The anniversary of 9/11 reminds us all of the epic fail of our country’s security intelligence capability. What can we do to ensure our own information security intelligence is robust and reliable?
On September 5 and 6, 2012 – Canada hosted the Organization of American States (OAS) Roundtable Discussion for Cybersecurity Policymakers where senior officials from Member States of the OAS including Argentina, Brazil, Chile, Colombia, Mexico, Panama, Peru, Uruguay and the U.S. exchanged best practices and strategies for enhancing cybersecurity. OAS, through the Inter-American Committee against Terrorism (CICTE) and the Cybersecurity Program, reaffirmed and solidified its commitment is committed to developing and furthering the cybersecurity agenda in the Americas.
Twenty-six percent of data breaches occur at externally hosted facilities, accounting for 45+ million compromised records in 2011. If we assume for a moment that this represents the known universe of cloud computing attacks, this assumption is alarming in of itself. Moving data to a public cloud provider requires one relinquish a substantial amount of control over data as well as the assets in which they reside. This loss of control is where the risk gap exponentially expands.
The theme of Discover 2011 is all about the Instant-On Enterprise and how it’s here. However, a funny thing happened on the way to becoming an Instant-OnEnterprise. CIOs realized that they must address many, and often competing priorities.