Cyber Security Institute

§ Current Worries

Top 3 Worries

  • Regulations
  • Old Firewall Configurations
  • Security Awareness

§ Listening

For the best information

  • The underground
  • Audible
  • Executive Excellence
  • Music (to keep me sane)

§ Watching

For early warnings

  • 150 Security Websites
  • AP Newsfeeds
  • Vendors

Wednesday, June 12, 2013

Gartner Says by 2019, 90 Percent of Organizations Will Have Personal Data on IT Systems They Don’t O

Gartner predicts that by 2019, 90 percent of organizations will have personal data on IT systems that they don’t own or control. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems,” said Carsten Casper, research vice president at Gartner.


Many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider,” said Mr. Such decisions are easier if employee performance information is stored in an HR management system, customer information is stored in a CRM system, and financial and business information is stored in an ERP system. Regardless of the specific privacy standard and cross-border transfer mechanism used, the most difficult challenge for organizations is to make such rules binding on all entities involved, including all employees, and accept liability in cases where employees or customers suffer harm. Given that this information can be accessed from the other end of the world in a fraction of a second, the physical location should be increasingly irrelevant. Yet this physical location is still what many regulators insist on, although the legal location should be most relevant from a regulatory perspective. As an example, personal data might be stored in a data center of a U.S. cloud provider, which is operated by a third-party service provider from India.

This report is part of the Gartner Special Report “The Future of Global Information Security” The special report can be viewed at http://www.gartner.com/technology/research/security-risk-management/ and includes links to reports and commentary that explore the major tectonic forces at play that will change how business use of technology will be dramatically changed by rapid escalations in threat, defense and societal demands.


This summit is the premier gathering for senior IT and business executives across IT security and risk management, including privacy, compliance, business continuity management (BCM), IT disaster recovery and business resiliency. The summit offers five role-based programs that delve into the entire spectrum of IT security and risk, including: network and infrastructure security; identity and access management (IAM); compliance; privacy; fraud; BCM; and resilience.


Link: http://bw.newsblaze.com/release/2013061206482800001.bw/topstory.html

 

Posted on 06/12
TrendsPermalink