Companies hoping to successfully use the IT security technologies of the future need to rethink their strategy and shift their focus from a latent arms race aimed at protection against the outside world to detection within the enterprise. After all, every company needs to remember that an attacker will infiltrate its network sooner or later, as many recent examples have shown. The next step is to identify the attack as quickly as possible and remove the threat. In the future, smart data and artificial intelligence will be needed to provide this protection within organizations. Authorized users must be distinguished from attackers rapidly with easy-to-use or automated tools such as behavior-based analysis systems. Zero impact must be the goal. Yet, to understand how to get their company or any company to this point, executives always need to keep in mind how the current situation evolved.
CITATION STYLE
Tschersich, T. (2017). Cybersecurity - What’s Next? In Management for Professionals (Vol. Part F602, pp. 101–112). Springer Nature. https://doi.org/10.1007/978-3-319-46529-6_11
Mendeley helps you to discover research relevant for your work.