Security priorities coming sharply into focus will align closely with the business and IT strategies of Corporate IT Forum members.
Thus access to and the processing of "new" data sources, and the devices, services and applications used to do so, present a primary challenge.
This brings identity and access management to the fore and intensifies the need for IT to work ever more closely with other business areas, especially human resources (HR), to achieve an effective approach.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Read more on security priorities for 2014
- Security Think Tank: ISF’s top security threats for 2014
- Security Think Tank: KuppingerCole’s security predictions for 2014
- Security Think Tank: Lock up personal information in 2014, says ISSA-UK
- Security Think Tank: BYOD requires focus on security risk in 2014
- Security Think Tank: Old and new security challenges in 2014
Outsourcers, third parties and supply chains raise considerable concerns. The Corporate IT Forum’s 2013 examination of the threat landscape rated outsourcing a top corporate risk, and recommended the use of ISO27001 as a management framework.
Members will be analysing changes in the 2013 edition and appraising it in a workshop in January 2014.
The management of security incidents and assurance of service continuity remain top priorities for IT, with more than a third of respondents to the Forum’s 2014 IT Strategy Survey highlighting "improving security" as a primary component of their business strategy for the coming year.
Ollie Ross is head of research at The Corporate IT Forum.