Enterprise security: CIO to lose command over CSOs

IT market research agency IDC says by 2018, 75 percent of chief security officers (CSO) and chief information security officers (CISOs) will report directly to the CEO, not the CIO.

The following are the other IT security predictions from IDC.

# By 2016, 25 percent of large enterprises will make security-related spending decisions based on analytical determinations of risk.

# Mobile devices have biometric capabilities and in 2015 we expect that 15 percent of those devices will be accessed biometrically, and that number will grow to 50 percent by 2020.

# By 2017, 75 percent of large enterprises will receive custom threat intelligence information tailored to their industry, company, brand, and environment.

# By the end of 2015, 20 percent of proprietary data in the cloud will be encrypted. By 2018, that will quickly rise to 80 percent.

# Enterprises will be utilizing security software as a service (SaaS) in a greater share of their security spending. By the end of 2015, 15 percent of all security will be delivered via SaaS or be hosted and by 2018 over 33 percent will be.

Cyber Security

# By 2016, multi-factor authentication will be the primary method of access control used by 20 percent of enterprises for highly privileged or otherwise sensitive accounts.

# By 2017, 90 percent of an enterprise’s endpoints will utilize some form of hardware protection to ensure that endpoint integrity is maintained.

# Security features are rapidly being embedded into business applications. By 2018, 25 percent of security applications that were previously purchased independently will be incorporated directly into business applications.

# By the end of 2015, 10 percent of all enterprise commercial Web sites and mobile applications will have been scanned for vulnerabilities and by 2018 40 percent will be scanned regularly.

“The cybercrime environment is most interested in committing financial fraud, data theft, corporate espionage, and disruption or destruction of infrastructure and processes. Enterprises and organizations are engaged in a constant arms race with the attacking elements and generally the perception is that the offense is winning,” said Charles Kolodgy, research vice president, Security Products.

Baburajan K
[email protected]