Myth Or Reality: The Chief Data Officer

Heidi Shey

S&R pros, is there a Chief Data Officer (CDO) in your organization? Do you work with them? Previously, John and I wrote about the CDO role and how we believe that CDOs will help to drive security policy in the future because they can 1) directly tie business value to data assets, 2) have a deep understanding of data identity and purpose, and 3) possess a great incentive to protect the company’s data (it’s a strategic business asset after all!). Colleagues like Gene have also written about the CDO and the importance of the CDO in data management.

The emergence of this role now brings about more questions than answers, and we’d like to provide more in-depth analysis and clarity around this topic. What is a CDO, and what do they do exactly? Is this a temporary role, or a critical C-level position that is here to stay? Why should we even care about this CDO role? These and other questions are ones that a team of analysts from Forrester are exploring in upcoming joint research, and we’d love to hear from you if you are a CDO, currently work with one, or don’t feel there is a need for a CDO because there are other roles in your organization are responsible for data strategy. Some of the key themes we are looking into include:

  • The responsibilities of the CDO role
  • Where CDOs reside in firms’ organizational structure
  • How CDOs help their firms win, retain, and serve their customers
  • Common benefits and challenges faced by CDOs
Read more

Analyst Spotlight Podcast With Merritt Maxim

Stephanie Balaouras
This month’s S&R Analyst Spotlight Podcast features a slight change to our usual program: we have a guest host! Chris McClean, our San Francisco-based Research Director, interviewed the newest addition to our analyst team, Merritt Maxim. Merritt’s coverage areas include identity and access management, access governance, federation, authentication, and role design and management. In our podcast, Maxim tells us about his career before Forrester, his planned coverage area and his current must-read book on security. 
 
These Analyst Spotlights are all included in S&R’s First Look newsletters. Email srfl@forrester.com to be added to the list!
 
To download the mp3 version of the podcast, click here.
 

Merritt Maxim Image

 

Read more

Ice Dams And Identities: Remove Dams Before They Remove You

Merritt Maxim

This winter in Boston has been a record breaker. Bostonians are tired of the weather, while non-Bostonians are tired of hearing Bostonians complain about the weather. However, this never-ending winter provides a useful analogy for assessing your organization’s identity and access management (IAM) processes.

My analogy is based on two words that strike fear into many Boston-area homeowners: ice dams. Ice dams are ice structures that form on roofs, following heavy snowfall, that can cause leaks.[1]



Ice dams often dissipate naturally, but record snowfalls and persistent cold temps have exacerbated ice dams this winter.

Just as ice dams can cause leaks, “identity dams” can cause data leaks and other internal problems. Identity dams may result from reorganizations or may just be existing business processes, but they should be removed.  

The challenge is overcoming complacency. Just as many homeowners hope ice dams will dissipate naturally, organizations delude themselves with “This is how we’ve always done it,” and conclude that therefore removing identity dams is not necessary. For complacent organizations, the worst case is having users become accustomed to complicated manual processes for requesting access to new applications, waiting weeks to get access to new applications, and having multiple passwords.

Organizations and homeowners should follow these three steps to minimize the potential damage caused by ice dams and identity dams:

Read more

Infosec On The Go: What Do Your Road Warriors Know About Cybersecurity?

Heidi Shey

Did I pack socks? Check. Toothbrush? Check. Business cards, phone charger, passport? Check, check, and check. Do I know what I need to do and what not to do to protect myself, my devices and the company’s data while I’m on the road and traveling for work? [awkward silence, crickets chirping]

S&R pros, how would employees and executives at your firm answer that last question? It’s an increasingly important one. Items like socks and toothbrushes can be replaced if lost or forgotten; the same can’t be said for your company’s intellectual property and sensitive information. As employees travel around the world for business and traverse through hostile countries (this includes the USA!), they present an additional point of vulnerability for your organization. Devices can be lost, stolen, or physically compromised. Employees can unwittingly connect to hostile networks, be subject to eavesdropping or wandering eyes in public areas. Employees can be targeted because they are an employee of your organization, or simply because they are a foreign business traveler.

