TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Interviews

Cyber in 2014

by Mark Rowe

IT and cybersecurity people should resolve to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data, says global nonprofit IT association ISACA.

Bhavesh Bhagat, CISM, CGEIT, CEO of EnCrisp, cofounder of Confident Governance and member of ISACAโ€™s new Emerging Business and Technology Committee, said: โ€œThe pace of change expected in 2014 will put incredible pressure on technology professionals in the workplace with a focus on keeping IT risk in check while at the same time delivering value to the business. But this is also a chance for the IT department to be a strategic partner with the business on navigating these issues and opportunities.”

Tech resolutions

ISACA suggests the following five resolutions to help IT professionals get ready for 2014:

ยท Prepare for Privacy 2.0โ€”Attitudes toward data privacy are unlikely to reach a consensus in 2014. Instead, be prepared to accommodate both those with little expectation of privacy and those who view their personal data as currency and want to control how that currency is spent.

ยท Slim down big dataโ€”Explosive data volumes were the #1 issue (chosen by more than one in four respondents) posed by big data in ISACAโ€™s 2013 IT Risk/Reward Barometer. Unmanageable data creates redundancies and is difficult to secure. In 2014, eliminate the excess and consolidate what remains, to promote sharing and protect using better controls.

ยท Plan to compete for cybersecurity and data analytics expertsโ€”The need for smart analytics people and cybersecurity defenders with the right certifications is only going to grow in 2014โ€”the year of the data professional. If you plan to hire, make sure your compensation package and job descriptions are competitive.

ยท Rethink how your enterprise is using your information security expertsโ€”With some elements of IT security operational responsibility (including malware detection, event analysis and control operation) increasingly being outsourced to cloud providers, smart leaders are enabling their internal security experts to become hunters instead of just defenders. This allows them to proactively seek out the most hard-to-detect threats, build internal intelligence capabilities (e.g., โ€œthreat intelligenceโ€), construct better metrics and invest in operational risk analysis.

ยท Ramp up for the Internet of even more Thingsโ€”With 50 billion devices expected to be connected to the Internet by 2020,* start working now on a policy governing connected devicesโ€”many invisible to the end userโ€”if your enterprise doesnโ€™t have one now.

ISACA provides guidanceโ€”much of it free of chargeโ€”to help business and IT:

ยท COBIT 5 framework for the governance and management of information and technology

ยท Cybersecurity resources

ยท Privacy and big data resources

ยท Certifications such as Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC).

Related News

  • Interviews

    June 2025 magazine

    by Mark Rowe

    Now landed on desks and in email in-boxes is the June 2025 edition of Professional Security Magazine – the premier read for…

  • Interviews

    Insider threats

    by Mark Rowe

    G4S Academy International Director Noah Price, pictured, explains the risks and threats employees can pose to your organisation and how to prevent…

  • Interviews

    September 2025 magazine

    by Mark Rowe

    The latest edition of Professional Security Magazine, for September 2025, includes a timely interview (as students prepare to return to campus, or…