Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Securing the Emerging Digital Business Environment: The Gartner Symposium

Last week close to 15,000 attendees descended upon Gartner Symposium, one of the largest gatherings of CIOs and senior IT executives. The Symposium included over 375 presentations that focused on bimodal IT, cloud, IoT, security, mobility and more. We’ve gathered some of the key takeaways and insights from the conference here.

In five years, one million new devices will come online every hour

When Peter Sondergaard, Senior Vice President and Global Head of Research for Gartner, took the stage for the opening keynote at Gartner Symposium/ITxpo 2015, he stressed the growth of digital business. Next year, spending on IoT hardware will exceed $2.5 million every minute; in five years, one million new devices will come online every hour; global digital commerce is now $1 trillion globally. Digital business is exploding and enabling organizations to create more connections than ever before. With every new connection comes added pressure to accurately gauge risk at the endpoint as well as the data’s place of origin. How do you ensure that these connections are secure and not harmful to health and safety, privacy of data, or the infrastructure protection of your business? With so many risks and liabilities associated with IoT, businesses need fast responsive solutions sooner rather than later.

The imminent revolution

Tom Scholtz, VP and Gartner Fellow, delivered a presentation titled, “To the Point: The Imminent Revolution in Information Security.” During his presentation, Scholtz detailed the security concerns of the new digital business arena. He emphasized that the orthodox approach to security—one that is based on control—no longer works. Control does not scale because there are simply too many identities, devices, data and threats that organizations must track. The fundamental security truths that we have come to know—prevention is better than cure, humans are the weakest link, and default should be to deny—are being shattered by digital business.

60% of enterprises’ information security budgets will be allocated for rapid detection and response approaches by 2020

To address these changes, security environments must become foundations for an adaptive, context aware, dynamic, trust-based architecture. This architecture will be built on the philosophy of detect and respond; 60% of enterprises’ information security budgets will be allocated for rapid detection and response approaches by 2020.

Balancing risk

Paul Proctor, VP Distinguished Analyst for Gartner, presented an enlightening session on “What Every CIO Should Know About Security and Risk.” In a recent Gartner survey of over 2,800 CIOS, almost 70% of respondents said that their risk management investments and disciplines are falling behind. With the blurring of the lines between the physical and digital in this digital business era, now is the time to get risk management right before organizations start failing to take advantage of critical business opportunities.

Well positioned risk-based decisions will balance the needs to protect the organization against the needs to run the business

The discussion around risk management is changing. Security professionals are now beginning to enable executives to make business decisions around risk. Risk can never be completely eliminated, so it’s important to prioritize risk in a manner that allows executives to make informed decisions. “Well positioned risk-based decisions will balance the needs to protect the organization against the needs to run the business,” said Proctor.

The Tenable solution

To succeed in this era of digital business, organizations must be willing to adjust the way they think about security. Tenable’s SecurityCenter Continuous View™ provides organizations with a way to continuously measure the effectiveness of their security program while ensuring that the highest priority security problems are being addressed. Assurance Report Cards, available in SecurityCenter Continuous View, communicate an organization’s risk and security posture in a manner that both executives and board members can easily understand.

Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security