Takeaways from the 2015 Gartner Security and Risk Summit

  • Everyone is concerned about security, from small business to government to enterprise-level companies.

  • IoT and cloud technologies bring opportunities, as well as new security requirements.

I recently had the opportunity to speak at the 2015 Gartner Security and Risk Summit in National Harbor, Maryland, where we discussed best practices and strategies to support business in today’s digital age. Topics covered cybersecurity, enterprise security strategies, planning for Internet of Things (IoT) security, risk management and compliance, and more.

Following are the top five concerns shared with me by fellow participants and guests:

#1. Everyone is concerned about security.

From small businesses to government and enterprise-level companies, security is keeping people up at night. People are worried about the next big threat and how that threat could hit them personally. They worry about how an attack could impact their company as well as their customers’ information, as traditional lines of defenses are no longer enough to protect businesses from threats.

The top security concerns today are around sustaining operations, protecting intellectual property, and protecting customers.

#2. Companies want a platform approach to security.

I had many conversations around the desire to adopt a platform approach to security. Businesses want and need to move to a platform approach to have everything integrated, and they need centralized monitoring and response capabilities to help protect them from threats. A unified platform can provide a more holistic approach to security in terms of robust security functions, threat management, and mobile and identity access management. Companies want a platform that is customizable to their individual business needs.

#3. Time and costs are critical.

When a breach occurs, it takes expertise and time to update all of the policies and functions and effectively respond to the breach. The faster the response time, the easier it can be to manage the threat before exponential damage is done. But this then makes cost an issue. The cost of cyber security breaches is tangible and real.

One audience member told me he was worried he doesn’t have enough resources (i.e., expertise, funding, and support) to fight this fight. He needs someone to help alleviate the knowledge gap and the capital gap, to put solutions in place that work; solutions that he can afford.

#4. The unknowns of IoT bring uncertainty.

Many people are concerned about how to build their security strategies around IoT, considering new and ongoing developments in IoT and Machine-to-Machine (M2M) technologies. AT&T utilizes our deep experience in IoT and learnings from years of developing scaled devices in the BYOD (Bring Your Own Device) age to craft a layered approach to security and other progressive strategies to meet the needs of the evolving IoT landscape. We know where risks are in IoT, and we continually design solutions to meet IoT concerns. (See “Our approach,” below.)

#5. The evolution from hardware to virtual brings opportunity as well as hesitation.

As business functions move to the cloud, companies are exploring the implications this will have for enterprise security. Companies want to know that their data and services are being protected as they implement new mobility and cloud technologies, and that their application security perimeters are designed to protect against new threats. They know that more advanced layers of protection are necessary beyond simple filtering to protect all areas of data and services. AT&T security solutions help protect customers’ threat points in a holistic approach (see below,) helping customers make the transition to virtual while adding protection to the enterprise.

Our approach

At AT&T, we believe a layered approach to security is the best approach. AT&T focuses on securing the device layer, connectivity layer, data/application layer, and threat-analysis layer to help reduce and respond to threats. This approach offers companies the ability to choose the best prevention, detection, and response capabilities to fit the enterprise’s business needs.


Learn more about how AT&T network security services can help protect your enterprise and customers.


Jason Porter Security Solutions Vice President AT&T About Jason