The Lighter Side Of The Cloud – Cloud Services
The Lighter Side Of The Cloud – Techwear
The Lighter Side Of The Cloud – Uh-Oh!
The Lighter Side Of The Cloud – Bed Box
The Lighter Side Of The Cloud – Thin Client

Information Security Professionals Need New Skills to Secure Cloud-based Technologies, Study Warns

Information Security Professionals Need New Skills to Secure Cloud-based Technologies, Study Warns

More than 70 percent of information security professionals admit they need new skills to properly secure cloud-based technologies, a survey conducted by Frost & Sullivan and sponsored by (ISC)2  revealed. The 2011 (ISC)2 Global Information Security Workforce Study (GISWS) is based on a survey of more than 10,000 (2400 in EMEA) information security professionals worldwide and some of its findings are alarming, including the fact that a growing number of technologies being widely adopted by businesses are challenging information security executives and their staffs.

The widespread use of technologies like cloud computing and deployment of mobile devices jeopardizes security of governments, agencies, corporations and consumers worldwide over the next several years, the survey said.

The survey also finds that most respondents believe they and their employees need new skills to meet the challenges of new technologies like cloud computing and the growing number of social networks and mobile device applications. Actually, these findings are not surprising since information security professionals have always been a step behind the growing number of new technologies that appear very fast. One could not expect that information security staff will be well-prepared to answer all security threats related to fast paced market of cloud computing and mobile devices. Moreover, information security professionals are under pressure from end-user who want new technologies to be deployed as soon as possible, sometimes underestimating the related security risks.

In the modern organization, end-users are dictating IT priorities by bringing technology to the enterprise rather than the other way around. Pressure to secure too much and the resulting skills gap are creating risk for organizations worldwide,” Robert Ayoub, global program director – network security for Frost & Sullivan, commented in a press release.

More alarming is that cloud computing illustrates a serious gap between technology implementation and the skills necessary to provide security. Over 50 percent of respondents admitted they are using private clouds (55 percent EMEA), with over 70 percent (75 percent EMEA) realize the need for new skills to properly secure cloud-based technologies.

However, respondents reported application vulnerabilities as the greatest threat to organizations with 72 percent of those surveyed worldwide are ranking application vulnerabilities as No. 1 threat.
Mobile security could be the single most dangerous threat to organizations worldwide, the survey revealed, while about 70 percent (67 percent EMEA) of respondents reported having policies and technology in place to meet the security challenges of mobile devices.

Social media is another big threat, and respondents reported inconsistent policies and protection for end-users visiting social media sites, according to the study. Viruses and worms, hackers and internal employees are considered less threatening compared to 2008, the most recent year of the study.

Demand for information security professionals will continue to grow at 13.2 percent a year until 2015, reaching 4.2 million (1.15 million in EMEA) compared to 2.28 million (over 617,000 in EMEA) in 2010. Regulatory compliance demands, greater potential for data loss via mobile devices and mobile workforce, and the potential loss of control as organizations shift data to cloud-based services are among the most important factors behind the growing demand for professionals.

We are seeing a paradigm shift in how organizations are operating, brought on by the triple impact of cloud computing, the pervasive use of mobile devices and social media via the corporate network, along with the wave of new applications being developed to support it all,” John Colley, CISSP, managing director for EMEA of (ISC)2, commented.

The survey was conducted among 10,413 information security professionals from companies and public sector organizations around the world in the fall of 2010, including 61 percent in the Americas, 22.5 percent in Europe, the Middle East and Africa, and 16.5 percent in Asia Pacific. Forty-five percent (42 percent EMEA) were from organizations with over 10,000 employees.

Read Our Case Studies Regarding Network Security

By Kiril Kirilov

Sorry, comments are closed for this post.

Recent

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Popular Archives

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising