data security 2016 trends and questions
TRANSCRIPT
![Page 1: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/1.jpg)
DATA SECURITY
2016TOP FIVE TRENDS
![Page 3: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/3.jpg)
“I need to know about the latest data security trends so that I can ensure my companies and my candidates have the skills they need to keep their data safe and protect their brand and information assets.”
GARTNER SAYSProtecting the IOTwill get progressively
moredifficult based onthese TRENDS…and I
have come up with the questions we should be asking ourselves in 2016
![Page 4: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/4.jpg)
TREND ONE:IT Security companies are consolidating—providing a better user experience.Is seamless UX the same as seamless security?
![Page 5: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/5.jpg)
TREND TWO:Responsible Disclosure requirements grow
Do you have a policy to self-regulate your “white hat” findings?
![Page 6: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/6.jpg)
TREND THREE:Small business hacks are on the rise- Do your IT teams have a “there is no try, only do” attitude to ensure SMB security?
![Page 7: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/7.jpg)
TREND FOUR:Cloud denizens share responsibility for data securityDo you have the right security add-ons in your cloud services contracts?
![Page 8: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/8.jpg)
TREND FIVE:Are your Incident Response Protocols ready with IOT-breach messages?Can you calm investors and consumers in the event you’re hacked?
![Page 9: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/9.jpg)
I keep up with these trends so you can staff for next-gen data security. See full article or..Follow me on Linked In, Twitter or for more…
![Page 10: Data security 2016 trends and questions](https://reader036.vdocuments.mx/reader036/viewer/2022083111/58f0e50e1a28ab6b778b45a7/html5/thumbnails/10.jpg)
Ready in 2016: Resources Amazon’s shared responsibility model Information Management article Email or call me:
[email protected] 303-337-7871