SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
9/16/16, 1:47 PMCyber Security, User Interface, and You - Deloitte CIO - WSJ
Page 1 of 2http://deloitte.wsj.com/cio/2015/10/15/cyber-security-user-interface-and-you/
Subscribe Sign In
U.S. EDITION Friday, September 16, 2016 As of 1:47 PM PDT
Business-led, Technology-enabled: Insight written and compiled by Deloitte
Search Deloitte Insights SEARCH
Deloitte Insights Video
The Human Side of the Internet
of Things
Organizations are focusing their internet
of things (IoT) initiatives less on
underlying sensors and more on finding
ways to use the information these
sensors generate. In this video, find out
the “human impact” potential from IoT,
and the implications for CIOs pursuing
IoT.
Make Better Decisions
Courtesy of the Core
Organizations are reinventing their core
systems to keep pace with innovation
and evolving business needs. In this Tech
Trends 2016 video, learn how
transforming these foundational systems
can not only help companies meet
business goals today, but also establish a
base for improved decision-making and
future growth.
Is Pokémon Go Augmented
Reality’s Killer App?
CIOs can learn a lot from the runaway
success of “Pokémon Go,” the new
mobile game that generated $35 million
in revenue in the first two weeks following
its release. But the most pressing lesson
in the immediate aftermath of the app’s
success may be to prioritize augmented
reality development efforts to capitalize
on consumers’ growing acceptance of the
technology.
Related Deloitte Insights
A Cyber Risk Imperative: All Hands on Deck
Andy Ozment, Ph.D., has dedicated his career to bolstering
cybersecurity in the private and public sectors, most recently
in his current role as assistant secretary for the Office of
Cybersecurity and Communications at the Department of
Homeland Security. As his tenure with DHS winds down,
Ozment shares his perspectives on cyber risks, cybersecurity,
and cyberdefenses. Hint: technology is low on his list.
Security, Privacy in Consumer Products Sector
Consumer products companies collect massive amounts of
highly detailed information about individual consumers that
cybercriminals would love to get their hands on. CIOs who
make a priority of protecting this information may help their
companies gain an advantage in an industry that has only just
begun to address cyber risk.
Can CIOs Use Risk to Power Performance?
While risk management has long been part of CIOs’ job
descriptions, risk-taking has been harder for them to stomach.
A volatile business environment is now forcing CIOs to
address an expanding array of technology-related risks. Owen
Tweet
Cyber Security, User Interface, and You
Safeguarding company and customer information used to be solely the concern of those of us in
the profession—but no longer.
Digital is poised to pervade every facet of life not only
because it makes living easier, but also because it’s fun—
by design. Likewise, to do security right, we’ve got to ask
not just whether it works, but if it’s user-friendly: simple to
navigate, reliable, and pleasurable to use.
To get there, we might ask what we can learn from other
professions. We might put on not only our thinking caps,
but also, at various times, an artist’s beret, Sherlock
Holmes’ deerstalker, a brigadier general’s helmet, a
blackjack dealer’s visor. We might need a psychologist’s
couch, a teacher’s yardstick, and a coach’s whistle, as
well. And that’s only the beginning. A few examples:
Meteorologists track weather systems and consider past events to forecast where those
systems will go, how they’ll behave, and what risks they pose. Other industries, including retail
stores and Wall Street, use trend-tracking maps and no wonder: Maps provide an organized,
big-picture view and are easy to understand. Should we in information security do the same,
using data-generated maps to assess where the next systems attack might come from, who
might be targeted, and the nature of the breach? This would give the user a useful, big-picture
look at security threats—past, present, and future.
The pharmaceutical industry uses RFID chips to track drug shipments, and law enforcement
places them in certain medication bottles to capture thieves, giving customers an added
measure of confidence and safety. What if our systems tagged data in a similar fashion, tracking
it wherever it goes and allowing users to retrieve theirs—to snatch it back from hackers or even
recall files sent in error? Not only would users know precisely where their information was going
and who was viewing it—invaluable to law enforcement—but they’d have the power to erase it
instantly, hopefully before it reaches the “darknet,” the Internet’s black market.
Credit card companies in Europe offer “smart cards” with debit, credit, and phone card
