SlideShare a Scribd company logo
TOP FIVE TRENDS
“Hi! I’m Bill
McCabe and I
am a data
security IOT
staffing expert.”
“I need to know about the latest data security trends so that I
can ensure my companies and my candidates have the skills
they need to keep their data safe and protect their brand and
information assets.”
GARTNER SAYS
Protecting the IOT
will get progressively
more
difficult based on
these
TRENDS…and I
have come up with
the questions we
should be asking
ourselves in 2016
TREND ONE:
IT Security
companies are
consolidating—
providing a better
user experience.
Is seamless UX
the same as
seamless security?
TREND TWO:
Responsible
Disclosure
requirements grow
Do you have a
policy to self-
regulate your “white
hat” findings?
TREND THREE:
Small business hacks
are on the rise-
Do your IT teams
have a “there is no
try, only do” attitude
to ensure SMB
security?
TREND FOUR:
Cloud denizens share
responsibility for data
security
Do you have the
right security
add-ons in your
cloud services
contracts?
TREND FIVE:
Are your Incident
Response Protocols
ready with IOT-breach
messages?
Can you calm
investors and
consumers in the
event you’re
hacked?
I keep up with
these trends so you
can staff for
next-gen data
security. See full
article or..
Follow me on
Linked In, Twitter or
for more…
Ready in 2016: Resources
 Amazon’s shared responsibility model
 Information Management article
 Email or call me:
bill@softnetsearch.com
 303-337-7871

More Related Content

PDF
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
PDF
BCS ITNow 201512 - Cyber Innovation
PDF
Securing the internet of things: The conversation you need to have with your CEO
PDF
Synopsis & toc sectoral capsule on cyber security market in india
PPTX
Role of artificial intelligence in cyber security | The Cyber Security Review
PDF
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
PDF
Security, Compliance and Cloud - Jelecos
PDF
8 Internet of Things Figures Everyone Should Know
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
BCS ITNow 201512 - Cyber Innovation
Securing the internet of things: The conversation you need to have with your CEO
Synopsis & toc sectoral capsule on cyber security market in india
Role of artificial intelligence in cyber security | The Cyber Security Review
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security, Compliance and Cloud - Jelecos
8 Internet of Things Figures Everyone Should Know

What's hot (20)

PPTX
Security Trend Report, 2017
PDF
Major Cloud Security Challenges concerning the Enterprises | Sysfore
PPTX
Global Cybersecurity Market (2017 - 2022)
PDF
What retailers want you to know about data security
PDF
2019 Cybersecurity Predictions
PPTX
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
PDF
IoT in industry
PDF
Trend Micro 10 Minute Overview
PPTX
Top 5 Cybersecurity Trends in 2021 and Beyond
PDF
IT Security - Guidelines
PPT
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
PPTX
Global Cybersecurity Market Industry Trends, Analysis Report 2021
PDF
Trend Micro Solutions Overview
PDF
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
PPTX
Cybersecurity in the Era of IoT
PDF
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
PPTX
cybersecurity strategy planning in the banking sector
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
PPTX
Integrated Response with v32 of IBM Resilient
PPTX
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Security Trend Report, 2017
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Global Cybersecurity Market (2017 - 2022)
What retailers want you to know about data security
2019 Cybersecurity Predictions
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
IoT in industry
Trend Micro 10 Minute Overview
Top 5 Cybersecurity Trends in 2021 and Beyond
IT Security - Guidelines
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Trend Micro Solutions Overview
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Cybersecurity in the Era of IoT
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
cybersecurity strategy planning in the banking sector
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Integrated Response with v32 of IBM Resilient
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Ad

Similar to Data security 2016 trends and questions (20)

PDF
GITA March 2015 Newsletter
PDF
IT Solutions for 3 Common Small Business Problems
PDF
For UK MSP, optimizing customer experience is key to successful security post...
PPTX
Current enterprise information security measures continue to fail us. Why is ...
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PDF
Mobile Security: Preparing for the 2017 Threat Landscape
PDF
The significance of the 7 Colors of Information Security
PDF
csxnewsletter
PDF
The 10 Most Influential Women In Cyber Security,2023.pdf
PPTX
Information Security For Small Business
PDF
Cybrary's navigating a security wasteland
PPTX
PDF
Tech Talent Meetup Hacking Security Event Recap
PPTX
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
PDF
Internal or insider threats are far more dangerous than the external - bala g...
PDF
Security and SMBs
PPTX
Should i study cyber security
GITA March 2015 Newsletter
IT Solutions for 3 Common Small Business Problems
For UK MSP, optimizing customer experience is key to successful security post...
Current enterprise information security measures continue to fail us. Why is ...
11 19-2015 - iasaca membership conference - the state of security
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Mobile Security: Preparing for the 2017 Threat Landscape
The significance of the 7 Colors of Information Security
csxnewsletter
The 10 Most Influential Women In Cyber Security,2023.pdf
Information Security For Small Business
Cybrary's navigating a security wasteland
Tech Talent Meetup Hacking Security Event Recap
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Internal or insider threats are far more dangerous than the external - bala g...
Security and SMBs
Should i study cyber security
Ad

Recently uploaded (20)

PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPT
Introduction Database Management System for Course Database
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
ai tools demonstartion for schools and inter college
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Transform Your Business with a Software ERP System
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
medical staffing services at VALiNTRY
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
top salesforce developer skills in 2025.pdf
PDF
System and Network Administraation Chapter 3
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Online Work Permit System for Fast Permit Processing
PPTX
history of c programming in notes for students .pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Introduction Database Management System for Course Database
Odoo Companies in India – Driving Business Transformation.pdf
Odoo POS Development Services by CandidRoot Solutions
Design an Analysis of Algorithms II-SECS-1021-03
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
ai tools demonstartion for schools and inter college
L1 - Introduction to python Backend.pptx
Transform Your Business with a Software ERP System
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Operating system designcfffgfgggggggvggggggggg
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
medical staffing services at VALiNTRY
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
How to Migrate SBCGlobal Email to Yahoo Easily
top salesforce developer skills in 2025.pdf
System and Network Administraation Chapter 3
Understanding Forklifts - TECH EHS Solution
Online Work Permit System for Fast Permit Processing
history of c programming in notes for students .pptx

Data security 2016 trends and questions

  • 2. “Hi! I’m Bill McCabe and I am a data security IOT staffing expert.”
  • 3. “I need to know about the latest data security trends so that I can ensure my companies and my candidates have the skills they need to keep their data safe and protect their brand and information assets.” GARTNER SAYS Protecting the IOT will get progressively more difficult based on these TRENDS…and I have come up with the questions we should be asking ourselves in 2016
  • 4. TREND ONE: IT Security companies are consolidating— providing a better user experience. Is seamless UX the same as seamless security?
  • 5. TREND TWO: Responsible Disclosure requirements grow Do you have a policy to self- regulate your “white hat” findings?
  • 6. TREND THREE: Small business hacks are on the rise- Do your IT teams have a “there is no try, only do” attitude to ensure SMB security?
  • 7. TREND FOUR: Cloud denizens share responsibility for data security Do you have the right security add-ons in your cloud services contracts?
  • 8. TREND FIVE: Are your Incident Response Protocols ready with IOT-breach messages? Can you calm investors and consumers in the event you’re hacked?
  • 9. I keep up with these trends so you can staff for next-gen data security. See full article or.. Follow me on Linked In, Twitter or for more…
  • 10. Ready in 2016: Resources  Amazon’s shared responsibility model  Information Management article  Email or call me: bill@softnetsearch.com  303-337-7871