Discover Performance

HP Software's community for IT leaders // September 2013
Subscribe

Expert Q&A

The struggle for secure apps

Enterprise security authority Gary McGraw charts the growth of app security and why, even in the mobile/cloud age, developers don’t bake it in from the start.

Secure silo

Security sidebar

How to close the security skills gap

IT security guru Gary McGraw says bosses should insist that new developers know a thing or two about security—and then invest in teaching them even more.

Manage the risk

Security strategy

Is security intelligence wasted on your organization?

HP security strategist Rafal Los counts off the five reasons security intelligence may not do you any good—so you can reach the stage where it will.

Handle the truth

Leadership

Care and feeding of Gen Y

Senior IT consultant Tammy Hughes offers a user’s manual for managing the next generation of IT worker: the millennials.

Who needs a hug?

CIO insight

Cyber-crime lessons

HP Enterprise Security SVP Art Gilliland explores cyber-crime innovation—and the lessons CISOs can learn from these efficient, nimble, innovative predators.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.

Security index

$136

Globally, the average cost of a data breach per compromised record in 2013, up from $130 in 2012.1

608,087,870

Total number of records containing sensitive personal information involved in security breaches in the United States in 3,763 data breaches since January 2005.2

$805,549

Average cost incurred by large North American companies in the wake of a cyber-attack ($616,000 is the average cost for large European companies).3

1 "2013 Cost of a Data Breach: Global Analysis," Ponemon Institute and Symantec, June 2013
2 "A Chronology of Data Breaches," Privacy Rights Clearinghouse, June 28, 2013
3  "Average cyber-atttack clean-up totals $616K," infosecuritymagazine.com, June 28, 2013

One question

Q: How can security be a value-add rather than a constraint?

A: If we think of security as not something special but instead having more in common with other parts of IT and how they add value, our perspectives can shift. … Security techniques recognize new patterns of behavior—good, bad, or indifferent. What can the business do with that knowledge? Security approaches try to identify where people are coming from, where they are going, what they are doing while they are interacting with the business; what other parts of the business are interested in this sort of metadata? As I’ve mentioned to others (particularly around disaster recovery and cyber-attack avoidance), it is not usually our lack of preparedness that we need to worry about, it is our lack of imagination.

—Charlie Bess, HP Fellow and Cloud Advisor, on the Enterprise CIO Forum

HP Security Research blog

Tweets @ HPSecurity