Evolving Your Security Risk Management Strategy to Address Cloud, BYOD and End-User Targeted Attacks
How are CISOs thinking about managing security risk overall? What changed in the last 6 months?
How are they thinking about supporting/enabling IT transformation happening? End users using their personal devices for work (BYOD) is an example of IT transformation. The big one we see is migration to cloud. Both on applications (to saas apps such as O365 and DropBox) and infrastructure (using AWS or Azure for computer).
Look around your extended enterprise. You have users who work at home, on the road and in the office. They use corporate-owned devices, as well as their own, and they access resources via a frustrating variety of secured and unsecured wireless networks.
And these are only the devices you know about, the users you believe are accessing critical data.