Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

10/16/2018
08:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Privacy & AI Changing the Digital Transformation Game

At Gartner's Symposium/ITXPO, analysts have come up with the term 'ContinuousNEXT' to show how digital transformation is evolving. However, businesses need to address concerns over privacy and AI.

ORLANDO, Fla. -- Gartner Symposium/ITXPO -- When it comes to digital transformation, enterprises of all sizes are trying to keep up with the rapid change of pace, as well as the executive and boardroom pressure that this mindset requires.

Gartner has come up with its own term for this, which the firm calls "ContinuousNEXT," which is comprised of five different strategies that CIOs and other IT executives should consider. These include:

  • Privacy
  • Augmented Intelligence
  • Culture
  • Product Management
  • Digital Twin

However, for security pros and CISOs, the notion of privacy is particularly significant since data carries so much currency right now in the enterprise, and the misuse of this information can lead to reputation damage or financial ruin.

When presenting this new research at the start of the show here on October 15, Mike Harris, an executive vice president with Gartner, noted that within the last week, Google decided to shut down its Google+ social media platform following stories about a potential data breach. (See Senators Demand More Information on Google+ Vulnerability.)

"If you don't successfully manage and master privacy, your entire digital transformation is at risk," Harris said to the 9,000 CIOs and other IT executive gathered here during the kick-off keynote. "Increasingly, trust and privacy are power, and that power is shifting. The public view of privacy has now flipped. There's rising skepticism in consumers. For the first time, a sizable group of consumers and employees are not willing to give up security, safety and piece of mind for convenience."

In addition, Harris noted that about 73% of the marketing organizations that Gartner has surveyed are changing the way they look at customer data due to new regulations. These not only include the European Union's General Data Protection Regulation (GDPR), but also new laws that states are passing in the US, and the potential for China to create its own data privacy and compliance rules. (See California's CCPA Law: Why CISOs Need to Take Heed.)

Harris noted that since GDPR violations carry a fine that could equal about 4% of a company's global revenue, privacy issues has now become a board-level concern since so much of an enterprise's financial health is at stake.

However, less than half of organizations have controls in place to ensure compliance with often competing regulations. One way to help counteract some of this in investment in new technologies, such as blockchain. (See Blockchain & Cryptocurrency Becoming Greater Security Concerns.)

It also leaves the door open for even more cutting-edge technologies, especially what Gartner calls the next step in artificial intelligence: "Augmented intelligence." This boils down to using AI systems alongside human employees to create better outcomes. Instead of a future shaped by robots and algorithms doing all the work, machine learning and AI help employees make better decisions. (See Cybersecurity AI: Addressing the 'Artificial' Talent Shortage .)

One reason for this is that by 2021 Gartner analysts expect AI to answer questions better than humans.

"While the most repetitive jobs can be displaced, people are adapting," Harris said. "Companies are expanding their capabilities and creating augmented intelligence -- putting works side-by-side with advanced AI systems, processes and robotics, and along the way those jobs become more impactful and useful to customers and citizens. Companies adopting AI today, are letting works keep their jobs, but in a more meaningful way."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
A Patriotic Solution to the Cybersecurity Skills Shortage
Adam Benson, Senior VP, Vrge Strategies,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12777
PUBLISHED: 2020-08-10
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
CVE-2020-12778
PUBLISHED: 2020-08-10
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
CVE-2020-12779
PUBLISHED: 2020-08-10
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
CVE-2020-12780
PUBLISHED: 2020-08-10
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
CVE-2020-12781
PUBLISHED: 2020-08-10
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.