APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • IBM
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Beautifully Autistic - Enabled To Make A Difference What Did My Children Teach Me About Life, Business, And Innovation?

    Ahmed Abukhater, CIO - Chief Innovation Office Boeing

    Fusing Business and Technology to Create Value

    Bob Hennessy, Group CIO, Lendlease [ASX: LLC]

    Evolving Data Security Involves Database Architecture

    Tom Basiliere, CIO, Provant

    Hybrid Intelligence

    Sharam Hekmat, CIO, IOOF Holdings, Australia

    New Technologies bringing Revolution to Remote Access Solutions

    Vijender Yadav, Director & CTO, Propalms Network

    Using digital simulation to inform sustainable growth

    Shaun Nesbitt, Chief Digital and Information Officer, Urban

    Dyno Nobel A Dose of Our Own Medicine

    Sabina Janstrom, IT Director,Dyno Nobel.

    The Era of Intelligent Banking Transforming Lives Through Technology

    Kevin Kane, Chief Technology Officer, Amar Bank

    right

    Data Security across the Enterprise

    Kas Nader, CIO & SVP of Global Technology, Atlanticus Holding

    Tweet
    content-image

    Kas Nader, CIO & SVP of Global Technology, Atlanticus Holding

    Paradigm Shift in Data Security

    Over the past five years, great strides have been made toward managing cost and availability. Virtualization, On Demand Computing, and Software as a Service are great examples of the progress that has been made. Conversely, there is tremendous focus on Big Data and data Analytics; and I believe the progresses in this filed will unleash the next wave of business disruption. However, the underlying threat in my industry and soon to come (assuming Big Data will change how every business functions) is Information Security. Majority of the products are focused on data security at network point of entry and exit with few exception focused on network analytics and pattern recognition. As data continues to become a more critical component of new economy, there will be more need for new and innovative technologies and paradigm shift in data security techniques.

    Two sides of Integrating Data Across Enterprise

    Integrating data is a good news bad news scenario. On the positive side, most fortune 500 companies have been gathering significant data points on their consumers. Along the same trend, the technology providers have provided a slew of options at different value point to meet the needs of this space. On the negative side, the consumer data is not actionable unless it is married to customer delivery channel. However, focus on delivery channel data is a recent phenomenon where many companies are playing catch-up.

    The innovation and technologies that can alter the intrinsic value of data outside of specific environment and usage will be able to revolutionize how information security is approached

    Throughout my career before, at, and after IBM the focus has mostly been on computing Availability, Reliability, and Affordability. My colleagues across the industry and I were able to create value focusing on these three primary vectors. Going forward with commoditization of these skills (Availability, Reliability, and Affordability) through On Demand computing and Software as Service, we are asked to lead our organizations through innovation in analytics toward customer acquisition and retention. I believe the shift toward revenue generation (data, data analytics, and data prediction) is the critical ingredient to a healthy career path. Having said that, “ability to execute on daily bases and keeping the enterprise secure are the prerequisites functions.”

    Data Security and On Demand Computing

    I will have to lead with my first comment, Data Security. Cross the industry, we continue to approach data security as an extension to physical security schemes developed centuries ago. There are verity of options for creating complex and elaborate moats around the perimeter, expand the defenses by creating complex mazes and honey pots that flash out the intruders and finally deploy security agents that are monitoring the roadways and paths for unauthorized movement. All of these approaches are ventured from physical security point of view and have their own pros and cons. I believe it is time to revise the paradigm and consider all traffic and all requests as potential source of intrusion. So the next question would be “how one would manage data, if data resides on an unsecure location and available to public.”

    Our organization is a big believer of cloud, also known as On Demand Computing. Our businesses have been able to improve reliability, cost of ownership, and agility using federation of cloud solutions. As in regards to Mobile, the train left the station years ago. We see across multiple demographics customers are dependent on their smart mobile devices for communication, entertainment, and shopping experiences. The Internet of all things and social media are realities of today and are integrated into channel strategies. Being able to monetize and track the investments on these specific initiatives back to profitability is still work in progress and requires more adjustments.

    Role as a CIO

    Looking at valuation assigned to peer-to-peer lending institutions provides an excellent view into how Wall Street views the critical technologies and business models within financial services. Having said that, even though I am a big believer of peer-to-peer markets, I believe in the long haulthehe financial impact will be best driven through innovations in analytics, predictability, reliability of services and data security and privacy.

    Even though still critical and priority one, keeping the business running is becoming easier to maintain and less of a leadership discussion. Agility, Innovation, and Talent Retention continues to be a daily part of IT executives. The board discussion is more along the line of growth and loss mitigation using analytics and predictive models.

    Demands and Issues Addressed in Security

    The evolution from task-oriented responsibilities to thought leadership opportunities is a slow progression that ties back to Speed of Trust. IT leaders are expected to execute flawlessly, demonstrate agility, and be good steward of finances before they are able to work their way to the board discussion. IT tactical wins come from impact to profitability through automation, on demand computing, workforce elasticity, new product delivery, and contract negotiation. I believe in the more legacy enterprises the value of IT is more limited to flawless and agile execution of business priorities. In these organizations top line growth strategies continue to be driven with minimal input from Information Technology leadership.

    Throughout this interview, I have implied a single position that encompasses CIO and CISO responsibilities. I find it best when CISO and CIO have an integrated strategy and priority which gets embedded in every aspect of Information Technology.

    Check this out: Top Managed Security Service Companies in APAC
    tag

    Data Security

    Information Technology

    Big Data

    Financial

    Information Security

    Physical Security

    Entertainment

    Weekly Brief

    loading
    Top 10 IBM Solution Companies - 2019
    ON THE DECK

    IBM 2019

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Artificial Intelligence - Myths And Truths

    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê
    Sustainable Future through Innovative Technology Solutions

    Sustainable Future through Innovative Technology Solutions

    Faisal Parvez, Director, BT Business CIO
    The Future Relies on Augmented AI

    The Future Relies on Augmented AI

    Laurent Fresnel, CIO, The Star Entertainment Group
    Digitalization with the use of digital technologies/Improving business through digital technologies

    Digitalization with the use of digital technologies/Improving business through digital technologies

    Wilbertus Darmadi, CIO, Toyota Astra Motor
    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    Rick Stanbridge, VP & Chief Information Officer, Marco’s Pizza
    Bunnings  Diy Digital Transformation

    Bunnings Diy Digital Transformation

    Leah Balter, Chief Information Officer, Bunnings
    For a Smarter City: Trust the Data, Ignore the Hype

    For a Smarter City: Trust the Data, Ignore the Hype

    Brad Dunkle, Deputy CIO, City of Charlotte
    Smart Community Innovation for the Post Pandemic

    Smart Community Innovation for the Post Pandemic

    Harry Meier, Deputy Cio for Innovation, Department of Innovation and Technology, City of Mesa
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://ibm.apacciooutlook.com/ciospeaks/data-security-across-the-enterprise-nwid-6526.html