So what to do? Rick Holland and I are conducting research now to produce a guide to security while traveling abroad. It’s going to provide guidance for S&R pros to better prepare your executives and employees for travel, including actions to take before, during, and after a trip. We’ll be looking at considerations for things like:

  • OPSEC. How to determine if employees are being targeted, the pros/cons of using burner equipment, the use of privacy screens on laptops, etc.
Read more

Android For Work Upends Multiple Markets

Tyler Shields

On February 25, 2015, Google publicly announced its latest functionality and updates to the Android OS, titled "Android for Work" (AFW). Some of the new functionalities include secure work profiles, secure personal information management, and an enterprise app store through "Google Play for Work." These new changes in AFW will impact the businesses, the Android ecosystem, and the overall market in a far-reaching way. EMM vendors and enterprise EMM buyers must review these technology changes and understand how they will influence future product direction before making any purchases. It took just a few years for core MDM functionality to commoditize to a $0 price tag. I wonder how long until the advanced security components being folded into Android via AFW are also essentially free? 

 
Read my latest report here to see how this announcement will upend multiple mobile and security markets market: "QuickTake: Android For Work Upends Multiple Markets."

Market Overview: Cloud Data Protection

Andras Cser

Cloud Data Protection (protecting data in SaaS, IaaS and PaaS workloads with a centralized and industrial strenght solution) remains a key priority of CIOs, CISOs and architects. 

In this market overview report, we identified 17 key vendors in the CDP space (see the figure below) that provide data protection in SaaS, IaaS and PaaS environments. This report details trends and predictions in CDP and also our findings about how each vendor is approaching CDP and to help security and risk (S&R) professionals select the right partner for CDP.

You can find this market overview at https://www.forrester.com/Market+Overview+Cloud+Data+Protection+Solutions/fulltext/-/E-res120911

 

Inline image 1

Analyst Spotlight Podcast With John Kindervag

Stephanie Balaouras

It's February: time for another S&R Analyst Spotlight Podcast! This month, Forrester VP, principal analyst, and Zero-Trust creator, John Kindervag, joins us. Listen in to learn more about John and his research. While you're at it, be sure to check out our First Look newsletter, which contains an interview with John along with links to his most recent and upcoming research. If you are not already signed up for our First Look newsletters, please email srfl@forrester.com. 

New to the podcast and want to hear more?  Check out our past interviews with analysts Ed Ferrara, Heidi Shey, Renee Murphy, and Tyler Shields.

Click below to listen to the podcast!

John Kindervag Image

To download the mp3 version of the podcast, click here.

Cybersecurity Utilities: The Future Of Managed Security Services

Edward Ferrara

Cloud Will Transform Managed Security Services

The movement to cloud is fast changing the method companies will deploy and consume security services. The number one issue that drives the adoption of managed security services (MSS) and the business of managed security service providers (MSSPs) is complexity reduction. As companies replace premise-based data centers with virtual cloud data centers, the expectations of these customers will change as well, they look for elastic ways to purchase security services, as well as, methods that allow for the active defense of both cloud, and premise based workloads. Consider the following:

  • We have heard that the perimeter is dead, and many ways it is. We name the normal assassins and they include outsourcing, mobile solutions, and the cloud. 
  • Another truism is that companies never wanted to be in the information technology business in the first place. Information technology has brought real productivity improvements but it has also brought significant costs.
  • Moving information technology to the cloud provides companies the opportunity to reallocate costs from capital expenditures to operational expenditures and reassign operations staff to other roles. 
Read more

Application Security Technologies List

Tyler Shields

Roughly a year and a half ago I began a process of measuring the importantance of technologies in the mobile security space. I'm currently beginning that same process for the application security market. Many technologies exist that provide business value to enterprises for the security of their applications, but which ones are better at delivering on the business value that the enterprise really wants? Have any of these technologies outlived their usefullness, falling to innovation and new ideas? Which technologies should the enterprise prioritize spending their limited security budget on? I hope to answer these questions and more!

I've identified nine distinct application security technologies that make up the application security market. (Link to additional details!). I'm sure there are technologies that I've missed and arguments to be made to remove something. As always, my research is significantly improved with your help! 

If you are interested in participating in this research or have feedback on the technology list, respond via this web form, in the comments below, or via email / tweet to tshields@forrester.com (@txs). 

Read more

Security Of Your Data Doesn't Matter To Smart Device Vendors At CES Tech West . . .

Tyler Shields

The CES Tech West Expo has a number of specific areas of coverage including fitness and health, wearables, connected home, family safety, and some young innovative companies located in the startup area of the section. I spent a few hours interviewing and discussing the Internet of Things (IoT) with as many vendors as I could find. I had many good laughs and shed a few tears during the process. To describe the process, the general communication would go something like this:

Me: "Can you point me at the most technical person you have at your booth? I'd like to talk about how you secure your devices and the sensitive / personal data that it accesses and collects."

Smartest tech person at the booth: "Oh! We are secure; we [insert security-specific line here]."

Me: "Never mind . . ." (dejected look on my face).

Read more