Monday, 11 June 2012

By 2015, 80% of successful attacks will exploit well-known vulnerabilities....


Gaylord Hotel and Convention Centre, Washington, USA
Gaylord Hotel and Convention Centre, Washington, USA

At Gartner’s Security & Risk Management Summit (11-14 June 2012), Gartner has predicted that, “by 2015, 80% of successful attacks will exploit well-known vulnerabilities and will be detectable via security monitoring”.

The summit is the only time when the entire Gartner analyst and security and risk management community come together in one location to bring the latest research, insights and forward-thinking perspectives found nowhere else.


In response to this statement, Ash Patel, country manager for UK & Ireland at Stonesoft comments: “This undoubtedly raises an important question - why, if an attack is well-known and detectable, can it still successfully infiltrate systems?

“This could be a policy or process problem. All too often we are hearing of companies deploying security simply because they have to - essentially ticking a box. Companies must understand the risks they face if they do not handle their solution properly. Simply having an appliance in place is not enough; highly sophisticated cyber-attacks are now the norm, and in order to protect against them security solutions need to be managed and updated correctly. If this isn’t done, companies will be left wide open to attack.

“IT security needs to move much higher up the CIO’s agenda - it can no longer be an after-thought. Companies rely on their digital assets more than ever before and putting them at risk can have devastating consequences. It is also extremely important to educate staff on safe IT practices, as a worryingly high percentage of successful security breaches come down to basic human error.”

The Gartner’s Security & Risk Management Summit features five in-depth programs and more than 140 sessions Topics to be covered include:


  • Cloud & security
  • Advanced persistent threats
  • Secure mobile applications
  • Risk management & compliance
  • Identity management

View Agenda

No comments:

Post a Comment

Comments are welcomed (will be moderated)