BEDFORD, Mass., Jan. 3, 2013 /PRNewswire/ --

News Summary:


    --  A special report from the Security for Business Innovation Council
        (SBIC) urges rapid-fire changes to information security strategies to
        take on the transformational forces of cloud computing, social media,
        mobile, and Big Data.
    --  As enterprises intensify their adoption of advanced technologies, it is
        exposing significant gaps in information security programs such as lack
        of business skills and relationships, supply chain management and
        tech-savvy action plans.
    --  Recommendations outline how security teams can reduce risk through rapid
        innovation.

Full Story:

RSA(®), The Security Division of EMC(®) Corporation (NYSE: EMC), released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, enterprise mobility and social media will transform enterprise IT and hammer away at the foundations of information security strategies in 2013.

The Security for Business Innovation Council's latest report, titled "Information Security Shake-Up: Disruptive Innovations to Test Security's Mettle in 2013," is derived from the expertise and real-world experiences of 19 security leaders, who represent some of the world's most forward-thinking security organizations.

The Council's latest report details four strategies to help enterprises adapt information security programs to help enable business innovation over the next 12 months. These strategies include how to boost risk and business skills, court middle management, tackle IT supply chain issues and build tech-savvy action plans. The Council's guidance will help enterprises face the impact of the technology adoption of cloud computing, social media, mobile and Big Data. The Council also outlines the major impacts of these trends for security teams and how to address them.


    1. Cloud Computing - The accelerated adoption of cloud will push security
       concerns to the forefront.  In order to meet requirements, enterprises
       will need to find ways to effectively evaluate their providers' security
       controls - which also includes implementing continuous monitoring.
    2. Social Media - Security teams will need comprehensive policies and
       effective security controls to actively manage the risks of social media.
       A good social media risk management strategy will need to involve a
       multidisciplinary team.
    3. Mobile - The risks of mobile adoption continue to increase forcing
       security teams to have to carefully manage these risks to reap the
       rewards without major incidents.  Security teams will need to build
       strategies with the understanding that the end-point is not trusted.
    4. Big Data - The value of Big Data will require security teams to build out
       multi-year plans to properly evolve their security management model. 
       These plans will enable security teams to utilize Big Data to detect and
       more effectively remediate security threats.  To be the most effective
       security teams must also be involved in any new Big Data projects from
       the onset in order to understand the impending risks and develop the
       strategies to manage them.

Executive Quotes:

Eddie Schwartz, Chief Information Security Officer, RSA, The Security Division of EMC

"Information security must evolve in 2013 from reactive perimeter and signature-based approaches, to risk-based programs that protect the most important business assets in whatever context they may exist - cloud, mobile, or traditional data center. To succeed security leaders must invest in intelligence-driven strategies that harness the power of Big Data analytics and agile decision support."

Dr. Martijn Dekker, Senior Vice President, Chief Information Security Officer, ABN Amro

"Information security isn't just about IT anymore. Trends like cloud computing and consumerization are quickly extending the information-security role. It's about business. It's about people. It's about risk management."

About the Security for Business Innovation Council

The Security for Business Innovation Council is a group of top security leaders from Global 1000 enterprises committed to advancing information security worldwide by sharing their diverse professional experiences and insights. The Council produces periodic reports exploring information security's central role in enabling business innovation.

Contributors to this report include 19 security leaders from some of the largest global enterprises:


    ABN Amro    FedEx                Nokia
    ADP, Inc.   Fidelity Investments SAP AG
    Airtel      Intel                TELUS
    AstraZeneca HDFC Bank            T-Mobile USA
    Coca-Cola   HSBC Holdings plc.   Walmart
    eBay        Johnson & Johnson
    EMC         JPMorgan Chase

Additional Resources


    --  Download the Security for Business Innovation Council Report
    --  Watch Video of Dave Martin on 2013 SBIC Trends Report
    --  Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA
        Speaking of Security Blog and Podcast

About RSA

RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance- management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.EMC.com/RSA.

EMC and RSA are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other products and/or services are trademarks of their respective owners.

SOURCE EMC Corporation