features. If lost or stolen, these cards self-destruct after a number of failed attempts to access
their data. Could we program our data to self-destruct when someone tries to view it on an
unauthorized device? Like the best security measures, this feature would protect a user’s
information automatically, with no effort on their part.
The entertainment industry has already figured out how to transform the security experience.
One group of popular theme parks has eschewed the cumbersome password in favor of colorful
bracelets that identify their wearers with a swipe of the wrist, unlock hotel rooms, simplify
purchases, and make efficient and effective security more enjoyable to use.
Most people don’t want to think about breaches, identity theft, or hackers. As UC San Diego
physician-scientist Ajit Varki argues in his 2013 book Denial, avoiding the negative is a natural
human tendency. The risks we encounter every time we log on are very real, but our users don’t
want to be reminded of that. Taking a cue from other professions, can we consider our
customers’ convenience and even their delight while keeping their information safe? How can
we sugarcoat the security pill to sweeten the user experience?
CONTENT FROM OUR SPONSOR Please note: The Wall Street Journal News Department was not involved in the creation of the content below.
Home World U.S. Politics Economy Business Tech Markets Opinion Arts Life Real Estate
CIO Report Consumerization Big Data Cloud Talent & Management Security
ShareShare 112
PREVIOUSLY IN DELOITTE INSIGHTS NEXT IN DELOITTE INSIGHTS
News, Quotes, Companies, Videos SEARCH
9/16/16, 1:47 PMCyber Security, User Interface, and You - Deloitte CIO - WSJ
Page 2 of 2http://deloitte.wsj.com/cio/2015/10/15/cyber-security-user-interface-and-you/
About Deloitte Insights
Ryan, CEO of Deloitte Advisory, discusses the economic
virtues of taking calculated risks and explains how taking
chances on certain technologies can help power performance.
Deloitte Insights for CIOs couples broad business insights with
deep technical knowledge to help executives drive business
and technology strategy, support business transformation, and
enhance growth and productivity. Through fact-based
research, technology perspectives and analyses, case studies
and more, Deloitte Insights for CIOs informs the essential
conversations in global, technology-led organizations.
Read more.
« Previous
CIOs Can Use APIs to Drive Innovation
Next »
Deloitte CIO: Mobile is Central to IT Mission
Tweet Email Print
—by JR Reagan, Ph.D., principal, Global Chief Information Security Officer, Deloitte Touche
Tohmatsu Limited.
October 15, 2015, 12:01am
Questions? Write to Deloitte CIO Journal Editor
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee,
and its network of member firms, each of which is a legally separate and independent entity. Please see
http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited
and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of
Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and
regulations of public accounting. This publication contains general information only, and none of Deloitte Touche
Tohmatsu Limited, its member firms, or its and their affiliates are, by means of this publication, rendering
accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is
not a substitute for such professional advice or services, nor should it be used as a basis for any decision or
action that may affect your finances or your business. Before making any decision or taking any action that may
affect your finances or your business, you should consult a qualified professional adviser. None of Deloitte
Touche Tohmatsu Limited, its member firms, or its and their respective affiliates shall be responsible for any loss
whatsoever sustained by any person who relies on this publication. Copyright © 2015 Deloitte Global Services
Limited.
Read More About:
CYBER RISK, SECURITY & PRIVACY
Wall Street JournalFacebookTwitter Google+YouTubePodcastsGooglePlay AppStore Windows 10
Back to Top
Subscribe
Why Subscribe?
WSJ+
Corporate Subscriptions
Apps
Professor Journal
Student Journal
Customer Service
Customer Center
Live Help
Redesign Guided Tour
Tools & Features
Newsletters & Alerts
Guides
My News
Portfolio
RSS Feeds
Topics
Video Center
Watchlist
Ads
Advertise
Advertise Locally
Commercial Real Estate Ads
Place a Classified Ad
Sell Your Business
Sell Your Home
Recruitment & Career Ads
More
Conferences
Content Partnerships
Corrections
Jobs at WSJ
Make Time
News Archive
Register for Free
Reprints
Privacy Policy Cookie Policy Copyright Policy Data Policy Subscriber Agreement & Terms of Use Your Ad Choices
Copyright ©2016 Dow Jones & Company, Inc. All Rights Reserved.
Like Share One person likes this. Be the first of your friends.
ShareShare 112
Subscribe / Sign In

