GBM transcripts

Twitter

How study was conducted, if people were self-selected?

It targets IT professionals and we use a database as a collection of our own client base as well as anoa few other databases acquired, we target databases for IT professionals.

We try to be system admin all the way out to:

Prime target?

“I think clearly if you look at the past 12-18 months, we’ve been hearing about several targeted and more sophisticated attacks targeting our region; always, the Mid East, we’ve been part  of I think the nature of those attacks and the drivers of those attacks have changed in the past 2 years or so.

And what we’re feeling is probably the 65 reflects that ppl feel there has been an incrwased # of attacks, more sophisticated, more targeted to a specific organization or industry, and weall read the news,  feel is targeted attacks on oil and gas companies, large companies, regional, banking sector has been hit hard in a couple of occasions…

Te 65 comes as no surprise for us bc we all read it, even as consumers we see every day/week an incident.

Porb in the past we always refer to large accidents, but our region, Saudi, bank the Sattes, Europe, etc., has been getting more online our region, the digital world now is getting more sophisticated in our region, I think it’s no surprise that the number of incidents has increased.

This is what the 65 reflects…we feel that we have been really tragted

MORE ONLINE/DIGITAL: SOCIAL MEDIA EFFECT

“The 2nd annual sec survey….in 212 we asked q’s about how many mobile devices do u carry as an IT indiv/prof and does your comanpy allow u to connect that to the corp network and do they allow u to access social media”.

“35 PERCENT OF INCIDENTS ARE STAFF RELATED”

I think it could be related to social media, but probably the 35 percent is broader; I think the way we read 35 percent staff-related incidents is more related to the traingin and the awareness of the employees.

[downloading malware? What exactly?

“it could be related to malware, a spam email, it could be related to posting sens info on a social emdia website, even sometimes simple things like dealing wieth diff passwords u might have and system access; how u should protect it believe it or not, you might think ‘no I wouldn’t give my password to anyone’ but that’s not necessarily true; ppl think ‘well I don’t have anything secret, I can share my password with my colleague bcim going to be on leave for 2 days and I want him to do my job, so…these kind of little things refer to the same topic, the staff related incidents. More awareness andmore training is required. If you put any security framework to really secure an environment, this is the framework a company should look at. I was just reading this morning a report that a study showed that help desks employees are most targeted when it comes to security attacks….”

Definitely training and awareness are a big topic that we would encourage companies in our region to look at seriously.”

{security framework}

We’ve been in this region in the market for about 23 years now, we’re probably the largest system integrator with multiple lines of businesses etc,

[BYOD]

Social media and byod are overlapping..the majority of apps we use on our devices today are somehow linked to social media, most you can download and u don’t even have to register; things are all getting linked together…the fact that u have more connected devices and u want to bring them to the workplace, those devices are more and more going to ….it’s like one big story. {he points to the importance of treds, nothing that} “The study we release in 2012, polling about 900 IT professionals in the region, showed that more than 70 percent have 3 or more devices per person. So that could be your smartphone, ipad laptop. I think this has become the minimum for most of us….but 50 percent or more than more than 5. You demand the same access on all the same devices, theyre all related…when we go and advise a company on BYOD or actually brign your own app even…I think this is where were heading…its not about connectivity, but do I know what kind of apps youre accessing from this device, how do I know if I can enforce my company’s policy on this device w/o reaching your private information, so there’s always a fine line btw hacing control versus how much they need in terms of privacy. How do I assure that I can delete my sensitive info on that device.

^^part of the security framework; byod

I think the delay in opening could be realted to security, ok let’s wait bcim not sure if im ready or not; some companies might say no I don’t want to deal with the consequences; … I don’t have a pressing biz need so ill wait…

10 yrs ago when we wanted to find the info we used to go and browse………….

Then you reach a point where its not a one way thing, you don’t only receive information [from the internet] but you can also share, discuss your point of view, update, etc. but then the direction for sure is no longer evena web browsers so that’s a big shift, a huge shift.

We take this consumer behavior and we implement from a security perspective also from a cloud based persepective, in this region are they goin to dveleop locally or outsource, all these questions.

Related



Your email address will not be published. Required fields are marked *






SUBSCRIBE TO OUR NEWSLETTER