Welcome back to this new edition of Apac CIO Outlook !!!✖
May 20178 Data is the next natural resource. Being such it's the basis of competitive advantage for any company and its security is a key strategy to everybody. During my interactions with col-leagues, I often tell them that just two percent of their data is worth 70 percent of their market value. And, based on one of IBM's surveys I could tell that 94 percent of CXOs think they might face major security inci-dents within the next two years. Out of them, 70 percent think that if the threat stems from ex-ternal sources, chances are high that it's going to be some rogue individual. And, I believe that out of all the external attacks, around 80 percent would be in the form of organized crime.It is estimated that by 2020 our world would have produced 44 zettabytes of data. A major portion, about 80 percent, of the existing data is unstruc-tured and for the world of cyber crime that's like a bull's eye. The world of cyber crime is organized today and in order to combat them, we need to be organized as well--in other words we must emulate them.in my viewBY VIRGINIA M. ROMETTY, CHAIRMAN, PRESIDENT & CEO,IBM Based in Bangkok, Thailand and founded in 1911, IBM (NYSE: IBM) is an American technology and innovation company with more than 375,000 employees serving clients in 170 countries.3Cs and Thethe Journey of Cyber SecurityEras of Cyber SecurityI think of the cyber defense with respect to three differ-ent eras. The first is similar to protecting a castle in the older days, or the moat castle analogy. It is like putting up different defenses such as moats and bridges around a castle, or say installing alarms on doors and windows around your house. Integration between these individual defense points was the biggest issue, since normally the alarms would come from different sources. This strategy was necessary, but unfortunately insufficient.The second, which is also the present era, belongs to security intelligence and it's very much analogous to the immune system. Security intelligence looks out for threats just like the immune system stays vigilant against any infection within a biological system. Once located, security intelligence quickly surrounds the threat and prevents it from further spreading and infect-ing, just like the immune system.The next is the cognitive era, which is knocking on our doors. The cognitive era would expand beyond predictive capabilities to include the capability of dis-covery--it would enable discovery of things that could have never been attached together, since the relation be-tween them was never recognizable.The 3Cs or Paradigms of Cyber SecurityThere are three paradigms within the cyber security space, and I stress on the first, which is collaboration. Based on the survey I mentioned earlier, about 50 per-cent of CEOs believe that to combat cyber threat they Virginia M. Rometty < Page 7 | Page 9 >