Mais conteúdo relacionado

Mais procurados

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
Glenn Peake
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
Hector Hoyos
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White Paper
Hector Hoyos
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
Meg Weber
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
IBM Software India
 
Biometrics Today article
Biometrics Today articleBiometrics Today article
Biometrics Today article
Hector Hoyos
 

Mais procurados (18)

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
 
Industry Unbound: The Inside Story of Privacy, Data and Corporate Power
Industry Unbound: The Inside Story of Privacy, Data and Corporate PowerIndustry Unbound: The Inside Story of Privacy, Data and Corporate Power
Industry Unbound: The Inside Story of Privacy, Data and Corporate Power
 
Peer-to-Peer Insurance & Community - Webinar Deck
Peer-to-Peer Insurance & Community - Webinar DeckPeer-to-Peer Insurance & Community - Webinar Deck
Peer-to-Peer Insurance & Community - Webinar Deck
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White Paper
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
 
84017
8401784017
84017
 
1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper
 
Biometrics Today article
Biometrics Today articleBiometrics Today article
Biometrics Today article
 
THE SOCIAL IMPACTS OF AI AND HOW TO MITIGATE ITS HARMS
THE SOCIAL IMPACTS OF AI AND HOW TO MITIGATE ITS HARMSTHE SOCIAL IMPACTS OF AI AND HOW TO MITIGATE ITS HARMS
THE SOCIAL IMPACTS OF AI AND HOW TO MITIGATE ITS HARMS
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 

Semelhante a Cyber Security, User Interface, and You - Deloitte CIO - WSJ

GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Clay Melugin
 
Cleveland Sight Center_low res
Cleveland Sight Center_low resCleveland Sight Center_low res
Cleveland Sight Center_low res
Michael McManamon
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
Vasuki Kashyap
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 

Semelhante a Cyber Security, User Interface, and You - Deloitte CIO - WSJ (20)

Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Cleveland Sight Center_low res
Cleveland Sight Center_low resCleveland Sight Center_low res
Cleveland Sight Center_low res
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Security Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItSecurity Hurts Business - Don't Let It
Security Hurts Business - Don't Let It
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Pitss
PitssPitss
Pitss
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
 

Mais de Sherry Jones

The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
Sherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
S-B Schools to Prison Pipeline
S-B Schools to Prison PipelineS-B Schools to Prison Pipeline
S-B Schools to Prison Pipeline
Sherry Jones
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
Sherry Jones
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
Sherry Jones
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
Sherry Jones
 
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJWhy the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Sherry Jones
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
The Internet of Me
The Internet of MeThe Internet of Me
The Internet of Me
Sherry Jones
 
​The Identity of Things
​The Identity of Things​The Identity of Things
​The Identity of Things
Sherry Jones
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
Sherry Jones
 
The ‘Third Space’ in the cloud
The ‘Third Space’ in the cloudThe ‘Third Space’ in the cloud
The ‘Third Space’ in the cloud
Sherry Jones
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
Sherry Jones
 
Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?
Sherry Jones
 
Bridging the cybersecurity culture gap
Bridging the cybersecurity culture gapBridging the cybersecurity culture gap
Bridging the cybersecurity culture gap
Sherry Jones
 

Mais de Sherry Jones (20)

The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
S-B Schools to Prison Pipeline
S-B Schools to Prison PipelineS-B Schools to Prison Pipeline
S-B Schools to Prison Pipeline
 
S-B Immigrants
S-B ImmigrantsS-B Immigrants
S-B Immigrants
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
 
S-B Edible Tree Project
S-B Edible Tree ProjectS-B Edible Tree Project
S-B Edible Tree Project
 
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJWhy the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
The Internet of Me
The Internet of MeThe Internet of Me
The Internet of Me
 
