334-6381071 primo.bonacina@primobonacina.com
PBS – Primo Bonacina Services
  • PBS
    • PBS
    • Biografia
    • PBS Talent
    • About
    • Editorials
    • Logo & Photo
    • Legal
  • Services
    • Service Portfolio
    • Sales
      • Channel Development
      • Channel Readiness
      • Channel Mapping
      • Channel Recruitment
      • Forecasting
    • Management
      • Company Assessment
      • Business Planning
    • Keynotes & Events
      • Keynote Speaking
      • Articles & Columns
      • Event Organization
    • Web & Social
      • Web Site Design
      • SEO
      • Google Ads
    • Marketing
      • Marketing Portfolio
      • Mktg Check-Up
      • Media Relations
      • Success Stories
      • Company Visuals
      • Naming & Taglines
      • Storytelling
      • PPT Materials
      • eBooks
      • Languages
      • Videos
    • HR
      • Digital Talent
      • CV Clinic
      • Incentive plans
      • People Assessment
      • Training: Recruiting
      • Training: B2B Sales
      • Training: LinkedIn
  • Customers
    • Customers
    • Appreciations
  • Jobs
    • All Jobs
    • Open Jobs
  • Presentations
  • Contact

[Fueled] How Digital Transformation is Influencing Information Security in 2019

09 September 2019
Cloud

Digital transformation—which encompasses such technologies as the Internet of Things (IoT), big data analytics, blockchain, software robots, cloud computing and mobile apps—is changing the way businesses and people work. It also presents significant challenges to protect information and guard against emerging cybersecurity threats. A digital transformation consultancy works with companies to address these risks and attain the highest levels of information security proactively, before potential data breaches happen.

In 2019, here’s what you need to think about how digital transformation influences information security.

Everything is Interconnected, Everything is a Potential Risk

The more things that are connected, the more people who interact with those things need to be aware of security risks. “Countless attacks originating in cyberspace have shown that all employees are potential targets…every member of staff represents a potential gateway to an organization’s IT infrastructure,” notes Dr. Andreas Wenger of the Center for Security Studies in an interview with Crypto Magazine. 

The implications of this are twofold. Everyone in an organization, as well as everyone outside the organization that interacts with it, needs to be made aware of and perform information security best practices. “Always include training as a main part of your IT budget,” Susan Villaquiral, chief information security officer at Fundación Valle Del Lili, recommends.

More importantly, each and every one of the applications they use must have the highest levels of embedded security. Because, well, people are typically the most vulnerable part of the chain. As Justin Somani, Global CSO of SAO explains in MIT Technology Review, “The idea is to build in security, rather than ask users to opt in. That’s one of the hallmarks of being more proactive in securing data: protection is the default posture.”

Automated Security That Focuses on Potential Threat Sources

But just as people and systems are more intertwined in digital transformation, the apps used need to be integrated into an holistic information security network. Yorim Salinger, CEO of cybersecurity service Perception Point, writing in Tech Radar suggests that organizations are overly focused on the potential threat (i.e., the malware) when they should be looking at the anomalous activities (i.e., anything that deviates from standard behaviors) performed by the sources generating the threats. “By keeping an eye on those vectors for anomalous activities, companies can defend themselves against any threat..An automated security system that examines anomalies in a holistic manner across channels can catch malware even before it raises its ugly head. With a system like that, companies no longer have to cross their fingers hoping that no [malignant] file that comes in…is a potential system killer…Digital transformation requires cybersecurity transformation—and by moving to a holistic and automated security solution, companies will be able to take full advantage of digital transformation.”

Articoli correlati
PUNTO COM GROUP ASSUME: Specialisti Supporto Tecnico IT o Microsoft o Networking per Teleassistenza aziende clienti (Brescia ovest) – RAL €35mila
03 June 2025

PUNTO COM GROUP ASSUME: Specialisti Supporto Tecnico IT o Microsoft o Networking per Teleassistenza aziende clienti (Brescia ovest) – RAL €35mila

TOP! ***** IPKOM: Software Development Manager & Principal Architect – soluzioni Cloud, Security, Telecomunicazioni e AI (Arezzo/Perugia + smart working parziale) – €70mila + auto – COMPLETED
19 May 2025

TOP! ***** IPKOM: Software Development Manager & Principal Architect – soluzioni Cloud, Security, Telecomunicazioni e AI (Arezzo/Perugia + smart working parziale) – €70mila + auto – COMPLETED

PUNTO COM GROUP: Specialisti Supporto Tecnico IT e Teleassistenza (Brescia ovest) – RAL €40mila – COMPLETED
04 March 2025

PUNTO COM GROUP: Specialisti Supporto Tecnico IT e Teleassistenza (Brescia ovest) – RAL €40mila – COMPLETED

TOP! ***** LUTECH ICT SOLUTIONS SA: Sr. Microsoft Office 365 Technical Specialist & Migration Manager (Bellinzona/Canton Ticino) – CHF 100mila – COMPLETED
27 January 2025

TOP! ***** LUTECH ICT SOLUTIONS SA: Sr. Microsoft Office 365 Technical Specialist & Migration Manager (Bellinzona/Canton Ticino) – CHF 100mila – COMPLETED

TOP! ***** GUALA CLOSURES SPA: Sr. SAP S/4 HANA e R/3 FI/CO Specialist (Milano o Alessandria + ampio smart working + trasferte) – RAL €65mila + crescita + welfare – COMPLETED
15 January 2025

TOP! ***** GUALA CLOSURES SPA: Sr. SAP S/4 HANA e R/3 FI/CO Specialist (Milano o Alessandria + ampio smart working + trasferte) – RAL €65mila + crescita + welfare – COMPLETED

PUNTO COM ASSUME: Specialisti supporto tecnico IT (Brescia ovest) – RAL €40mila – COMPLETED
13 January 2025

PUNTO COM ASSUME: Specialisti supporto tecnico IT (Brescia ovest) – RAL €40mila – COMPLETED

Sicurezza informatica vs. sicurezza Internet: quali differenze?
11 January 2025

Sicurezza informatica vs. sicurezza Internet: quali differenze?

OPPORTUNITÀ! Dynamics Consult ASSUME: Microsoft Dynamics 365 Business Central (Navision) ERP Application Consultant & Project Manager, soluzioni Finance/Supply Chain/Manufacturing (Milano + smart working) – €45mila + welfare – COMPLETED
11 November 2024

OPPORTUNITÀ! Dynamics Consult ASSUME: Microsoft Dynamics 365 Business Central (Navision) ERP Application Consultant & Project Manager, soluzioni Finance/Supply Chain/Manufacturing (Milano + smart working) – €45mila + welfare – COMPLETED

Legal

PBS – Primo Bonacina Services SRLS uninominale
Partita IVA: IT11074000966
Sede operativa: V Canneto 10, 25049 Iseo (BS); Sede legale: V Leone Tolstoj 1, 20146 Milano
Dati societari completi: https://www.primobonacina.com/legal

Privacy & GDPR
  • Privacy Policy
  • Cookie Policy
Per Categoria
  • Channels
  • Cloud
  • Editoriali
  • Eventi
  • Highlight
  • Interviews
  • Jobs
  • Market
  • Marketing
  • Open Jobs
  • Podcast
  • Recruiting
  • Top News
© 2025 PBS - Primo Bonacina Services
Powered by Perseoweb
 

Loading Comments...