InfoSec 2014: a New Chapter for the Security Industry

2014 is the last year Infosecurity Europe will be hosted in Earls Court, London. Next year it moves to a brand new venue – Olympia, London.

So it's somewhat fitting that this year’s show heralds a shift in the trends, buzz words and tone.

InfoSecurity Europe

No longer is the word ‘cloud’ everywhere on the stands and in speaker summaries. That’s not to say the concept is no longer recognized – it’s just very quickly become a de facto approach for IT planning and investment.

However, what’s really interesting is the type of emerging trends left exposed now that the dominant ‘cloud’ term has become less prominent.

In this post I wanted to explore one trend in detail (I’ll be exploring others in future posts) - the change in emphasis between external and internal threats. In a post-Snowden world of data security the accent on the risk presented by an organization’s users has been obvious - not only have I noticed more stands showing messages about the likes of ‘user policy management’ but also the keynote presentation from pwc highlighted the same shift.

pwc’s 2014 Cyber Security Breaches Survey, announced yesterday at InfoSec, makes for really interesting reading and will be downloadable in full here. What immediately jumped out at me was the percentage of large organizations that suffered staff-related security breaches – 58%. In addition, 31% of the worst security breaches in the year were caused by inadvertent human error and a further 20% by deliberate misuse of systems by staff.

According to the research, while the number of security breaches seems to be receding the overall cost of the breaches is increasing. No wonder then that the IT industry is looking with more purpose at administration and in particular detailed user profiling as a means of reducing the risk companies are facing.

If you’d like to talk about this or any other emerging trends and are attending InfoSec in London this week, do stop by stand F86 – we’d be happy to talk about the future of information security…and of course we’ve loads of prizes to be won.

FILED IN