(ISC)2 - Acceptance of 'Bring Your Own Device' Means Companies Must Get to Grips with Cloud and Application Security
(ENP Newswire Via Acquire Media NewsEdge) ENP Newswire - 18 January 2013
Release date- 16012013 - London - Company policies supporting Bring Your Own Device are being widely embraced as a win-win initiative that improves employees' experience and reduces IT costs, according to results released today of the (ISC)2 2013 Global Information Security Workforce Study, conducted on behalf of the (ISC)2 Foundation by the analyst firm Frost & Sullivan.
At the same time, information security managers admit that companies must do more to understand the security of the technologies behind the trend, particularly for cloud-based systems and applications.
A preview of select results of the (ISC)2('ISC-squared') study were featured at a press conference hosted by Reed Events in advance of Information Security Europe 2013, April 23 -25. The largest study of its kind examining workforce trends in information security covered BYOD as one of three game-changing technology trends that are having a significant impact on information security practice. The global study's 12,396 respondents, one in four of which work in the EMEA region, clearly establish that BYOD is a prevalent practice - with 53 percent saying their companies actively allow users, either employees, business partners or both, to connect their devices onto their networks. A similar percentage, 54 percent, identified BYOD as a growth area for training and education within the information security profession.
Security professionals, however, are concerned that companies are not prepared for the risks introduced by this trend. Seventy-eight percent consider BYOD to present a somewhat or very significant risk. This reflects increased levels of concern compared to the 2011 study, when mobile devices were identified as a significant risk by 68 percent of respondents.
Further, nearly three-quarters of respondents (74 percent) highlighted that new security skills are going to be required to manage the security risks associated with BYOD. The biggest concerns were over the state of application security (72 percent) and the cloud (70 percent), also a developing area in business systems. Another 66 percent suggested companies needed to get more of a grip on how compliance requirements are being affected with the prevalence of BYOD.
Companies are more open to allowing user-owned smartphones (87 percent) and tablets (79 percent) onto corporate networks than laptops (72 percent), while they are supporting a multitude of platforms, with iOS leading the pack (84 percent), closely followed by Android (75 percent); RIM Blackberry/QNS (62 percent), and Windows Mobile (51 percent).
'Whether approved or not, user-owned tablets and smartphones are connecting into corporate networks and cloud environments,' states Michael Suby, Stratecast VP of Research at Frost & Sullivan. 'Furthermore, the escalating capabilities of these devices, such as dual-core processors and
multi-gigabytes of storage, add to the level of risk these devices pose to corporate assets and sensitive information. The positive news is that information security professionals are using a growing array of security technologies to stem this risk.'
The business drivers given for turning to BYOD puts the user at the centre of IT strategy. The desire to improve end-user experience at 60 percent was almost equal to the business requirement of supporting a mobile workforce (64 percent). A significant number of respondents (44 percent) also noted the goal of reducing operating and end-user support costs; while the desire to lower IT inventory costs was noted by a much lower 21 percent.
'From a security perspective, BYOD is gaining attention, but current efforts are focussed on the end -point rather than on protecting business data and assets,' says Wim Remes, CISSP, member of the (ISC)2 Board of Directors.
The top technologies identified to mitigate risks include: encryption, the use of virtual private networks, and remote lock and wipe functionality. Less than half (42 percent) are working with applications access control or authentication (40 percent), basic controls that exist on traditional IT infrastructures.
'This can be an opportunity for IT operations to fully seize the role of a business enabler. If approached correctly, with a focus on the data, BYOD can actually improve security and enable the business to compete at a pace that was but a remote dream half a decade ago,' concludes Remes, who presented the results at the conference.
The (ISC)2 Foundation will release the full report of the 2013 (ISC)2 Global Information Security Workforce Study in February as a resource to industry. Based on findings of an industry survey conducted in the autumn of 2012, the study is unique in its focus on issues affecting the security profession rather than general market developments, products or security breaches. Participants from 145 countries around the world contributed to offer insights into the changing profile of the profession, training and development needs, salary levels, attitudes and developments toward risk management, and the impact of key trends in business systems on security management.
About the (ISC)2 Foundation
The (ISC)2 Foundation is a non-profit charitable trust that aims to make the cyber world safer for everyone by supporting cyber security education and awareness in the community through its programmes and the efforts of its members. Through the (ISC)2 Foundation, (ISC)2's global information security expert membership of over 87,000 seek to ensure that children everywhere have a positive, productive, and safe experience online, to spur the development of the next generation of cyber security professionals, and to illuminate major issues facing the industry now and in the future. For more information, please visit www.isc2cares.org.
(ISC)-2 is the largest not-for-profit membership body of certified information security professionals worldwide, with over 87,000 members in more than 135 countries. Globally recognised as the Gold Standard, (ISC)-2 issues the Certified Information Systems Security Professional (CISSP) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP), Certified Authorisation Professional (CAP), and Systems Security Certified Practitioner (SSCP) credentials to qualifying candidates. (ISC)-2's certifications are among the first information technology credentials to meet the requirements of ISO/IEC Standard 17024. (ISC)-2 offers education programmes and services based on its CBK, a compendium of information security topics. Visit www.isc2.org.
2013, (ISC)-2 Inc. (ISC)-2, CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks of (ISC)-2, Inc.
[Editorial queries for this story should be sent to firstname.lastname@example.org]
((Comments on this story may be sent to email@example.com))
(c) 2013 Electronic News Publishing -
[ Back To TMCnet.com's Homepage ]