​The Identity of Things
​The Identity of Things​The Identity of Things
​The Identity of Things
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
 
The ‘Third Space’ in the cloud
The ‘Third Space’ in the cloudThe ‘Third Space’ in the cloud
The ‘Third Space’ in the cloud
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
 
Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 
Bridging the cybersecurity culture gap
Bridging the cybersecurity culture gapBridging the cybersecurity culture gap
Bridging the cybersecurity culture gap
 

Cyber Security, User Interface, and You - Deloitte CIO - WSJ

  • 1. 9/16/16, 1:47 PMCyber Security, User Interface, and You - Deloitte CIO - WSJ Page 1 of 2http://deloitte.wsj.com/cio/2015/10/15/cyber-security-user-interface-and-you/ Subscribe Sign In U.S. EDITION Friday, September 16, 2016 As of 1:47 PM PDT Business-led, Technology-enabled: Insight written and compiled by Deloitte Search Deloitte Insights SEARCH Deloitte Insights Video The Human Side of the Internet of Things Organizations are focusing their internet of things (IoT) initiatives less on underlying sensors and more on finding ways to use the information these sensors generate. In this video, find out the “human impact” potential from IoT, and the implications for CIOs pursuing IoT. Make Better Decisions Courtesy of the Core Organizations are reinventing their core systems to keep pace with innovation and evolving business needs. In this Tech Trends 2016 video, learn how transforming these foundational systems can not only help companies meet business goals today, but also establish a base for improved decision-making and future growth. Is Pokémon Go Augmented Reality’s Killer App? CIOs can learn a lot from the runaway success of “Pokémon Go,” the new mobile game that generated $35 million in revenue in the first two weeks following its release. But the most pressing lesson in the immediate aftermath of the app’s success may be to prioritize augmented reality development efforts to capitalize on consumers’ growing acceptance of the technology. Related Deloitte Insights A Cyber Risk Imperative: All Hands on Deck Andy Ozment, Ph.D., has dedicated his career to bolstering cybersecurity in the private and public sectors, most recently in his current role as assistant secretary for the Office of Cybersecurity and Communications at the Department of Homeland Security. As his tenure with DHS winds down, Ozment shares his perspectives on cyber risks, cybersecurity, and cyberdefenses. Hint: technology is low on his list. Security, Privacy in Consumer Products Sector Consumer products companies collect massive amounts of highly detailed information about individual consumers that cybercriminals would love to get their hands on. CIOs who make a priority of protecting this information may help their companies gain an advantage in an industry that has only just begun to address cyber risk. Can CIOs Use Risk to Power Performance? While risk management has long been part of CIOs’ job descriptions, risk-taking has been harder for them to stomach. A volatile business environment is now forcing CIOs to address an expanding array of technology-related risks. Owen Tweet Cyber Security, User Interface, and You Safeguarding company and customer information used to be solely the concern of those of us in the profession—but no longer. Digital is poised to pervade every facet of life not only because it makes living easier, but also because it’s fun— by design. Likewise, to do security right, we’ve got to ask not just whether it works, but if it’s user-friendly: simple to navigate, reliable, and pleasurable to use. To get there, we might ask what we can learn from other professions. We might put on not only our thinking caps, but also, at various times, an artist’s beret, Sherlock Holmes’ deerstalker, a brigadier general’s helmet, a blackjack dealer’s visor. We might need a psychologist’s couch, a teacher’s yardstick, and a coach’s whistle, as well. And that’s only the beginning. A few examples: Meteorologists track weather systems and consider past events to forecast where those systems will go, how they’ll behave, and what risks they pose. Other industries, including retail stores and Wall Street, use trend-tracking maps and no wonder: Maps provide an organized, big-picture view and are easy to understand. Should we in information security do the same, using data-generated maps to assess where the next systems attack might come from, who might be targeted, and the nature of the breach? This would give the user a useful, big-picture look at security threats—past, present, and future. The pharmaceutical industry uses RFID chips to track drug shipments, and law enforcement places them in