Discover Performance

HP Software's community for IT leaders // March 2014
Subscribe

Security strategy

Shift to protecting what matters most

CISOs need to adapt at least as quickly as their adversaries. HP Enterprise Security SVP Art Gilliland talks about protecting your data—and which data’s really worth your security spend.

Weigh your options

IT landscape

Security in 2014: New strategies against stronger foes

Security is more than the perimeter, says threat expert Scott Lambert of HP Security Research. Understanding how things are connected, and what really needs protecting, is key.

Outside the box

CISO insight

Security lessons from cybercriminals

Jacob West, CTO of HP Enterprise Security, discusses lessons that you can learn from cybercriminals to boost your organization’s overall security strategy.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Big Data changes everything

HP CEO Meg Whitman discusses how connected intelligence will drive IT operations, application development, IT security, marketing, compliance—and the bottom line. Register now.

HP Protect 2014

Connect with nearly 1,500 security pros to learn how to better disrupt or mitigate threats. Learn to think like a bad guy. (Washington, D.C., Sept. 8 – 11)

Closing the book on Heartbleed

The Heartbleed vulnerability set users and enterprises scrambling. How can we avoid or mitigate the next Heartbleed?

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.

Security index

60

Percentage of security budgets that will be allocated to vulnerable legacy systems by 2015.1

40

Percentage of annual security budgets earmarked for the network layer in 2013 (garnering the lion’s share; the host layer receives the least amount of the budget at 5 percent).2

65.5 days

Average time required to resolve malicious insider attacks in 2013 (followed by malicious code at 49.8 days, and Web-based attacks at 45.1 days).2

1IDC Releases Market Predictions for 2014: CIO Agenda,” IDC, December 2013
22013 Cost of Cyber Crime Study: United States,” Ponemon Institute, October 2013

One question

Q: What will be a high-priority security concern in the coming year?

A: Privacy will remain at the center of many discussions in 2014. The revelations of 2013 have seriously rocked the trust countries had in one another, resulting in new legislation making cross-country data access more difficult. Beyond the hype and the disinformation, clear guidelines will have to be established to avoid stopping the globalization of the information economy. Supra-national organizations have to establish sound guidelines on how to treat personal information. I’m sure this is at the center of the current U.S.–EU free trade discussions. It takes time for such guidelines and legislation to emerge, but I’m sure 2014 will be fertile on the subject.

— Christian Verstraete, HP Chief Technologist, Cloud Advisory Services, on Enterprise CIO Forum

HP Security Research blog

Tweets @ HPSecurity