{"id":402,"date":"2016-04-27T16:30:14","date_gmt":"2016-04-27T15:30:14","guid":{"rendered":"http:\/\/swivelsecure.com\/?p=402"},"modified":"2019-01-22T10:14:27","modified_gmt":"2019-01-22T10:14:27","slug":"risk-the-answer-to-the-transformative-technology-security-nightmare","status":"publish","type":"post","link":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/","title":{"rendered":"Risk \u2013 the answer to the transformative technology security nightmare"},"content":{"rendered":"<div class=\"desktop--three-quarters\">\n<p><em>Chris Russell, CTO, Swivel Secure<\/em><\/p>\n<p>They say that every silver lining comes with a cloud attached and that\u2019s certainly true of today\u2019s transformative technologies. CEOs and the board rightly see Bring Your Own Device (BYOD), Cloud and Internet of Things (IoT) initiatives as a gateway to a world of increased productivity and growth. But for IT and information security (IS) departments that same gateway leads somewhere quite different: to a networked environment littered with security vulnerabilities.<\/p>\n<p>Gartner says that 38% of all IT spending is now happening outside the IT department, with the figure continuing to rise. And as the spending goes, so does the control. Without control of the technology, IT and IS lose visibility of any resulting security issues.<\/p>\n<p>BYOD and Cloud users have already shown a propensity for poor security practice, with inadequate passwords, insufficient device control and monitoring and security measures that simply aren\u2019t rigorous enough for the enterprise environment. Outsourcing adds problems too, with many CIOs uncertain about their ability to assess the security of their cloud providers.<\/p>\n<p>IoT looks set to make matters even worse. Suddenly IS\u2019s area of concern extends way outside the network perimeter, through sensors and gateways, potentially into to customers\u2019 facilities and homes. For IoT to fulfil its promise, these new touch points must be easy to access, yet remain tamper resistant and tamper evident even though constantly connected.<\/p>\n<p>Worrying? You bet. A lost cause? Absolutely not.<\/p>\n<p>The answer lies in risk and in reintegrating the IT and IS departments back into transformative technology based developments within the enterprise. Swivel\u2019s latest white paper \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019 explores this problem and how to resolve it, making the case for CEOs to release funding to prioritise the implementation of IT security risk assessments. The key point is this: without assessing the risks associated with this profound technological change, corporate IT teams will lack the insights they need to defend their sensitive corporate data as they embrace their organisation\u2019s digital transformation.<\/p>\n<p>There are unparalleled security challenges facing IT and IS departments as they seek to integrate the new with the old, without impacting the end-user experience or the performance of their systems. Only by reinventing how security risk assessments are performed, together with the adoption of risk based, adaptive, multi-factor authentication, can a bridge be built between IT, IS and other departments, that enables firms to strike an effective balance \u2013 or \u2018identify appropriate levels of friction\u2019 \u2013 between the adoption of protectionist and, in some cases, interventionist information security policies. Once these measures are in place, the adoption of enabling technologies capable of fostering innovation and improving business performance can proceed unhindered, confident in the knowledge the firm\u2019s sensitive data is appropriately locked down.<\/p>\n<p>Read our latest whitepaper \u2018The IT Security Risk Assessment: The Elephant in the Boardroom\u2019\u00a0<a href=\"\/product-features\/adaptive-authentication\">http:\/\/swivelsecure.com\/product-features\/adaptive-authentication<\/a><\/p>\n<\/div>\n<div class=\"share-post\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Chris Russell, CTO, Swivel Secure They say that every silver &hellip;<\/p>\n","protected":false},"author":2,"featured_media":404,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Risk - Assessing Transformative Technology Security<\/title>\n<meta name=\"description\" content=\"Reintegrating the IT department back into transformative technology based developments within the enterprise can help reduce the risk of new business practices and technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk \u2013 the answer to the transformative technology security nightmare\" \/>\n<meta property=\"og:description\" content=\"Reintegrating the IT department back into transformative technology based developments within the enterprise can help reduce the risk of new business practices and technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/\" \/>\n<meta property=\"og:site_name\" content=\"Swivel Secure\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-27T15:30:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-22T10:14:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2654\" \/>\n\t<meta property=\"og:image:height\" content=\"1769\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victoria Laws\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victoria Laws\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/\",\"url\":\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/\",\"name\":\"Risk - Assessing Transformative Technology Security\",\"isPartOf\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg\",\"datePublished\":\"2016-04-27T15:30:14+00:00\",\"dateModified\":\"2019-01-22T10:14:27+00:00\",\"author\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\"},\"description\":\"Reintegrating the IT department back into transformative technology based developments within the enterprise can help reduce the risk of new business practices and technologies.