privacy-wary
customers and 5) Empower customers with tools.
With an increasing focus on securing the digital business, the continuous introduction of new
innovative technologies and the explosion in data, businesses are struggling to keep pace
defending the enterprise with traditional security practices. Forward-looking companies know
that endpoint security is not enough, and are moving to active defense—risk-based approaches
to security management, analytics-driven event detection, and machine speed orchestration of
response. Although these technologies are maturing rapidly and communities are forming to
expose the risks, the biggest barrier is the slow adoption of solutions that already exist. The
core challenge for organizations is understand the risks of the new digital enterprise, get
smarter about the new active defense possibilities, and get realistic about what needs to be
done.




21 Cyber Warnings E-Magazine – August 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   16   17   18   19   20   21   22   23   24   25   26