There are now two stakeholders on every mobile device used by employees: the enterprise and the user. Old-style tools have become inadequate to enforce corporate control. If users don't like them, they get around them, including sharing data back and forth between apps. That's because consumerisation of IT means personal devices and apps now have corporate levels functionality.
In 2016 SC Magazine UK will once again be honouring those of you that have stood out over the past year as exemplars of excellence among our vast army of defenders, working largely unseen to protect our data. Through the SC Awards 2016 we will recognise and reward your achievements and the outstanding contributions you have made to information security.
Information security is ultimately focused on one key goal: reduction of risks. Risks of data loss, reputation damage, and disruption to the productivity of your organisation. But what drives the actions of your security teams?