\",\"breadcrumb\":{\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#primaryimage\",\"url\":\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg\",\"contentUrl\":\"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg\",\"width\":2654,\"height\":1769},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swivelsecure.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk \u2013 the answer to the transformative technology security nightmare\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swivelsecure.com\/us\/#website\",\"url\":\"https:\/\/swivelsecure.com\/us\/\",\"name\":\"Swivel Secure\",\"description\":\"Protecting Identities with Intelligent Authentication\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swivelsecure.com\/us\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514\",\"name\":\"Victoria Laws\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g\",\"caption\":\"Victoria Laws\"},\"url\":\"https:\/\/swivelsecure.com\/us\/blog\/author\/v-laws\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risk - Assessing Transformative Technology Security","description":"Reintegrating the IT department back into transformative technology based developments within the enterprise can help reduce the risk of new business practices and technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/","og_locale":"en_US","og_type":"article","og_title":"Risk \u2013 the answer to the transformative technology security nightmare","og_description":"Reintegrating the IT department back into transformative technology based developments within the enterprise can help reduce the risk of new business practices and technologies.","og_url":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/","og_site_name":"Swivel Secure","article_published_time":"2016-04-27T15:30:14+00:00","article_modified_time":"2019-01-22T10:14:27+00:00","og_image":[{"width":2654,"height":1769,"url":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg","type":"image\/jpeg"}],"author":"Victoria Laws","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Victoria Laws","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/","url":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/","name":"Risk - Assessing Transformative Technology Security","isPartOf":{"@id":"https:\/\/swivelsecure.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#primaryimage"},"image":{"@id":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#primaryimage"},"thumbnailUrl":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg","datePublished":"2016-04-27T15:30:14+00:00","dateModified":"2019-01-22T10:14:27+00:00","author":{"@id":"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514"},"description":"Reintegrating the IT department back into transformative technology based developments within the enterprise can help reduce the risk of new business practices and technologies.","breadcrumb":{"@id":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#primaryimage","url":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg","contentUrl":"https:\/\/swivelsecure.com\/us\/wp-content\/uploads\/sites\/2\/2018\/04\/black-and-white-city-man-people_160606_155133-1.jpg","width":2654,"height":1769},{"@type":"BreadcrumbList","@id":"https:\/\/swivelsecure.com\/us\/blog\/2016\/04\/27\/risk-the-answer-to-the-transformative-technology-security-nightmare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swivelsecure.com\/us\/"},{"@type":"ListItem","position":2,"name":"Risk \u2013 the answer to the transformative technology security nightmare"}]},{"@type":"WebSite","@id":"https:\/\/swivelsecure.com\/us\/#website","url":"https:\/\/swivelsecure.com\/us\/","name":"Swivel Secure","description":"Protecting Identities with Intelligent Authentication","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swivelsecure.com\/us\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/7274c28d94b87023fa167c9c671de514","name":"Victoria Laws","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swivelsecure.com\/us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6c7ce2426c633d5b5c12fa9b2e91b75118f14d592801fb2b91b42b1598814d1f?s=96&d=mm&r=g","caption":"Victoria Laws"},"url":"https:\/\/swivelsecure.com\/us\/blog\/author\/v-laws\/"}]}},"_links":{"self":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/posts\/402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":0,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/posts\/402\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/media\/404"}],"wp:attachment":[{"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/media?parent=402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/categories?post=402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swivelsecure.com\/us\/wp-json\/wp\/v2\/tags?post=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}