For IT professionals, cybersecurity has always been a central focus, but it may have moved higher up on the priority list.
The adoption of connected devices for home use has skyrocketed and is not likely to slow down.
I’ve worked in the technology industry for over 20 years, and in that time, I’ve lent my expertise in strategizing and implementing business-focused IT to everyone from small businesses to global corporations. As my company is a purveyor of comprehensive private and public cloud environments, we’re primarily concerned with giving organizations every IT component they need to power their business in a cohesive and streamlined way. This not only includes elements like virtual servers, desktops, email, and Microsoft Office, it also entails ensuring that cybersecurity measures are built into the fabric of the IT infrastructure.
When I look back at the most significant changes in the security industry over the past several decades, two trends stand out: the rise in public and corporate awareness of security as a retail service to be consumed, and the growing sophistication of some institutional consumers of security services.
A direct relationship exists between how quickly a business can identify and contain a security incident and the financial consequences. On average, the time to identify and the time to contain a threat are 229 and 82 days, respectively — alarmingly lengthy spans of time.
Canadian Security is celebrating its 40th anniversary in 2018. We asked several security professionals to submit their thoughts on the industry and reflect on 40 years of change. In each issue of Canadian Security magazine, we will feature a new columnist. Second is Roger Miller, president of Northeastern Protection Service.
With 2017 now behind us, many CIOs are looking ahead. They’re grappling with big questions but the No. 1 priority should be cybersecurity.
Canadian Security is celebrating its 40th anniversary in 2018. We asked several security professionals to submit their thoughts on the industry and reflect on 40 years of change. In each issue of Canadian Security magazine, we will feature a new columnist. First is Jason Caissie, vice-president of operations for The Profile Group and a past chair of the ASIS Toronto chapter.
Enterprises are able to collect more data than ever before, but without an efficient way to manage and secure that data across the enterprise, whether it resides on physical and virtual servers, multiple Cloud providers, applications or endpoints, they will never be able to realize the full benefits of a truly data-driven and secure business. Security needs to be built into the data management platform from an end user’s computer to backup storage, regardless of whether it resides on-premise or in a private, public or hybrid Cloud.
From an outsider's perspective, in order to become an International Close Protection Operative it should be pretty straight forward, right? They just have to be big, no-necked, muscle-bound and be able to jostle their way through the swathes of people in a crowd with their Principal, yes?
Most Popular Stories
4th Annual Mission 500 Hockey Classic
February 21, 2019
Security Career Expo
March 7, 2019
Canadian Technical Security Conference
April 2-4, 2019
April 10-12, 2019
26th Annual ASIS Toronto Best Practices Seminar
April 17, 2019
Security Canada East
April 24, 2019