APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Enterprise Security
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 )
    left
    What Keeps Your Security Chief Up at Night: Keeping the Enterprise Secure is a Round-the-Clock Job

    Gary Eppinger, Global CISO, Carnival Corporation

    Security is Only As Good As Your Weakest Link

    Sam Schoelen, CIO, Continental Resources

    Mobility x Security

    Daniel Sobral, CSO, JBS USA

    The Employee-An Organization's Security Downfall or a Hidden Security Gem

    Gordon MacKay, EVP and CTO, Digital Defense

    Viewing Security With A Service Perspective

    Gary Eppinger, Global CISO, Carnival Corporation

    Inaccurate Data Creating a False Sense of Security

    Larry Hurtado, President & CEO, Digital Defense, Inc.

    Enterprise Security Strategies in Todays Threat Environment

    Mike Convertino, VP and Chief Information Security Officer (CISO), F5 Networks

    right

    Managing Security At The Speed Of Business

    Nimmy Reichenberg, VP-Marketing and Business Development, AlgoSec

    Tweet
    content-image

    Nimmy Reichenberg, VP-Marketing and Business Development, AlgoSec

    What significant changes did the enterprise security sector witnessed in 2013? What did these changes mean to vendors and customers?

    2013 intensified the need of security teams to become enablers as opposed to naysayers. Security has to embrace employee owned mobile devices, cloud and social apps to keep their companies productive. On the other hand, the dramatic rise in publicized (and non-publicized) breaches are quickly getting the attention of board rooms–making security more visible and influential, but also more accountable and scrutinized. Vendors and customers must learn to strike the right balance between enabling business and keeping it safe.

    What are some of the changes you had anticipated would happen in 2013 but did not happen?

    I expected the industry to become much better at sharing breach information to more effectively combat threats. While everyone agrees this is beneficial, we have seen little change in 2013.

    Can you paint us how the enterprise security landscape will change in 2014? What are some of the broader trends you are closely watching?

    The three biggest trends remain cloud, mobile and advanced threats. Organizations continue to migrate applications and data centers to private, hybrid and public clouds, and must ensure they have the right tools and processes to secure the cloud and continue to deliver applications “at the speed of business”. Bring Your Own Device (BYOD) initiatives are not mature at most organizations, and securely enabling work on non-corporate devices remains a challenge. Finally, targeted threats continue to inflict major damage, forcing companies to rethink their defenses.

    How customers' spend will change in 2014 for enterprise security? What makes you think customers will be buying more/less?

    Security spending is expected to increase due to highly publicized breaches and the fact that security is now a boardroom discussion. The sad fact remains that threats have progressed at a faster pace than organizations have been able to roll out the latest security technologies, so 2014 will most likely be another year of ‘catch-up’.

    What's in store for your company in 2014?

    AlgoSec’s focus in 2014 is to enable organizations manage security at the speed of business and effectively deal with the complexity that makes securing and delivering business applications particularly challenge. Another focus for us is to provide security organizations with the tools to understand their risk from the business perspective, so that they can communicate more effectively with business stakeholders and ultimately have them “own the risk."

    Check out: Top Endpoint Security Consulting Companies See Also: Top Security Solution Companies

    Weekly Brief

    loading
    25 Most Promising Enterprise Security Service Providers
    ON THE DECK

    Enterprise Security 2016

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://enterprise-security.apacciooutlook.com/cxoinsights/managing-security-at-the-speed-of-business-nwid-4226.html