Intelligent CIO Europe Issue 37 | Page 48

CIO OPINION security perimeter . Traditional firewalls and VPNs that protect the core network are no longer fit for purpose . Organisations need to be looking at SaaS-based DDI security solutions that extend visibility to all devices connected to the network to ensure security from anywhere in the world .”
Eaton , Eric Rueda , Commercial Leader Software & Connectivity , EMEA
“ All too often , cybersecurity focuses on traditional IT security , with tips on how consumers can avoid falling victim to phishing scams or how businesses can secure critical applications from ransomware attacks . What is frequently missed is the lesser known , but equally as critical , issue of securing Operational Technology ( OT ). towards more subscription-based models . Despite the economic downturn , key changes in consumer buying behaviours has meant that these models have proved resilient . In fact , a recent Zuora report found that more than half of subscription businesses have not been negatively impacted by COVID-19 , while one quarter are actually seeing subscriber acquisition rates accelerate .
“ Information Technology is typically focused on transferring and storing critical information , while OT typically controls the physical world . OT networks support building infrastructure that operates key facility systems such as lights , elevators , access control and heating and cooling systems . Such building infrastructures are commonly found in the commercial and industrial segments as well as in data centres .
“ This is a trend we ’ ll see increasing even in 2021 . The term ‘ membership ’ is likely to be replaced with ‘ subscription ’ as businesses look to engage with customers via bespoke added services and replace one-off membership fees with more flexible models .
“ Membership provokes the feeling you ’ re locked into a contract for an extended period of time , with high cancellation fees and little flexibility . Whereas subscriptions offer customers a usage-based model that allows customers to opt-in and out based on their needs .”
Infoblox – Max Locatelli , Regional Director , Western Europe
“ The combination of COVID-19 and Brexit has created the perfect storm for data privacy issues in 2021 . Cybercriminals are exploiting the vulnerabilities brought about by the pandemic , while Brexit will put a question mark over data sovereignty laws .
“ From a legal standpoint , organisations need to be especially cautious about where they ’ re holding their customer data and be ready to adapt once new regulations have been laid out . When it comes to security , the new-found chaos will mean investing in solutions that are going to protect data in network environments that are increasingly decentralised by expanding security to the edge to accommodate the explosion of endpoints outside the traditional
“ As more operational equipment is becoming reliant on IT to function , organisations are becoming more exposed to cybersecurity threats .
“ Commonly , we see cybersecurity relegated entirely to the IT team , however , as more technologies powering day-to-day operations of a business move online , many do not think they are exposed and have forgotten to secure their OT systems . This risks OT security falling between the cracks . Instead , it should be shared between IT and facilities managers .”
OpenText , Anthony Di Bello , Vice President , Strategic Development
“ While the main factor driving change is the remote workforce , it has led not to increased budgets , but rather different spending priorities . The pandemic has accelerated the shift to cloud and existing budgets are shifting focus to securing cloud environments and identification and control of sensitive data across what are now highly distributed work-from-home environments .
“ As such , we do not see a broad push to increase cybersecurity spending due to the pandemic , and have heard customers indicate security budgets will be flat YoY due to budget cuts . Businesses are asking two questions : 1 ) Can we adapt existing tech to remote work-related use cases ; and 2 ) Can we consolidate our technology stack .” p
48 INTELLIGENTCIO EUROPE www . intelligentcio . com