{"id":390,"date":"2015-10-25T16:23:41","date_gmt":"2015-10-25T16:23:41","guid":{"rendered":"http:\/\/swivelsecure.com\/?p=390"},"modified":"2019-01-17T09:31:30","modified_gmt":"2019-01-17T09:31:30","slug":"the-it-security-risk-assessment-the-elephant-in-the-boardroom","status":"publish","type":"post","link":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/","title":{"rendered":"The IT Security Risk Assessment: The Elephant in the Boardroom"},"content":{"rendered":"<h2 class=\"desktop--three-quarters\">Swivel Secure: Without a New Approach to Risk, Cloud &amp; IoT Could Derail Enterprise Security<\/h2>\n<div class=\"desktop--three-quarters\">\n<p>A new whitepaper from multi factor authentication provider, Swivel Secure, entitled \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 highlights how transformative technologies like Internet of Things, cloud and mobile could derail enterprise security entirely unless a new enterprise-wide approach to assessing risk is adopted by the board, the IT and information security (IS) departments.<\/p>\n<p>The paper explores the security challenges facing IT and IS departments as they seek to integrate the new with the old, without impacting the end-user experience or the performance of their systems. As department specific cloud based services proliferate, enterprise IT decision making is shifting away from the traditional IT and IS departments, resulting in systems and data security vulnerabilities disappearing from view.<\/p>\n<p>Chris Russell, CTO, Swivel Secure comments: \u201cAs companies increasingly move to using BYOD and the cloud, IT and IS departments must remain central to both the selection and the migration process, if they are to prevent security chaos. In recent years, the number of devices and cloud gateways used to access corporate data have rocketed. What can seem like an obvious strategic move to the board, like using digital transformation to cut costs and promote productivity, can present serious risks to the firm\u2019s data security. Unless the board learns from the mistakes of BYOD, the coming of the Internet of Things could make an already bad situation dramatically worse. A fresh approach to the culture of risk is needed if tomorrow\u2019s enterprises wish to strike an appropriate balance between protecting their data and harnessing transformational technologies.\u201d<\/p>\n<p>\u201cBy increasing the number of gateways onto the corporate network, IoT implementations risk creating a new wave of fresh vulnerabilities,\u201d adds Russell. \u201cReputational and financial damage loom large for companies that embrace IoT without taking steps to ensure that full visibility, security management and proper development practices remain central to the evolution of their systems.\u201d<\/p>\n<p>The white paper contends that only by taking a fresh and rigorous approach to estimating risk can companies mitigate unacceptable security issues and appropriately guard their sensitive data and assets. Any such risk assessment must take a holistic view of the entire business, including areas of digital transformation, to assess what is \u2018business-critical\u2019. It must then implement policies and procedures, including risk based adaptive multi-factor authentication, that must be adhered to at all levels, but which are also flexible enough to cater to business strategy needs.<\/p>\n<p>\u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 will be of interest to IT and IS professionals, senior executives and board members advocating digital transformation.<\/p>\n<p>The paper is available without charge from\u00a0<a href=\"http:\/\/swivelsecure.com\/product-features\/adaptive-authentication\">http:\/\/swivelsecure.com\/product-features\/adaptive-authentication<\/a><\/p>\n<p>If you would like to discuss your multi-factor\u00a0authentication needs, please\u00a0<a href=\"http:\/\/swivelsecure.com\/contact\">Contact us.<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Swivel Secure: Without a New Approach to Risk, Cloud &amp; &hellip;<\/p>\n","protected":false},"author":2,"featured_media":391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pressrelease"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The IT Security Risk Assessment Elephant in the Room<\/title>\n<meta name=\"description\" content=\"A new whitepaper entitled \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 highlights how transformative technologies could derail enterprise security entirely\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The IT Security Risk Assessment: The Elephant in the Boardroom\" \/>\n<meta property=\"og:description\" content=\"A new whitepaper entitled \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 highlights how transformative technologies could derail enterprise security entirely\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/\" \/>\n<meta property=\"og:site_name\" content=\"Swivel Secure\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-25T16:23:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-17T09:31:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1256\" \/>\n\t<meta property=\"og:image:height\" content=\"837\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victoria Laws\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victoria Laws\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/\",\"url\":\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/\",\"name\":\"The IT Security Risk Assessment Elephant in the Room\",\"isPartOf\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg\",\"datePublished\":\"2015-10-25T16:23:41+00:00\",\"dateModified\":\"2019-01-17T09:31:30+00:00\",\"author\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\"},\"description\":\"A new whitepaper entitled \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 highlights how transformative technologies could derail enterprise security entirely\",\"breadcrumb\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#primaryimage\",\"url\":\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg\",\"contentUrl\":\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg\",\"width\":1256,\"height\":837},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swivelsecure.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The IT Security Risk Assessment: The Elephant in the Boardroom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swivelsecure.com\/us\/#website\",\"url\":\"https:\/\/swivelsecure.com\/us\/\",\"name\":\"Swivel Secure\",\"description\":\"Protecting Identities with Intelligent Authentication\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swivelsecure.com\/us\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\",\"name\":\"Victoria Laws\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"caption\":\"Victoria Laws\"},\"url\":\"https:\/\/swivelsecure.com\/us\/blog\/author\/v-laws\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The IT Security Risk Assessment Elephant in the Room","description":"A new whitepaper entitled \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 highlights how transformative technologies could derail enterprise security entirely","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/","og_locale":"en_US","og_type":"article","og_title":"The IT Security Risk Assessment: The Elephant in the Boardroom","og_description":"A new whitepaper entitled \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 highlights how transformative technologies could derail enterprise security entirely","og_url":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/","og_site_name":"Swivel Secure","article_published_time":"2015-10-25T16:23:41+00:00","article_modified_time":"2019-01-17T09:31:30+00:00","og_image":[{"width":1256,"height":837,"url":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg","type":"image\/jpeg"}],"author":"Victoria Laws","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Victoria Laws","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/","url":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/","name":"The IT Security Risk Assessment Elephant in the Room","isPartOf":{"@id":"https:\/\/swivelsecure.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#primaryimage"},"image":{"@id":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#primaryimage"},"thumbnailUrl":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg","datePublished":"2015-10-25T16:23:41+00:00","dateModified":"2019-01-17T09:31:30+00:00","author":{"@id":"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514"},"description":"A new whitepaper entitled \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 highlights how transformative technologies could derail enterprise security entirely","breadcrumb":{"@id":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#primaryimage","url":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg","contentUrl":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/architecture-blue-building_160606_155132.jpg","width":1256,"height":837},{"@type":"BreadcrumbList","@id":"https:\/\/swivelsecure.com\/us\/blog\/2015\/10\/25\/the-it-security-risk-assessment-the-elephant-in-the-boardroom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swivelsecure.com\/us\/"},{"@type":"ListItem","position":2,"name":"The IT Security Risk Assessment: The Elephant in the Boardroom"}]},{"@type":"WebSite","@id":"https:\/\/swivelsecure.com\/us\/#website","url":"https:\/\/swivelsecure.com\/us\/","name":"Swivel Secure","description":"Protecting Identities with Intelligent Authentication","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swivelsecure.com\/us\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514","name":"Victoria Laws","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","caption":"Victoria Laws"},"url":"https:\/\/swivelsecure.com\/us\/blog\/author\/v-laws\/"}]}},"_links":{"self":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/posts\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":0,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/posts\/390\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/media\/391"}],"wp:attachment":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/media?parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/categories?post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/tags?post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}