Security risks grow as businesses rush to adopt emerging technologies

RSA released two new research studies that examine the far-reaching security implications of promising technologies such as cloud computing, virtualization, social networking and mobile communications, and explore the pivotal business risks and rewards they represent to organizations worldwide.

The first research study – conducted by IDG Research Services – reveals a significant gap between the speed at which organizations are adopting new connectivity, collaboration and communication technologies and their readiness to deploy them securely. The second study, from RSA’s Security for Business Innovation Council, outlines how companies can capitalize on the significant business advantages these new technologies represent without putting their organizations at risk.

“Businesses are becoming ‘hyper-extended enterprises,’ exchanging information with more constituencies in more ways and in more places than ever before,” said Art Coviello, Executive Vice President, EMC Corporation and President, RSA, The Security Division of EMC. “The rapid adoption of nascent web, social and mobile technologies combined with the rising use of outsourcing is quickly dissolving what remains of the traditional boundaries around our organizations and information assets. Security strategies must shift dramatically to ensure companies can achieve their goals to cut costs and meet revenue targets without creating dangerous new business vulnerabilities.”

Commissioned by RSA, a 2009 IDG Research Services survey of 100 top security executives at companies with revenues of $1 billion or more showed that some companies are so enthusiastic about the potential of new web and mobile technologies, they are deploying them without adequately securing critical processes and data.

Key findings include:

  • More than 70 percent of survey respondents believe escalating levels of connectivity and information exchange powered by new web and communication technologies are transforming their organizations into hyper-extended enterprises
  • The majority of organizations have increased their use of virtualization, mobility and social networking over the past 12-24 months, with more than one -third reporting an increase in cloud computing
  • However, many of the responding companies do not have adequate strategies to assess the risks involved in adopting these new technologies. In some organizations, the corporate security department is only brought in when problems occur and in others, security is not even informed before these new technologies are used
  • Less than half of respondents have developed policies for employees to guide the use of social networking tools and sites
  • More than 30 percent of the responding companies already have at least some enterprise applications or business processes running in the cloud, with another
  • 16 percent planning to begin migration within the next 12 months. Among these, two -thirds do not yet have a security strategy in place for cloud computing
  • More than 8 of 10 respondents are concerned that pressure to cut costs and generate revenue has increased their exposure to security risks. More than 7 in 10 have experienced a security incident in the last 18 months
  • The majority of respondents agree they need to change and improve their approach to enterprise security strategy to accommodate the realities of the hyper-extended enterprise

Study findings are summarized in the IDG Research Services white paper, “As Hyper-Extended Enterprises Grow, So Do Security Risks”.

Also today, RSA released the results of its fourth Security for Business Innovation Council report, “Charting the Path: Enabling the “Hyper-Extended” Enterprise in the Face of Unprecedented Risk.” In this report, top security leaders from around the globe explore how security strategies must transform in a world in which well-intentioned actions to drive new business value could open up disastrous risk exposures.

Based on in-depth conversations with the Security for Business Innovation Council, whose members are some of the world’s top security officers, this report looks at where information security is headed. It offers specific recommendations for developing an updated information security model that reflects the emerging opportunities and dangers at hand. Council members outline why today’s threat environment is particularly treacherous and share advice on how to securely tap the hyper-extended enterprise for business advantage. Specific guidance includes:

  • Rein in the Protection Environment: Identify ways to use resources more efficiently by taking a risk management approach to the existing security environment. For example, the Council outlines strategies for how to curtail the use of security resources that protect extraneous information assets, stored data, and devices. By reining in the protection environment, enterprises can simultaneously cut costs, reduce risk and free up resources for high-priority projects
  • Get Competitive: In challenging economic times, if business leaders perceive they are not getting what they need from the internal security organization, they may increase overall risk to the enterprise by turning to external service providers without involving corporate security. The Council explains how security teams must focus on the quality and efficiency of their services and be able to effectively articulate the value they provide for the price
  • Proactively Embrace Technology on Your Terms: Information security departments must accept that it is not feasible to block the use of new web and communications technologies; instead they must enable their secure use. Council members share guidance on moving from reactive to preventive security, and establishing a roadmap for the business to adopt new technologies
  • Shift from Protecting the Container to Protecting the Data: In the era of the hyper-extended enterprise, more and more enterprise data is processed and stored in containers not controlled by the business. For instance, the data may be processed by service providers or held in a personal PDA used by an employee or in a laptop owned by a contractor who may have multiple enterprise clients. Within this environment, the Council provides guidance on shifting from protecting the container to protecting the data
  • Adopt Advanced Security Monitoring Techniques: In today’s threat environment, security teams must update their approach to monitoring for abnormal and malicious events. Council members share advice on moving away from techniques such as signature-based anti-virus and blacklisting to more accurate techniques such as behavior-based monitoring and whitelisting
  • Collaborate to Create Industry Standards: Council members explore why the need for uniform standards for security professionals, third-party providers and emerging technologies has reached a critical juncture
  • Share Risk Intelligence: To help enterprises defend against international attackers and an increasingly sophisticated fraudster network, the Council recommends more robust and collaborative intelligence-sharing–spanning enterprises, law enforcement and government.

The Security for Business Innovation Council is comprised of 10 highly-successful Global 1000 security executives: Anish Bhimani, Managing Director, Risk and Security Management, JP Morgan Chase; Bill Boni, Corporate Vice President, Information Security and Protection, Motorola; Roland Cloutier, Vice President, CSO, EMC Corporation; Dave Cullinane, Vice President and CISO, eBay Marketplaces; Dr. Paul Dorey, former Vice President, Digital Security and Chief Information Security Officer, BP and Director, CSO Confidential; Renee Guttmann, Vice President, Information Security & Privacy Officer, Time Warner; David Kent, Vice President, Security, Genzyme; Dr. Claudia Natanson, CISO, Diageo; Craig Shumard, CISO, Cigna Corporation; and Andreas Wuchner, Head IT Risk Management, Security & Compliance, Novartis.

Don't miss