Security 3.0: Chess, not Whac-A-Mole

Companies that want to spend less of their IT budget on security and improve its effectiveness must “bake in” security across their operations so it becomes a part of the business process, not an afterthought.

“If you get something baked into a business process, it almost never goes away,” said John Pescatore, vice-president and distinguished analyst with Gartner, who kicked off the Gartner IT Security Summit in Washington, D.C., earlier this month. “It’s not just thinking about security, but having people do it as part of their jobs.”

Pescatore made the analogy of security professionals playing the arcade game Whac-A-Mole, using a big stick to fight off threats as they pop up. Instead, security professionals should fight threats as though they’re playing a game of chess, where no one move can end the game and where skillful players contain their opponents to areas of the board they can control and always are thinking a couple of moves ahead.

Getting to that point, which Pescatore calls Security 3.0, or “skating ahead of the puck,” takes significant changes in the way an entire organization prioritizes security.

Many companies already have increased their spending on security, yet threats continue to come from new and varied places. For example, the “consumerization of IT,” which Gartner defines as employees using their own devices at work, and the rise of wikis, blogs and other Web 2.0 technologies, gives the IT department less control over technology while opening up systems to new threats, Pescatore said.

Nevertheless, the idea isn’t to spend even more on security, he said. In 2006 the average company spent about five per cent of its IT budget on security, not including data recovery. However, there’s little correlation between increased spending and heightened security. Instead, companies should insist that security be present in many different business processes – application design and development, procuring third-party services, making RFPs, and testing and evaluation – so that it doesn’t have to be retrofitted after the fact.

“You have to figure out ways to get [security] protections built in,” Pescatore said. “Then the spending isn’t coming out of the security budget.” This approach offers better security controls, because they’re organic instead of retrofitted, and frees up security spending for more strategic initiatives, he said.

“If [companies] can get to this level of operational excellence, they can get back to spending three per cent to four per cent of their IT budgets on security,” he said. Other priorities for security professionals today include taking advantage of compliance funding to help drive security, Pescatore said. “It’s very important not to just report more about compliance, [but to achieve] more protection of data.”

There is a set of critical security processes that are tactical approaches today but will lay the groundwork for strategic systems going forward, he said. These include network access control, intrusion prevention, identity and access management, vulnerability management, and data security.

Buying the most secure products available so that less money is spent trying to fix things is also key, Pescatore said.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Story

How the CTO can Maintain Cloud Momentum Across the Enterprise

Embracing cloud is easy for some individuals. But embedding widespread cloud adoption at the enterprise level is...

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.

Featured Tech Jobs