Security Bytes

Jun 4 2007   8:56AM GMT

Gartner confab looks to Security 3.0

Leigha Leigha Cardwell Profile: Leigha

Today is the first full day of Gartner’s annual IT Security Summit in Washington D.C., and the first order of business is the morning slate of keynotes. First up was Gartner analyst John Pescatore.

Pescatore talked about Security 3.0, the theme of this year’s show. It’s based on the concept of businesses integrating security more tightly into all the technology their customers are using, to stay ahead of evolving security threats.

In the old days, he said, IT could restrict the user. Then came the age of Security 2.0, where IT struggled to keep up with a deluge of new point technologies. New technology came into widespread use far faster than the ability of IT to secure it all. At the same time, the bad guys picked up on flaws in all the emerging technology and began to exploit it.

Pescatore noted that another huge change is underway in how companies are using technology to do business.

“With the consumerization of IT, through the use of blogs, wikis, etc., things are changing again in a fundemental way,” he said. “The bad guys are finding a rich target environment and are using attacks that run quiet and deep.”

He noted how attackers are using malware hidden within things like screen savers and Web sites to go after specific parts of a company’s infrastructure, with the goal of stealing critical data. As a result, he said, we’ve seen the steady stream of data breaches in the past two years.

Pescatore said Security 3.0 is about staying ahead of evolving threats by integrating security into the larger IT infrastructure. “It’s about moving from whack-a-mole to a chess game where we can deploy security in one place so the attacker has to move in another direction,” he said. “The idea isn’t necessarily to win, but to always be a couple steps ahead of the bad guys and force them into a stalemate.”

This, he said, can be done by baking security into every phase of how businesses do things. Long term, security must be integrated into all application development and procurement. Critical parts of the process must include NAC, intrusion prevention, ID and access management, and vulnerability management.

The next keynote will be delivered by Greg Crabb, program manager for the Postal Inspection Service’s International Affairs Group. He’ll talk about investigating international cybercrime affecting the U.S. Mail and private express couriers.

I’ll file a fresh posting with his remarks a bit later.
Technorati Tags: ,

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: