Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Top Stories > SERVICENOW 2018 SECURITY PREDICTIONS: AUTOMATION, BOARDROOMS AND GDPR
    Top Stories

    SERVICENOW 2018 SECURITY PREDICTIONS: AUTOMATION, BOARDROOMS AND GDPR

    SERVICENOW 2018 SECURITY PREDICTIONS: AUTOMATION, BOARDROOMS AND GDPR

    Published by Gbaf News

    Posted on December 19, 2017

    Featured image for article about Top Stories

    Author: Brendan O’Connor, Security CTO at ServiceNow

    The security threats and breaches of 2017 have set astounding new records for personal data invasion. From WannaCry to Petya, the list of sophisticated and far-reaching breaches grows almost daily. In 2017, breaches impacted hundreds of millions of people globally.

    The security mission to protect, detect, and respond, has remained the same for everything from IT networks and data storage to payment systems and IoT devices. In the past ten years, a tremendous wave of technology innovation has been developed to help us protect and detect. Yet, the most neglected area of security is the part we can control – our response. Without question, the velocity and complexity of the attacks will continue in 2018. The question is, will security operations be able to fine-tune their responses to meet the ever-increasing volume and sophistication of these challenges?

    Prediction 1: Security “Haves” and “Have-nots” emerge

    Security teams struggle to quickly determine whether incidents are worth a response. Many organizations use dozens of security tools that create and funnel massive volumes of signal onto the desk of the security professional. Analysts use spreadsheets and email to manage reacting to this signal, and the sheer volume of alerts results in analysts spending too much time researching incidents.

    In 2018, we will see security Haves and Have-nots emerge between those that begin to automate this research portion of security response and those that don’t. Companies with the tools and culture to embrace automation, and put technology to work for real business enablement, will perform better than those that don’t.

    The Haves will be expected to report on security operations as a key part of their day-to-day business. They will have scalable processes in place and will be in a position to measure progress. Automation will help them better determine which systems to patch and when. They will respond to phishing attacks in minutes rather than days. For the Haves, this will be a point of pride.

    The beauty for the Haves is that their security people will be freed from mundane and time-consuming manual research. They will have more time to focus on strategic projects that fortify the organization. This new approach extends beyond security. Automation is so effective it becomes a rising tide that lifts all ships, operating in virtually all areas of business.

    Prediction 2: Security gains a seat in the boardroom

    Security programs are about trade-offs and minimizing risk. To achieve greater success, security teams need to better articulate those trade-offs by putting the risk and material consequences into business terms, fundamentally bringing security into their business strategy. CISOs need to help executives and board members understand the ROI, cost-benefit analysis, and security program trade-offs by articulating the business risk versus business value.

    In the coming year, we will see CISOs do more to present their security concepts and programs in business terms. Talking about securing data is one thing, but demonstrating the value that security offers the business is something else. This will eventually apply to every aspect of the business, but most immediately applies to regulatory compliance, potential lost revenue, customer relationships, legal liability, competition, intellectual property, stockholder loyalty and brand protection.

    The boardroom needs to take a step toward security, and security operations needs to take two steps toward the boardroom. Bridging the knowledge gap between security leadership and the board provides the framework to ensure effective security by helping all parties assess the risks and decide how to mitigate them.

    Prediction 3: A breach enters our physical lives

    There is a difference between information and physical security. The breaches that plague organizations today are primarily information security violations. While painful, having credit card information, a social security number, or personal digital information stolen does not result in physical harm to the victim. In 2018, we will see a breach impact our physical, personal lives. It might be a medical device or wearable that is hacked and remotely controlled. Perhaps it will be an industrial IoT device or self-driving car that gets compromised. Or something closer to home – literally.  Devices from the garage door to the refrigerator are becoming smarter and more connected. The impact of such an attack will force government, business and individuals to take a closer look at the security of our infrastructure.

    Prediction 4: The EU penalizes a company for a GDPR violation

    On May 25, 2018, the General Data Protection Regulation (GDPR) will be put into effect. GDPR will provide a legal framework to strengthen and unify data protection and distribution for individuals within the European Union (EU). While the regulation will protect EU citizens, it will impact organizations worldwide – every company that serves a customer or employee in the EU – and businesses can be held responsible for the way they process, store, and protect personal data. The maximum penalty is a fine of 20 million Euros, or 4% of global annual revenue, whichever is greater. The EU may choose to make an example out of one of the first companies it penalizes, sending a message that GDPR is to be taken seriously.

    The first company most likely won’t be a household name, but it will be known to be out of compliance in areas other than GDPR. As these penalties receive global publicity, other companies will be compelled to move forward with GDPR compliance plans.

