Find a Question:
The need for information security planning in companies to avoid cyber attacks
IT security environment has witnessed in the Middle East great changes over the past few years, where significant growth has occurred in the directed – or advanced persistent attacks attacks APTs – in terms of development and repetition throughout the region. The attacks require a high degree of secrecy for a long time, and usually aimed at installations for financial or political gain.
These events enhance the level of awareness among the business sector in the region, a sector need to invest in comprehensive solutions for information security, where installations are increasingly aware that it must adopt a proactive and anticipatory strategies that enable them to protect their infrastructure.
Said Abdulaziz Alhlil Regional Director for IDC Foundation in Saudi Arabia, Kuwait, Bahrain: “We seek each year from Abdulaziz-Alhlil During the IDC conference of executive heads of information technology in the Middle East to scan a wide range of IT leaders across the region, and we found that information security is classified among the top priorities over the next year, even though there is some uncertainty in the region. ”
Alhlil He added that the executive heads of information technology entering into a conflict between the demands to save money through the publication of the third platform technologies (such as cloud computing and techniques of social networking and large data and techniques for mobile communications) and the need to address the most obvious deficiency in the aspects of information security they have. And it requires the transfer of funds to the information security projects that the chief executives of IT budgets minute procedure between providing immediate protection and significant cost reduction for new investments. Under Chief Executives attention to information technology to express to be engaged in a higher percentage of IT budgets allocated to them for information security information, the current level of investment is still not enough. It is certain that this is not due to lack of awareness, but because the executive heads of information technology often find themselves unable to provide sufficient justification for the process to justify additional spending on information security.
Alhlil pointed to the need for information security planning to become an integral part of the decision-making processes in all cutting-edge companies in the region. It can not be IT security continues to be limited to investing in a couple of solutions in order to protect the points end or the network, but must now play an essential role across all enterprise departments, starting from the client protection to protect mobile devices and data portfolio on the clouds, through comprehensive policies on the scope of the facility and that are applied to the process of governance.
Eng Abdulaziz Alhlil that members of the IT team must have the leadership and the development of his team members to enable them to acquire the skills and capabilities that surpass the coming threats. The first line of defense to the Executive Chairman of the Information Technology, and the role of the most important the Executive Chairman of the Information Technology and get the right people must remain a top priority, because getting members unsuitable will make you the focus of the upcoming film from Hollywood for the largest theft!
It is worth mentioning that the attackers evolve to turn to criminal organizations, and this requires no doubt expand the role and functions of the Chief Executive Officer, Information Technology, as the growing importance of information security to the role of policy-making that carried out by the Chief Executive Officer, Information Technology, and includes the management of IT operations and guide the process of transformation in business functions as a separate part of the company that managed digitally. In fact, it is essential that the CEO of the Information Technology participate in policy-making at all levels, where it can be compared to this role roles that were dedicated to the decision-makers in the past, with respect to the orientation of enterprise in general.Viewing:-164
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!