Print Page   |   Contact Us   |   Sign In   |   Register
From the President

 

From the President

Andrea Hoy, International President

Anyone who is passionate about speaking knows the amount of time you can spend researching your topic and then translating that information into a presentation, making sure it will educate while entertaining your audience. In 2016, I remember speaking on “Emerging Technologies, Friend or Foe, Help or Hindrance” with a diverse audience of mostly project managers, information security professionals, developers, and a few CIOs. As part of the presentation, I asked the audience to consider the top three emerging technologies. Of those three, the Journal this month covers two of them: “the perpetual smart machine” and “the platform revolution.”

Due to radical computational power and unprecedented advances in deep neural networks, we are truly seeing “big data” turning into usable “bigger” data [See “The Promise and Limits of Big Data for Improving Intrusion Detection” by Mark R. Heckman and “Deep Learning and Security: Beyond the Hype” by Stephan Jou]. Our organizations with smart machine technologies will be able to harness data in order to adapt to any new situation and solve problems no one has been able to do in the past. Even “60 Minutes” has covered the possibilities this year (for some interesting possibilities, see “What Happens When AI Meets Security Awareness?” by Tom Pendergast). From a platform revolution, we are also seeing a shift from technical infrastructure to an ecosystem-enabling platform; we are seeing where the cloud is no longer a question of “Are you going to the cloud?” The questions facing us now are “Which cloud are you moving to: public, private, hybrid…” and “What technologies, or data, are you transcending to the cloud?”

I believe we are truly at a point where cloud security will soon become just infosecurity, and that from a strategic planning assumption perspective that Gartner’s prediction that by 2022 we will stop referring to the exceptional scenario as “cloud computing” and instead will use “local computing” to describe the less common model will happen sooner than expected. The way I see it, as cybersecurity analysts, CISOs, interns, engineers, and even privacy practitioners, we will all need to be competent about the cloud.

Predictive analytics has been in play for awhile. A marketing strategy company would think that we are way behind the times in how we are applying analytics to fraud and security threats. Marketing companies have been doing analytics using data collection for ever. We are seeing more and more how business analytics, artificial intelligence, and big data are starting to become more prevalent in new information security tools and truly becoming business enablers for companies wanting to progressively use this data. We are finding new security startups trending very well in our industry. Some of you may remember when you would not even think about bringing a company in house that had not received its D-round funding or at least a minimum of two years in our market before entertaining placing them on the network to be the real-time detection system on your production environment—but we are doing it!

To see some of these new businesses and technologies real time, and to ask the questions of why to risk engaging a new technology, I hope you will join us in our “Innovation Shipyard,” a new addition to our ISSA International Conference at the Sheraton Hotel & Marina in San Diego.

So enjoy this month’s Journal, and for those with graduates this month, congratulations!!!

Community Search
Sign In
Sign In securely
Calendar

6/21/2017 » 7/22/2017
RSS: 2017 Call for Presentations

6/27/2017 » 6/28/2017
(ISC)² Secure Summit DACH

6/27/2017
WIS SIG Denver Local Event

6/27/2017 » 6/28/2017
Secure Summit DACH

6/28/2017 » 6/30/2017
WIS SIG Partner Event - National Cybersecurity Student Association




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information