certain medication bottles to capture thieves, giving customers an added measure of confidence and safety. What if our systems tagged data in a similar fashion, tracking it wherever it goes and allowing users to retrieve theirs—to snatch it back from hackers or even recall files sent in error? Not only would users know precisely where their information was going and who was viewing it—invaluable to law enforcement—but they’d have the power to erase it instantly, hopefully before it reaches the “darknet,” the Internet’s black market. Credit card companies in Europe offer “smart cards” with debit, credit, and phone card features. If lost or stolen, these cards self-destruct after a number of failed attempts to access their data. Could we program our data to self-destruct when someone tries to view it on an unauthorized device? Like the best security measures, this feature would protect a user’s information automatically, with no effort on their part. The entertainment industry has already figured out how to transform the security experience. One group of popular theme parks has eschewed the cumbersome password in favor of colorful bracelets that identify their wearers with a swipe of the wrist, unlock hotel rooms, simplify purchases, and make efficient and effective security more enjoyable to use. Most people don’t want to think about breaches, identity theft, or hackers. As UC San Diego physician-scientist Ajit Varki argues in his 2013 book Denial, avoiding the negative is a natural human tendency. The risks we encounter every time we log on are very real, but our users don’t want to be reminded of that. Taking a cue from other professions, can we consider our customers’ convenience and even their delight while keeping their information safe? How can we sugarcoat the security pill to sweeten the user experience? CONTENT FROM OUR SPONSOR Please note: The Wall Street Journal News Department was not involved in the creation of the content below. Home World U.S. Politics Economy Business Tech Markets Opinion Arts Life Real Estate CIO Report Consumerization Big Data Cloud Talent & Management Security ShareShare 112 PREVIOUSLY IN DELOITTE INSIGHTS NEXT IN DELOITTE INSIGHTS News, Quotes, Companies, Videos SEARCH
  • 2. 9/16/16, 1:47 PMCyber Security, User Interface, and You - Deloitte CIO - WSJ Page 2 of 2http://deloitte.wsj.com/cio/2015/10/15/cyber-security-user-interface-and-you/ About Deloitte Insights Ryan, CEO of Deloitte Advisory, discusses the economic virtues of taking calculated risks and explains how taking chances on certain technologies can help power performance. Deloitte Insights for CIOs couples broad business insights with deep technical knowledge to help executives drive business and technology strategy, support business transformation, and enhance growth and productivity. Through fact-based research, technology perspectives and analyses, case studies and more, Deloitte Insights for CIOs informs the essential conversations in global, technology-led organizations. Read more. « Previous CIOs Can Use APIs to Drive Innovation Next » Deloitte CIO: Mobile is Central to IT Mission Tweet Email Print —by JR Reagan, Ph.D., principal, Global Chief Information Security Officer, Deloitte Touche Tohmatsu Limited. October 15, 2015, 12:01am Questions? Write to Deloitte CIO Journal Editor Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or its and their affiliates are, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your finances or your business. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. None of Deloitte Touche Tohmatsu Limited, its member firms, or its and their respective affiliates shall be responsible for any loss whatsoever sustained by any person who relies on this publication. Copyright © 2015 Deloitte Global Services Limited. Read More About: CYBER RISK, SECURITY & PRIVACY Wall Street JournalFacebookTwitter Google+YouTubePodcastsGooglePlay AppStore Windows 10 Back to Top Subscribe Why Subscribe? WSJ+ Corporate Subscriptions Apps Professor Journal Student Journal Customer Service Customer Center Live Help Redesign Guided Tour Tools & Features Newsletters & Alerts Guides My News Portfolio RSS Feeds Topics Video Center Watchlist Ads Advertise Advertise Locally Commercial Real Estate Ads Place a Classified Ad Sell Your Business Sell Your Home Recruitment & Career Ads More Conferences Content Partnerships Corrections Jobs at WSJ Make Time News Archive Register for Free Reprints Privacy Policy Cookie Policy Copyright Policy Data Policy Subscriber Agreement & Terms of Use Your Ad Choices Copyright ©2016 Dow Jones & Company, Inc. All Rights Reserved. Like Share One person likes this. Be the first of your friends. ShareShare 112 Subscribe / Sign In