CISOs focusing on automation, cloud security for 2020

By William Smith
A new report from American networking technology giant Cisco has outlined the expectations of Chief Information Security Officers for the coming year...

A new report from American networking technology giant Cisco has outlined the expectations of Chief Information Security Officers for the coming year.

Based on a survey of 2,800 security professionals in 13 countries, the report, entitled the “2020 CISO Benchmark Report”, some of the key findings included the fact that, while cybersecurity remains a priority among business leaders, the complexity of infrastructure change due to digital transformation opens up vulnerabilities.

One method of covering this threat is through combatting complexity. That can be achieved through the consolidation of vendors, investing in automation and implementing cloud security.

SEE ALSO:

In an accompanying press release, Steve Martino, Senior Vice President and Chief Information Security Officer, Cisco, said:“As organizations increasingly embrace digital transformation, CISOs are placing higher priority in adopting new security technologies to reduce exposure against malicious actors and threats. Often, many of these solutions don’t integrate, creating substantial complexity in managing their security environment. To address this issue, security professionals will continue steady movement towards vendor consolidation, while increasing reliance on cloud security and automation to strengthen their security posture and reduce the risk of breaches.”

Recommendations stemming from the report included implementing a layered defence consisting of multifactor authentication and endpoint protection, as well as a focus on cyber hygiene; such as training staff and updating devices.

In this month’s edition of the magazine, our cover feature found us speaking to the CISO of super app Gojek, George Do, who discussed his own approach to the challenges of balancing agility with security. ““We want to enable our developers and our engineers to move as fast as possible, but in order for them to do that securely, their identity and how they go about accessing systems to do their work is paramount. So we employ, and have a robust roadmap to implement, a very strong identity and access management program”

Share

Featured Articles

Building Cyber Resilience into ‘OT in Manufacturing’ webinar

Join Acronis' webinar, Building Cyber Resilience into ‘OT in Manufacturing’, 21st September 2023

Google at 25: From a Search pioneer to AI breakthroughs

Technology Magazine explores how the tech giant went from being based in a California garage to a pioneer in technologies from AI to quantum computing

McKinsey: Nine actions for CIOs and CTOs to embrace gen AI

McKinsey identifies nine actions to help CIOs and CTOs create value, orchestrate technology and data, scale solutions, and manage risk for generative AI

OpenAI ChatGPT Enterprise tier drives digital transformation

AI & Machine Learning

Sustainability LIVE: A must-attend for technology leaders

Digital Transformation

VMware and NVIDIA to unlock generative AI for enterprises

AI & Machine Learning