This article can also be found in the Premium Editorial Download "Information Security magazine: Does security make the grade in Windows Server 2008?."
Download it now to read this article plus other related content.
Information security professionals face challenges galore in 2008.|
In Information Security's Priorities 2008 survey, 1,149 readers cite many challenges, primary among those being mobility and security, identity and access management, protecting data and intellectual property and vulnerability management.
These are the pieces of the security puzzle that have taken center stage as businesses work to comply with regulatory requirements and industry standards (75 percent of those surveyed said they would be spending more time on compliance in 2008), operate more efficiently, cut costs and avoid embarrassing and damaging security breaches.
Ultimately, today's regulatory and threat environment requires that organizations work on multiple fronts. For example, encrypting a piece of information isn't enough; there needs to be some system for tracking what users have done with the data, says Ben Halpert, an information security researcher and practitioner. Consequently, data protection goes hand in hand with identity and access management.
"All these aspects play together in the information security space," he says.
Clearly, many of these puzzle pieces interlock. Based on our survey results, we prioritize four of them
| for the coming year.
This was first published in February 2008