    Author: Brendan O’Connor, Security CTO at ServiceNow

    The security threats and breaches of 2017 have set astounding new records for personal data invasion. From WannaCry to Petya, the list of sophisticated and far-reaching breaches grows almost daily. In 2017, breaches impacted hundreds of millions of people globally.

    The security mission to protect, detect, and respond, has remained the same for everything from IT networks and data storage to payment systems and IoT devices. In the past ten years, a tremendous wave of technology innovation has been developed to help us protect and detect. Yet, the most neglected area of security is the part we can control – our response. Without question, the velocity and complexity of the attacks will continue in 2018. The question is, will security operations be able to fine-tune their responses to meet the ever-increasing volume and sophistication of these challenges?

    Prediction 1: Security “Haves” and “Have-nots” emerge

    Security teams struggle to quickly determine whether incidents are worth a response. Many organizations use dozens of security tools that create and funnel massive volumes of signal onto the desk of the security professional. Analysts use spreadsheets and email to manage reacting to this signal, and the sheer volume of alerts results in analysts spending too much time researching incidents.

    In 2018, we will see security Haves and Have-nots emerge between those that begin to automate this research portion of security response and those that don’t. Companies with the tools and culture to embrace automation, and put technology to work for real business enablement, will perform better than those that don’t.

    The Haves will be expected to report on security operations as a key part of their day-to-day business. They will have scalable processes in place and will be in a position to measure progress. Automation will help them better determine which systems to patch and when. They will respond to phishing attacks in minutes rather than days. For the Haves, this will be a point of pride.

    The beauty for the Haves is that their security people will be freed from mundane and time-consuming manual research. They will have more time to focus on strategic projects that fortify the organization. This new approach extends beyond security. Automation is so effective it becomes a rising tide that lifts all ships, operating in virtually all areas of business.

    Prediction 2: Security gains a seat in the boardroom

    Security programs are about trade-offs and minimizing risk. To achieve greater success, security teams need to better articulate those trade-offs by putting the risk and material consequences into business terms, fundamentally bringing security into their business strategy. CISOs need to help executives and board members understand the ROI, cost-benefit analysis, and security program trade-offs by articulating the business risk versus business value.

    In the coming year, we will see CISOs do more to present their security concepts and programs in business terms. Talking about securing data is one thing, but demonstrating the value that security offers the business is something else. This will eventually apply to every aspect of the business, but most immediately applies to regulatory compliance, potential lost revenue, customer relationships, legal liability, competition, intellectual property, stockholder loyalty and brand protection.

    The boardroom needs to take a step toward security, and security operations needs to take two steps toward the boardroom. Bridging the knowledge gap between security leadership and the board provides the framework to ensure effective security by helping all parties assess the risks and decide how to mitigate them.

    Prediction 3: A breach enters our physical lives

    There is a difference between information and physical security. The breaches that plague organizations today are primarily information security violations. While painful, having credit card information, a social security number, or personal digital information stolen does not result in physical harm to the victim. In 2018, we will see a breach impact our physical, personal lives. It might be a medical device or wearable that is hacked and remotely controlled. Perhaps it will be an industrial IoT device or self-driving car that gets compromised. Or something closer to home – literally.  Devices from the garage door to the refrigerator are becoming smarter and more connected. The impact of such an attack will force government, business and individuals to take a closer look at the security of our infrastructure.

    Prediction 4: The EU penalizes a company for a GDPR violation

    On May 25, 2018, the General Data Protection Regulation (GDPR) will be put into effect. GDPR will provide a legal framework to strengthen and unify data protection and distribution for individuals within the European Union (EU). While the regulation will protect EU citizens, it will impact organizations worldwide – every company that serves a customer or employee in the EU – and businesses can be held responsible for the way they process, store, and protect personal data. The maximum penalty is a fine of 20 million Euros, or 4% of global annual revenue, whichever is greater. The EU may choose to make an example out of one of the first companies it penalizes, sending a message that GDPR is to be taken seriously.

    The first company most likely won’t be a household name, but it will be known to be out of compliance in areas other than GDPR. As these penalties receive global publicity, other companies will be compelled to move forward with GDPR compliance plans.

    Related Posts
    Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    A Notable Update for Employee Health Benefits:
    A Notable Update for Employee Health Benefits:
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Top Stories

    Explore more articles in the Top Stories category

    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference

    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    View All Top Stories Posts
    Previous Top Stories PostFIVE DATA CHALLENGES EVERY INDEX PROVIDER FACES
    Next Top Stories Post3 CRYPTOCURRENCY EXCHANGES TO LIST MONACO MCO TOKEN ON DECEMBER 15TH