The security executive’s role in America continues to gain strength and visibility. Whether in the public or private sector, the intelligence community, academia or a critical infrastructure installation, “securing the business operation” is paramount.
Macro trends like globalization and technology cycles have spawned outsourcing and global supply chains. This wider playing field and “the Internet of everything” deployment strategy has also accelerated threats to the business via intellectual property theft, piracy, product fraud, personal information and identity theft, and many others. As security risk has increased, new megatrends around cloud computing and cybersecurity have emerged. For the first time security policy and protections can be implemented at the front end of the business cycle. The cloud model also represents the only option for some fast growth sectors requiring protection, such as intelligent end points or the cell phone. The device is incapable of constant security downloads (hardware), and the onus on the individual for security is misplaced. The cloud is the only option, unless we choose to sacrifice our mobility. Thanks to recent news cycles, we now understand that these compute devices are vulnerable. Welcome to Cybersecurity 3.0.