Expect conflict in 2012 as consumerisation raises security alarm bells for CIOs

End users everywhere are demanding that IT executives figure out how to let them bring their own smartphones and laptops to work. Yet even as consumerisation tops lists of IT priorities for 2012, vendors are taking new approaches to security as a majority of CIOs worry that the BYO pendulum has swung too far and will, through the normalisation of off-net mobility, create new business risks due to unaddressed shortcomings in management and security strategies.

Recently released research, conducted for Compuware by research firm Vanson Bourne, surveyed 520 CIOs across the US, UK, France, Germany, Italy, Belgium, the Netherlands, Luxembourg, Australia and Japan, showed that fears around the spread of mobility were common amongst CIOs.

Among the most interesting findings: 67 per cent of business mobility projects were proceeding without the "full involvement" of the IT organisation, while 64 per cent believe the lack of transparency into cloud/software-as-a-service (SaaS) deployments is rolling back the maturity of IT; an equal percentage said it is "almost impossible" to deliver IT support for mobility initiatives.

As a result, 77 per cent of CIOs said consumerisation of IT is creating unacceptable business risk – and this is unlikely to change until controls over mobile initiatives allow better management of security risks and improved governance overall.

That concern is likely to create conflict between users' expectations and CIOs' warmth towards BYO – especially with vendors expecting mobile malware to become an even bigger threat and the likes of M86 Security Labs expecting that in 2012 cybercriminals will target increasingly complex attacks at social networking users, third-party software, cloud-based services, compromised Web sites and the use of spam to distribute malware.

Security vendor Trend Micro's own 2012 predictions (PDF) warn that those that jump into BYO without moderating their exposure, it seems, do so at their own risk.

Recognising a new market opportunity, security vendors are rushing to offer tools for enterprises to identify and address these security deficiencies. Bitdefender, for example, recently launched a holistic defence it calls Bitdefender Sphere, a "unified security solution" that the company says protects Windows, Mac and Android smartphones and tablets using an overarching security perimeter.

Symantec is also moving to help CIOs improve their decision-making, with its recently-released Mobile Security Assessment Suite that lets CIOs and CSOs evaluate their exposure to external attackers, malicious internal users, and employee attacks. Its scope includes enterprise policies and processes around mobility, with pen testing considered essential to ferret out potential vulnerabilities in a range of use cases.

Join the CSO newsletter!

Error: Please check your email address.

Tags BYODmobilitymobile phonessmartphoneslaptops

More about CompuwareM86SymantecTrend Micro Australia

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts